Conference PaperPDF Available

An Overview: Various Attacks in VANET

Authors:

Abstract and Figures

In the current era of technological challenges in data transmission, there is a big need to identify the major components and tools which are used in transferring and receiving data for vehicular objects. Vehicular Ad-hoc Network (VANET) has become one of the most popular areas of research in past decades. Vehicles are connected in an adhoc manner in a wireless environment called VANET that is a subpart of MANET. Due to frequent change in topological structure, it is very difficult to make a VANET secure. In this research article, it is being observed that many security challenges are there where research have to step-up forward for making VANET more secure. A critical analysis is discussed broadly with respect to VANET components, security issues and challenges, attacks and its solutions.
Content may be subject to copyright.
An Overview: Various Attacks in VANET
Taskeen Zaidi1
Shri Ramswaroop Memorial University,
Deva Road,Barabanki
taskeenzaidi867@gmail.com
Syed.Faisal2
Shri Ramswaroop Memorial University,
Deva Road,Barabanki
AbstractIn the current era of technological challenges in
data transmission, there is a big need to identify the major
components and tools which are used in transferring and
receiving data for vehicular objects. Vehicular Ad-hoc
Network (VANET) has become one of the most popular areas
of research in past decades. Vehicles are connected in an ad-
hoc manner in a wireless environment called VANET that is a
subpart of MANET. Due to frequent change in topological
structure, it is very difficult to make a VANET secure. In this
research article, it is being observed that many security
challenges are there where research have to step-up forward
for making VANET more secure. A critical analysis is
discussed broadly with respect to VANET components,
security issues and challenges, attacks and its solutions.
KeywordsAd-hoc, IEEE, IDS, RSU, AU, OBU, TA, V2V,
V2I, V2B, DOS, DDOS, Sybil.
I. INTRODUCTION AND RELATED WORK
With the day to day development in wireless topology
and importance of internet in our daily live exposed the need
of Wi-Fi environment, the one who ensure the safety of
human lives and provides guarantee of secure data
transmission, this lead to the development of new type of
wireless network called Vehicular Ad-hoc Network
(VANET), it ensures vehicular communication. The primary
objective of VANET is to develop a network between
vehicles and look after the communication between them
irrespective of the central base station. VANET is part of
Mobile Ad-hoc Network (MANET), VANET receive a lot of
attention because of the services proved by it namely sharing
information related to traffic, road safety information, and
other data (file, audio, video, etc.) using unintended internet
connectivity. One of the major application of VANET is in
the field of a medical emergency where there is a need to
pass the information regardless of infrastructure.
According to the data provided by Ministry of Road
Transport & Highways, Government of India, the estimated
number of death is about 1,50,785 people and hundreds of
thousand would have suffered traumatic injury across India
only in the year 2016[1].
It is being ascertained that if the driver gets some
warning before half a second of the accident, then an
accident can be avoidable [2]. VANET comes into light as a
solution to avoid these mishaps by proving some prior
information about the vehicles near to it.
The primary objective of VANET is to develop a
reliable, efficient and secure routing protocol, which
perform robustly in a highly dynamic environment even
VANET is under some attack.
VANET security comes into focus in the middle of 2000
and it gets bloomed in 2007. In recent years, numerous
research was proposed in the literature for presenting a
better solution to detect and analyze different network
attacks. We will address some of the research paper over
here
J.P. Hubaux et al. [3] describes how VANET help in
reducing road accidents, he also describes the components
required in smart vehicle for efficient data transmission. For
the authentication of smart vehicles, authors suggest using
electronic license plates and for the location verification,
they propose two methods, Tamper Proof GPS and second
one verifiable multi literation.
J.T. Issac, et al. [4] perform analysis on Security attacks
and solutions for vehicular ad hoc networks. Author discuss
may attack on the network, which were reported before
2010. Authoe proposed solution to prevent security attack
and vulnerability.
M.Burmester et al. [5] perform analysis on Strengthening
Privacy Protection in VANETs. They proposed a
cryptographic mechanism to establish a balance between
privacy and accountability in VANET. They predict this
approach to be hybrid and proposed symmetric and public
key operation for both of the cases authentication and
encryption.
