ResearchPDF Available

ATTACKS ON VANET SECURITY

Authors:
  • SAL Engineering & Technical Institute

Figures

Content may be subject to copyright.
A preview of the PDF is not available
... Presently, smart cities are turning into innovation hubs by leveraging cutting-edge technology. New services can be supported in these cities because of the existence of connected infrastructure and layers of intelligence that enable adapting, learning, and responding to inhabitants' needs [1][2][3][4][5][6]. However, enhancing road safety is a critical concern for developing intelligent cities where vehicles are distributed in large street networks [5,6]. ...
... New services can be supported in these cities because of the existence of connected infrastructure and layers of intelligence that enable adapting, learning, and responding to inhabitants' needs [1][2][3][4][5][6]. However, enhancing road safety is a critical concern for developing intelligent cities where vehicles are distributed in large street networks [5,6]. Fortunately, these vehicles can share safety information continuously. ...
... In VANETs, node communication has greatly improved road safety in large-scale street networks. Smart vehicles communicate, collaborate, coordinate, and share road information and resources to develop smart roads [5,6]. Security and truthfulness are then required to make such interactions via VANETs effective [4][5][6][7]. ...
Article
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present.
... Market-driven cloud computing is a viable approach for addressing the issue of client and CP incentives. In the cloud market, CPs lease their computing resources (CRs) temporarily to clients all over the world [1,[4][5][6]. Access to CRs is often unpredictable, unlike the supply of more common goods. Furthermore, when working in an online environment such as the cloud, a task may fail for a variety of reasons, including software bugs, hardware failure, and insufficient resources. ...
... When tasks fail, the customer's Quality of Service (QoS) suffers dramatically. As a result, it is critical to take actions that can assist in compensating and protecting clients when task failure occurs [6][7][8][9]. Due to task failure, the availability of CRs is unknown. CPs cannot typically provide a good service with a guarantee to meet their clients' expectations. ...
Article
Full-text available
A successful cloud trading system requires suitable financial incentives for all parties involved. Cloud providers in the cloud market provide computing services to clients in order to perform their tasks and earn extra money. Unfortunately, the applications in the cloud are prone to failure for several reasons. Cloud service providers are responsible for managing the availability of scheduled computing tasks in order to provide high-level quality of service for their customers. However, the cloud market is extremely heterogeneous and distributed, making resource management a challenging problem. Protecting tasks against failure is a challenging and non-trivial mission due to the dynamic, heterogeneous, and largely distributed structure of the cloud environment. The existing works in the literature focus on task failure prediction and neglect the remedial (post) actions. To address these challenges, this paper suggests a fault-tolerant resource management scheme for the cloud computing market in which the optimal amount of computing resources is extracted at each system epoch to replace failed machines. When a cloud service provider detects a malfunctioning machine, they transfer the associated work to new machinery.
... V2V and V2I communication are the two main modes of communication performed by vehicles in a VANET [10,11]. V2V communication is made possible by the On Board Unit (OBU) present in most modern vehicles [12]. The OBU contains the GPS module, wireless communication ...
... • Wormhole attack-This attack is similar to a black hole attack, but is performed by two cooperating malicious vehicles. The malicious vehicles will form a tunnel, transmitting messages to the other malicious vehicles at the end of the tunnel, thus never forwarding to the intended destination [12,27]. • Message suppression/Alteration attack-In this attack, the malicious vehicles will either suppress the message by dropping it or alter the message to fulfil their agenda [6]. ...
