VANET security surveys
Tài liệu tham khảo
Jyoti, 2010
Wang, 2009
C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129.
V.S. Yadav, S. Misra, M. Afaque, Security of Wireless and Self-Organizing Networks: Security in Vehicular Ad Hoc Networks, CRC Press, 2010, pp. 227–250.
S.N. Pathak, U. Shrawankar, Secured communication in real time VANET, in: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2009, pp. 1151–1155.
Hartenstein, 2008, A tutorial survey on vehicular ad hoc networks, IEEE Commun. Mag., 10.1109/MCOM.2008.4539481
A. Stampoulis, Z. Chai, A Survey of Security in Vehicular Networks, Project CPSC 534, 2007.
Zeadally, 2010
T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: GLOBECOM Workshops, IEEE, New Orleans, LO, 2008, pp. 1–10.
Toor, 2008, Vehicle ad hoc networks: applications and related technical issues, IEEE Commun., 10
M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005.
G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17.
Sun, 2010, An identity-based security system for user privacy in vehicular ad hoc networks, IEEE Trans. Parallel Distrib. Syst., 21
Meraihi, 2008, Vehicle-to-vehicle communications: applications and perspectives, Wirel. Ad Hoc Sens. Networks
M. Schagrin, Vehicle-to-Infrastructure (V2I) Communications for Safety, 2013. Available: <http://www.its.dot.gov/research/v2i.htm>.
Kyunghwi, 2013, A MAC protocol using road traffic estimation for infrastructure-to-vehicle communications on highways, IEEE Trans. Intell. Transp. Syst., 14, 1500, 10.1109/TITS.2013.2264356
IEEE Standard 802. 16e. Amendment to IEEE Standard for Local and Metropolitan Area Networks, 2004, http://standards.ieee.org/about/get/802/802.16.html.
Tuan-Duc, 2011, Energy-efficient cooperative techniques for infrastructure-to-vehicle communications, IEEE Trans. Intell. Transp. Syst., 12, 659, 10.1109/TITS.2011.2118754
Issac, 2010, Security attacks and solutions for vehicular ad hoc networks, IET Commun., 4, 894, 10.1049/iet-com.2009.0191
X. Yang, L. Liu, N.H. Vaidya, F. Zhao, A vehicle-to-vehicle communication protocol for cooperative collision warning, in: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, pp. 114–123.
M. Torrent-Moreno, P. Santi, H. Hartenstein, Fair sharing of bandwidth in VANETs, in: Presented at the Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, Cologne, Germany, 2005.
G. Samara, W.A.H. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (VANET), in: 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398.
Raya, 2006, Securing vehicular communications, IEEE Wirel. Commun., 13, 8, 10.1109/WC-M.2006.250352
F.K. Karnadi, M. Zhi Hai, L. Kun-chan, Rapid generation of realistic mobility models for VANET, in: Wireless Communications and Networking Conference, WCNC IEEE, 2007, pp. 2506–2511.
C. Gosman, C. Dobre, V. Cristea, A security protocol for vehicular distributed systems, in: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010, pp. 321–327.
B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Workshop on Hot Topics in Networks (HotNets-IV), 2005.
G. Samara, W.A.H. Al-Salihy, R. Sures, Security analysis of vehicular ad hoc networks (VANET), in: Network Applications Protocols and Services (NETAPPS), 2010, pp. 55–60.
J.P. Thompson, C.D. Wang, Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, Google Patents, US5613039, 1997, https://www.google.com/patents/US5613039.
B. Fouch, Crash Facts. Available: <http://www.safety.fhwa.dot.gov/roadway_dept/crash_facts/>.
U. Delprato, M. Cristaldi, A. Gambardella, Sharing emergency information between emergency control centres: the project REACT, in: International Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, 2008.
Identify intelligent vehicle safety applications enabled by DSRC, US National Highway Traffic Safety Administration 2005.
Cheng, 2010, Infotainment and road safety service support in vehicular networking: from a communication perspective, Mech. Syst. Signal Process.
Segata, 2013, Automatic emergency braking: Realistic analysis of car dynamics and network performance, IEEE T. Veh. Technol., 62, 4150, 10.1109/TVT.2013.2277802
K.V.N. Kavitha, A. Bagubali, L. Shalini, V2V wireless communication protocol for rear-end collision avoidance on highways with stringent propagation delay, in: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom ‘09, 2009, pp. 661–663.
Dresner, 2008, A multiagent approach to autonomous intersection management, J. Artif. Int. Res., 31, 591
F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006.
S. Biswas, J. Mišić, Proxy signature-based RSU message broadcasting in VANETs, in: 25th Biennial Symposium on Communications (QBSC), 2010, pp. 5–9.
Papadimitratos, 2008, Secure vehicular communication systems: design and architecture, IEEE Commun. Mag., 46, 100, 10.1109/MCOM.2008.4689252
P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Presented at the Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 2004.