J. T. Isaac et al for implementing a secure vehicular social
network an incentive protocol i.e. Pi is proposed by the
author [19] to tolerate vehicle delay and to improve the
performance for archiving the fairness among vehicles in the
social vehicular network
To detect and solve the Sybil attack in urban VANET a
footprint based mechanism proposed by the authors [21] so
that vehicles may generate a location-hidden trajectory for
location privacy while communicating through the message
passing
J. T. Isaac et al.[20] broadly discussed various security
threats and attacks. Author also discussed security
challenges with respect various attacks on VANET and
analyze security solutions, which has already proposed
previously.
Grover et al. [17] has detected the Sybil attack in realistic
scenario based VANET and evaluated the performance
through simulation code.
H. Lu et al.[18] propose an authentic framework for
securing the VANET. Authors propose an ID-based
2018 4th International Conference on Computing Communication and Automation (ICCCA)
978-1-5386-6947-1/18/$31.00 ©2018 IEEE 1
signature scheme, which used to authenticate nodes
uniquely in the network. As all nodes have, unique id’s so it
is easier to track any malicious node on the network.
C. Kerlof and D.Wagner [13] have described routing
security in an Ad-hoc network and peer-to-peer network.
Author perform attacks on network analyze the performance
and consequences of those attack, they propose security
goals and parameters of routing in a sensor network.
J. Newsome et al.[15] describe how Sybil attack affects the
whole network. Sybil attack is one of the most serious attack
as the nodes impersonate its self to be at multiple location.
Authors also describe types of Sybil attack on the network
and propose countermeasure against each type.
S. Park et al.[16] propose a defense mechanism against
Sybil attack. Authors suggest timestamp series approach to
detect a Sybil attack. Timestamp approach follows simple
principle that a vehicle holding single identity may not pass
through multiple RSU at same time and if it passes, then that
node treated as Sybil attack.
R. Hussain, H. Oh [14] deeply analyze the consequences of
Sybil attack and propose tamper resistant model (TRM) in
order to avoid Sybil attack and secure the network from
attackers.
R. Xiu-li, Y. Wei [22] propose a Sybil attack detection
approach for Vehicular ad-hoc network. In the proposed
approach, every node checks the range of their neighbor
node, if that range does not fit according to the parameter,
this shows a particular node is Sybil node. Then topology
takes countermeasure according to protocol.
K.F. Ssu et al. [23] discuss security challenges and effect of
Sybil attack in WSN. Authors propose a technique for
detection of Sybil attack where nodes identity verified by
analyzing the neighbors’ node table of its own.
Raya, M., and Hubaux [24] authors discuss the security
issues in VANET and propose some security solutions.
Authors also suggest a set of security protocols that protect
privacy and enhance the efficiency of the sensor network.
Muawia Abdelmagid Elsadig and Yahia A. Fadlalla,[25]
discuss numerous attacks on VANET in light of
performance, achievement and propose security solutions to
tackle these attacks.
Vimal Bibhu et al.[26] has described many attacks on the
network but primarily focusses on back hole attack. Author
did a performance evaluation of black hole attack in a
simulation environment.
II. BACKGROUND
A. VANET
VANET is a Vehicular Ad-Hoc Network also termed as
Wireless Access in Vehicular Environment (WAVE), which
is responsible for communication between vehicles and
infrastructure in a certain environment. While implementing
a VANET it is mandatory to implement a communication
protocol in an effective and ordered manner.
a) Components of VANET
The main components of vehicular ad-hoc network
are: On Board Unit (OBU), Road Side Units (RSU),
Trusted Authority (TA) and Application Units
(AU). Each component is crucial for implementing
VANET. Listed components of Vehicular Ad-hoc
Network are briefly explained below:
b) On-Board Unit (OBU)is equipped on every vehicle
supporting ITS. OBU is a network device, which is
fixed on vehicles and used for exchanging
information with nearby vehicles OBUs or with
Road Side Units. Sensors on Electronic control Unit
(ECU) collect information about vehicle and
surrounding then Application Unit (AU) process
that information and generate some messages based
on gathered information and share that information
with neighbor vehicle in order to eradicate any
miss-happening. OBU may connect to internet via
RSUs through DSRC radio or by Hotspot and in
absence of both OBUs can communicate with each
other via some cellular network [5].
c) Road Side Unit (RSU) standing for the base station
or act as the gateway between vehicles and road
services provided by VANET. For the reason that
RSUs are Static in nature as they have some fixed
range, so vehicle in that range only may
communicate with that RSU. The frequency and
distribution of RSUs are mainly depended on the
communication protocol utilized by it. RSU assist
Trusted Authority (TA) to revoke communication of
authorized node to unauthorized or malicious nodes
[6].
d) Trusted Authority (TA)is responsible for issuing
digital certificates to RSUs and vehicles, which
authenticate vehicle and RSU uniquely in the
vehicular ad-hoc network. To isolate untrusted
vehicles, Trusted Authority holds a list of malicious
vehicle and continuously advertise that list to the
network, in order to prevent those vehicles who are
2
not allowed to participate in VANET because of its
malicious behavior in past[7].
e) Application Units (AU) is a device equipped in the
vehicle. The connection between AU and OBU may
be wired or wireless, in some cases, AU and OBU
may couple in a single chip. AU handles the
services provided by the provider mostly deals in
the safety application and personal digital assistance
(PDA).