Article
Full-text available
Securing communications in vehicle ad hoc networks is crucial for operations. Messages exchanged in vehicle ad hoc network communications hold critical information such as road safety information, or road accident information and it is essential these packets reach their intended destination without any modification. A significant concern for vehicle ad hoc network communications is that malicious vehicles can intercept or modify messages before reaching their intended destination. This can hamper vehicle ad hoc network operations and create safety concerns. The multi-tier trust management system proposed in this paper addresses the concern of malicious vehicles in the vehicle ad hoc network using three security tiers. The first tier of the proposed system assigns vehicles in the vehicle ad hoc network a trust value based on behaviour such as processing delay, packet loss and prior vehicle behavioural history. This will be done by selecting vehicles as watchdogs to observe the behaviour of neighbouring vehicles and evaluate the trust value. The second tier is to protect the watchdogs, which is done by watchdogs’ behaviour history. The third security tier is to protect the integrity of data used for trust value calculation. Results show that the proposed system is successful in identifying malicious vehicles in the VANET. It also improves the packet delivery ratio and end-to-end delay of the vehicle ad hoc network in the presence of malicious vehicles.
... Possible CVs security problems include vehicles being hijacked on the basis of hacking from outside the vehicle [4], intentional traffic congestion due to vehicle camouflage [5] and Sybil attacks [6]. Therefore, CVs security is very important because attacks on CVs directly endanger the lives of drivers and pedestrians. ...
... VANET operations can be vulnerable to various types of attacks or misbhaviours such as replay attacks [11], eavesdropping [12], Denial of Service (DoS) [13], message deletion/alteration [14] etc. Approaches to detect such attacks can be divided into node-centric detection [15], where the detection of misbehaviour depends on the credibility of the node and data-centric detection [16], where detection is based on data reliability. Position falsification attack is a specific type of misbehaviour, where a vehicle sends a false position coordinate in the BSM [17]. ...
Chapter
The most trending technology among wireless network is vehicular ad hoc network (VANET), taking the automobile industry to new heights. Intelligent transportation systems (ITS) smartly utilized the standards of wireless communication to automate vehicles. VANET, being a most promising technology, has curbed the problem related to road safety, application-based services, etc. Doors of research are widely open for VANET due to its variant features. In this paper, we discussed the outline of VANET through its framework. The basic model of VANET is studied in order to understand the service system in VANET. Standards of VANET are even reviewed, which is the backbone of vehicular services. Followed by the type of communication in VANET and routing protocols. A broad study on various security attack and attacker is done to understand the security issues associated with the wireless communication. Focus on jamming attack and its effectiveness is thoroughly analyzed with the help of different parameters. In addition, future scope of research associated with jamming attack and possible developments is considered. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Article
Full-text available
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wired networks ensure the secured communications. But, in the case of wireless mobile ad hoc networks, the nodes are dynamic and the topology based and also needs more power consumptions. Because of mobility in wireless mobile adhoc networks, also there are lots of vulnerabilities when the attackers wish to collapse the partial or entire networks. Hence, there are lots of requirement for an understanding of the various problems associated with the wireless mobile networks. In this paper, the various vulnerabilities, attacks and security mechanisms are discussed for mobile ad hoc networks (MANETs) in detail.
Article
Full-text available
Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and having efficient data transfer. Thus, VANETs have different network concerns and security challenges to get the availability of ubiquitous connectivity, secure communications, and reputation management systems which affect the trust in cooperation and negotiation between mobile networking entities. In this survey, we discuss the security features, challenges, and attacks of VANETs, and we classify the security attacks of VANETs due to the different network layers.
Article
Vehicular systems (VANETs) are a developing research area with an extensive number of utilization cases. Anticipated applications incorporate safety applications, infotainment services, etc. VANETs connect vehicle into a huge mobile ad hoc network share data on a bigger scale. The attributes of VANET posture both difficulties and opportunities in accomplishing security objectives. Giving security to VANET is essential in terms of giving client validation, anonymity, honesty and protection of information. In this paper we have talked about the different techniques related to security in VANET. After going through all the techniques, a comparison has been made between the various techniques and the security concerns.