Kim, 2011, Secure and efficient protocol for vehicular ad hoc network with privacy preservation, EURASIP J. Wirel. Commun. Networking, 10.1007/978-3-642-27201-1
F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, 2007, pp. 1–12.
Q. Yi, N. Moayeri, Design of secure and application-oriented VANETs, in: Vehicular Technology Conference. VTC Spring IEEE, 2008, pp. 2794–2799.
K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, ARES, 2006, p. 8.
Li, 2008, A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks, Comput. Commun., 31, 2803, 10.1016/j.comcom.2007.12.005
H. Moustafa, G. Bourdon, Y. Gourhant, Providing authentication and access control in vehicular network environment, in: Security and Privacy in Dynamic Environments, vol. 201, Springer, New York, 2006, pp. 62–73.
Aad, 2008, Impact of denial of service attacks on ad hoc networks, IEEE/ACM Trans. Networking, 16, 791, 10.1109/TNET.2007.904002
Ben Salem, 2006, Securing wireless mesh networks, IEEE Wirel. Commun., 13, 50, 10.1109/MWC.2006.1632480
Blum, 2004, The threat of intelligent collisions, IT Prof., 6, 24, 10.1109/MITP.2004.1265539
H. Hasbullah, I.A. Soomro, J.-L. Ab Manan, Denial of service (DOS) attack and its possible solution in VANET, WASET, 2010.
J.M.D. Fuentes, A.I. González-Tablas, A. Ribagorda, Overview of security issues in vehicular Ad-hoc networks, in: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011, http://www.irma-international.org/chapter/overview-security-issues-vehicular-hoc/50631/.
D. Ren, S. Du, H. Zhu, A novel attack tree based risk assessment approach for location privacy preservation in the VANETs, in: IEEE International Conference on Communications (ICC), 2011, pp. 1–5.
T.W. Chim, S. Yiu, L.C. Hui, V.O. Li, Security and privacy issues for inter-vehicle communications in VANETs, in: 6th Annual Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops’ 09, 2009, pp. 1-3.
C. Harsch, A. Festag, P. Papadimitratos, Secure position-based routing for VANETs, in: IEEE 66th Vehicular Technology Conference, VTC, 2007, pp. 26–30.
C. Jung, C. Sur, Y. Park, K.-H. Rhee, A robust conditional privacy-preserving authentication protocol in VANET, in: Security and Privacy in Mobile Information and Communication Systems, vol. 17, Springer, Berlin Heidelberg, 2009, pp. 35–45.
E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC Network Laboratories, 2006.
L. Ertaul, S. Mullapudi, The security problems of vehicular ad hoc networks (VANETs) and proposed solutions in securing their operations, in: International Conference on Wireless Networks ICWN, 2009.
L. Nai-Wei, T. Hsiao-Chien, Illusion attack on VANET applications – a message plausibility problem, in: Globecom Workshops, IEEE, 2007, pp. 1–8.
B. Xiao, B. Yu, C. Gao, Detection and localization of sybil nodes in VANETs, in: International Conference on Mobile Computing and Networking: Proceedings of the workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006, pp. 1–8.
S.U. Rahman, H. Falaki, Security and Privacy for DSRC-based Automotive Collision Reporting, ED, 2009 http://scholar.google.com/citations?view_op=view_citation&hl=fr&user=wRw-e8EAAAAJ&citation_for_view=wRw-e8EAAAAJ:8k81kl-MbHgC.
M. Koubek, S. Rea, D. Pesch, Event Suppression for safety message dissemination in VANETs, in: IEEE 71st Vehicular Technology Conference (VTC Spring), 2010, pp. 1–5.
Toor, 2008, Vehicle ad hoc networks: applications and related technical issues, IEEE Commun. Surv. Tutorials, 10, 74, 10.1109/COMST.2008.4625806
Sumra, 2011, Trust and trusted computing in VANET, Comput. Sci., 1
G. Guette, C. Bryce, Using TPMS to secure vehicular ad-hoc networks (VANETS), in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106–116.
Raya, 2007, Securing vehicular ad hoc networks, J. Comput. Secur., 15, 39, 10.3233/JCS-2007-15103
T. Zhou, R.R. Choudhury, P. Ning, K. Chakrabarty, Privacy-preserving detection of sybil attacks in vehicular ad hoc networks, in: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. MobiQuitous, 2007, pp. 1–8.
K. El Defrawy, G. Tsudik, PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs), in: IEEE International Conference on Network Protocols, ICNP, 2008, pp. 258–267.
C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE, in: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006, pp. 266–279.
Y. Hao, Y. Cheng, K. Ren, Distributed key management with protection against RSU compromise in group signature based VANETs, in: IEEE GLOBECOM Global Telecommunications Conference, 2008, pp. 1–5.
K. Papapanagiotou, G.F. Marias, P. Georgiadis, A certificate validation protocol for VANETS, in: Globecom Workshops, IEEE, 2007, pp. 1–9.
