Classification of Security Attacks in VANET: A Review of Requirements and Perspectives

MATEC Web of Conferences - Tập 150 - Trang 06038 - 2018
Mohammed Ali Hezam Al Junaid1, Aamiruddin Syed1, Mohd Nazri Mohd Warip1, Ku Nurul Fazira Ku Azir1, Nurul Hidayah Romli1
1School of Computer and Communication Engineering, University Malaysia Perlis, Malaysia

Tóm tắt

Vehicular Ad Hoc Network (VANET) is a pillar of the envisioned Intelligent Transport System (ITS) and a subset of Mobile Ad Hoc Network that grants the communication in between the vehicles alongside with the absence of established communication infrastructure. Exposure to vulnerabilities of Vehicular Ad-Hoc Network (VANET) has been shown to be related to its nature of the environmental. For this reason, VANET security becomes a critical challenge that need to be resolved. In this paper, we assess the VANET security issues and discuss the challenges in VANET. Equally important, we comparatively review the security requirements, the type of attacks and capabilities of attackers present in VANET.

Từ khóa


Tài liệu tham khảo

Agrawal A., Garg A., Chaudhiri N., Gupta S.,Pandey D., and Roy T., “Security on Vehicular Ad Hoc Networks (VANET): A Review Paper,” vol. 3, no. 1, 2013.

Kruegel C. and Toth T., “A survey on intrusion detection systems,” TU Vienna, Austria, vol. 109, no. 1, pp. 6–15, 2000.

Pattnaik O. and Pattanayak B. K., “SECURITY IN VEHICULAR AD HOC NETWORK,”vol. 11, no. 2, pp. 337-346, 2014.

Shim C. Y., “A taxonomy for DOS attacks in VANET,” 2014 14th Int. Symp. Commun. Inf. Technol., pp. 26-27, 2014.

Hasbullah, 2010, World Acad. Sci. Eng. Technol., 4, 411

De Fuentes J. M. and González-tablas A. I., “Overview of security issues in Vehicular Ad-hoc Networks,” Science (80-.)., 2010.

Raw, 2013, Int. J. Netw. Secur. Its Appl., 5, 95

Bharat M., Sree K. S., and Kumar T. M., “Authentication Solution for Security Attacks in VANETs,” vol. 3, no. 8, pp. 7661–7664, 2014.

Sumra I. A., Manan J. A. B., Hasbullah H., and Iskandar B. S.,“Timing Attack in Vehicular Network 2 VANET Applications and Time,” pp. 151-155.

Isaac, 2010, IET Commun., 4, 894, 10.1049/iet-com.2009.0191

Alheeti K. M. A., Gruebler A., and Mcdonald-maier K. D., “An Intrusion Detection System Against Malicious Attacks on the Communication Network of Driverless Cars,” IEEE Consum. Commun. Netw. Conf., no. 12, pp. 916–921, 2015.

Zeadally, 2012, Telecommun. Syst., 50, 217, 10.1007/s11235-010-9400-5

Bibhu V., “Performance Analysis of Black Hole Attack in Vanet,” no. October, pp. 47–54, 2012.

Safi, 2009, 2nd Int. Work. Comput. Sci. Eng. WCSE 2009, 2, 160, 10.1109/WCSE.2009.787

Mejri M. N. and Ben-Othman J.,“Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks,” Glob. Commun. Conf. (GLOBECOM), 2014 IEEE, no. ii, pp. 5032–-5037, 2014.

Jakubiak J. and Koucheryavy Y., “State of the Art and Research Challenges for VANETs,” 2008 5th IEEE Consum. Commun. Netw. Conf., pp. 912–916, 2008.

Shinde S. S. and Patil S. P., “Various Issues in Vehicular Ad hoc Networks : A Survey,” vol. 1, no. 2, pp. 399–403, 2010.

Samara G., Al-Salihy W. a. H., and Sures R., “Security Analysis of Vehicular Ad Hoc Nerworks (VANET),” Netw. Appl. Protoc. Serv. (NETAPPS), 2010 Second Int. Conf., pp.55–60, 2010.