Article
Vehicular Adhoc Network is a special form of the Mobile Adhoc Network which has received remarkable attention with the growing era. It is capable of providing data communication between the mobile vehicles. It focuses on safety related applications and Internet accessing related applications. The basic model of the VANETs consists of On Board Units (OBUs) and Road Side Units (RSUs). These units communicate through an open wireless medium, creating a threat to the network. As the malicious node can attack the privacy information such as the user's identity, tracing preferences etc., if the node is not properly protected. Therefore, there is a need of security requirements to secure it. The paper describes various requirements, characteristics, challenging issues and techniques of security in VANETs. In this paper a theoretical analysis of different security techniques of Vehicular Adhoc Networks has been done which compare different schemes at different levels like hardware, authentication, privacy and certification techniques etc.
Conference Paper
A vehicular ad hoc network (VANET) is a special kind of mobile ad hoc network built on top of the IEEE802.11p standard for a better adaptability to the wireless mobile environment. As it is used for both supporting vehicle-to-vehicle (V2V) as well as vehicle-to-infrastructure (V2I) communications, and connecting vehicles to external resources including cloud services, Internet, and user devices while improving the road traffic conditions, VANET is a Key component of intelligent transportation systems (ITS). As such, VANET can be exposed to cyber attacks related to the wireless environment, and those of traditional information technologies systems it is connected to. However, when looking at solutions that have been proposed to address VANET security issues, it emerges that guaranteeing security in VANET essentially amounts to resorting to cryptographic-centric mechanisms. Although the use of public key Infrastructure (PKI) fulfills most VANET' security requirements related to physical properties of the wireless transmissions, simply relying on cryptography does not secure a network. This is the case for vulnerabilities at layers above the MAC layer. Because of their capability to bypass security policy control, they can still expose VANET, and thus, the ITS to cyber attacks. Thereby, one needs security solutions that go beyond cryptographic mechanisms in order cover multiple threat vectors faced by VANET. In this paper focusing on attack detection, we show how using an implementation combining observation of events and incidents from multiple sources at different layers Sybil nodes can be detected regardless of the VANET architecture.
Conference Paper
Vehicular Ad hoc NETwork (VANET) is an emerging paradigm in networking. It is a new form of Mobile Ad hoc NETwork (MANET). VANET enables vehicle to vehicle (V2V) communication with the goal of providing road safety and reduce traffic congestion. However, dishonest (malicious) peers (vehicles) in a VANET many send out false information to maximize their own utility. Now a day, VANET has been taken more attention of researchers and automotive industries due to life saving factor. In this paper, we first discuss the applications and unique characteristics of VANETs that distinguish them from MANETs. We also discuss about different attacks and security issues in VANET. We then survey existing trust models in VANETs, and point out their key issues. Based on these studies, we suggest desired properties towards effective trust management in VANETs.
Conference Paper
VANET security has attracted increasing attention from scholars with far-reaching research development. Only when both security of VANET and transportation are guaranteed, civil life and property security are surely defended. After highlighting the urgency and complicacy in solving the VANET security concern by the system, we confirm that security system architecture serves as a protective shield against overall threats. Targeted at all risks and challenges VANET is confronted with, this article summarizes existing security system architecture for the time being, sorted generalizes current architectures according to backstop technologies and specifies characteristics and technical issues in separate security system architecture respectively based on PKI, ID and situation modelling. The hierarchical framework of VANET Security System Architecture is significantly stressed on, as the whole secure background in VANET relies on bilateral coordination of self-accomplishment in each hierarchy and mutual support for one another. Core technology applicable in each hierarchy for VANET is identified and future breach for relevant research is exposed.
Article
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there are two pillars that cannot be overlooked: security and privacy. Both properties are especially relevant if we focus on ad-hoc wireless networks, where devices are required to cooperate – e.g. from routing to the application layer – to attain their goals. In this paper, we survey emerging and established wireless ad-hoc technologies and we highlight their security/privacy features and deficiencies. We also identify open research issues and technology challenges for each surveyed technology.