N. Vighnesh, N. Kavita, S.R. Urs, S. Sampalli, A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks, in: IEEE Symposium on Wireless Technology and Applications (ISWTA), 2011, pp. 96–101.
F. Sabahi, The security of vehicular ad hoc networks, in: Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pp. 338–342.
Igure, 2008, Taxonomies of attacks and vulnerabilities in computer systems, IEEE Commun. Surv. Tutorials, 10, 6, 10.1109/COMST.2008.4483667
T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: 2008 IEEE GLOBECOM Workshops, 2008, pp. 1–10.
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 99–110.
K.S. Killourhy, R.A. Maxion, K.M. Tan, A defense-centric taxonomy based on attack manifestations, in: International Conference on Dependable Systems and Networks, 2004, pp. 102–111.
Mirkovic, 2004, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Comput. Commun. Rev., 34, 39, 10.1145/997150.997156
S.K. Dhurandher, M.S. Obaidat, A. Jaiswal, A. Tiwari, A. Tyagi, Securing vehicular networks: a reputation and plausibility checks-based approach, in: GLOBECOM Workshops (GC Wkshps), IEEE, 2010, pp. 1550–1554.
Brooks, 2009, Automobile security concerns, IEEE Veh. Technol. Mag., 4, 52, 10.1109/MVT.2009.932539
Sampigethaya, 2007, Amoeba: robust location privacy scheme for VANET, IEEE J. Sel. Areas Commun., 25, 1569, 10.1109/JSAC.2007.071007
F. Dötzer, Privacy issues in vehicular ad hoc networks, in: Privacy Enhancing Technologies, 2006, pp. 197–209.
V. Pathak, D. Yao, L. Iftode, Securing location aware services over VANET using geographical secure path routing, in: IEEE International Conference on Vehicular Electronics and Safety, ICVES, 2008, pp. 346–353.
Kapadia, 2008, AnonySense: opportunistic and privacy-preserving context collection, Pervasive Comput., 1, 280, 10.1007/978-3-540-79576-6_17
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, M. Raya, Architecture for secure and private vehicular communications, in: 7th International Conference on ITS Telecommunications, ITST’07, 2007, pp. 1–6.
F. Li, J. Wu, A winning-probability-based incentive scheme in vehicular networks, in: Proceedings of IEEE International Conference on Network Protocols (ICNP), Poster Abstract, 2008.
Wu, 2012, Routing algorithm based on multi-community evolutionary game for VANET, J. Networks, 7, 1106, 10.4304/jnw.7.7.1106-1115
A.P. Bernia, Reliable and Secure Geocasting in VANETs, University of Ottawa, 2012.
R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen, ECPP: efficient conditional privacy preservation protocol for secure vehicular communications, in: The 27th Conference on Computer Communications INFOCOM, IEEE, 2008.
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET, in: Presented at the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc networks, Montreal, Quebec, Canada, 2007.
Zhang, 2010, A scalable robust authentication protocol for secure vehicular communications, IEEE Trans. Veh. Technol., 59, 1606, 10.1109/TVT.2009.2038222
L. Zhang, Q.Q. Wu, Bo, J. Domingo-Ferrer, APPA: aggregate privacy-preserving authentication in vehicular ad hoc networks, in: Presented at the Proceedings of the 14th International Conference on Information security, Xi’an, China, 2011.
Liqun, 2011, Threshold anonymous announcement in VANETs, IEEE J. Sel. Areas Commun., 29, 605, 10.1109/JSAC.2011.110310
K. Priya, K. Karuppanan, Secure privacy and distributed group authentication for VANET, in: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 301–306.
C2C-CC, Car to Car Communication Consortium, http://www.car-to-car.org.
IEEE 1609.2-2013. IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages, ed, 2013.
Qianhong, 2010, Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications, IEEE Trans. Veh. Technol., 59, 559, 10.1109/TVT.2009.2034669
TPM Main: Part 1 Design Principles, Trusted Computing Group, 2006, https://www.trustedcomputinggroup.org/files/static_page_files/CEB6F955-1D09-3519-AD08DFA7EEEE8F2D/Main%20Part1%20Rev94.pdf.
A. Studer, F. Bai, B. Bellur, A. Perrig, Flexible, extensible, and efficient VANET authentication, in: Proceedings of the 6th Annual Conference on Embedded Security in Cars, 2008.
J. Petit, Z. Mammeri, Analysis of authentication overhead in vehicular networks, in: Third Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2010, pp. 1–6.
F. Dotzer, L. Fischer, P. Magiera, Vars: a vehicle ad-hoc network reputation system, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, 2005, pp. 454–456.
M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, 2006, pp. 67–75.
Rahbari, 2011, Efficient detection of sybil attack based on cryptography in VANET, Int. J. Network Secur. Appl. (IJNSA), 10.5121/ijnsa.2011.3614
A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings Symposium on Applications and the Internet Workshops, 2003, pp. 342–346.