B. In broad terms there is no fixed communication model or
architecture that a VANET must follow. VANET is very
different from MANET, as nodes in MANET are free to
move in any random fashion but in VANET vehicles or
nodes follow some fixed path like roads or highway on
which they are free to move.
Communication in VANET is closely categorized into 4
classes.
a) In-Vehicle Communication is more important with
respect to driver concern because it provides the
information related to vehicle health, performance and
drivers fatigue and drowsiness that is essential for
driver and public safety.
b) Vehicle-to-Vehicle (V2V) communication provides
communication between vehicles, where vehicles can
directly communicate with other vehicles, which
involves sending and receiving of messages.
c) Vehicle-to-Infrastructure (V2I) communication
depicts communication between vehicles and
infrastructure such as traffic light or Road Side Units
(RSU). RSUs are like routers that are fixed on the
roadside and have some horizontal height when it
receives some information form any vehicle it
transmits that information to the specified destination.
RSUs are placed at some fixed distance, this finite
distance between RSUs depends on the
communication limit of the RSUs devices. For the
effective communication, VANET prefers to use the
IEEE 802.11 standard.
d) Vehicle to broadband (V2B) communication defines
that vehicle might communicate via some wireless
broadband communication channel like HSPA(3G) or
Long Term Evolution(4G) because those broadband
clouds embrace additional traffic information and
monitoring data which is helpful in vehicle tracking
and active driver assistance[5].
III. VANET SECURITY
In this section, we present some security attributes for
VANET. Regarding security, these three attributes cannot be
ignored. Many research papers classify attacks on the basis
of authenticity, availability, and confidentiality.
A. Authenticity is crucial as it authenticates that message
was sent by authenticated vehicle. It is very essential to
ensure the authenticity of the sender of the message.
B. Availability ensures that communication channel and
network resource must be available even network may under
some attack without affecting the performance of the
network.
C.Confidentiality achieved by employing some
cryptographic technique on the messages. Confidentiality
refers to confidential communication. When a message is
transmitted after that only no other than authenticated
receiver may decrypt that message.
IV. SECURITY ATTACKS AND APPROACHES
In this section, we present different types of attack possible
on Vehicular Ad-Hoc Network. The Impact of attack on the
system depends on the efficiency of the attacker. These
attacks are unpredictable and can affect the lifesaving
application of VANET. These attacks can disrupt the entire
system or may modify the working of the system to obtain
the privilege of the system. On the basis of attacks performed
by an attacker over VANET, these attackers are classified
into following types [9]
A. Classification based on membership: On the basis of
membership there are two types of attackers are possible
The trusted nodes of a network, who used to communicate
with the other members of the network, are known as
Internal, these authorized members of the network perform
this attack in various ways. On the contrary, External does
not have direct access to communicate with the member of
the network; they have limited capacity to attack.
B. Classification based on Activity: On the basis of activity
attacker can be active or passive.
An Active attacker tries to alter the information of the
network by generating malicious packets or signals. This
type of attackers are much noxious than passive attackers.
Whereas Passive attackers only eavesdrop on the wireless
channel, they do not alter the network information.
C. On the basis of Intention:This describes the intention
behind the attack.
A rational attacker seeks personal benefit by imposing attack
over the network, these attacks are more predictable whereas
malicious attackers not gain any personal benefit, and their
intention is to damage the proper functioning of the network,
it’s difficult to foreseen malicious attack.
Based on
membership
Based on
Activity
Based on
Intension
Internal
External
Active
Passive
Rational
Malicious
ATTACKERS
3
V. ATTACKS
There was countless number of attacks are possible on
VANET which may shut down the whole network or can
degrade the performance of the network. Some of the attacks
are explored below:
A. Denial of Service Attack (DOS):
In VANET availability of network is very essential where
all Vehicles rely on that. DOS is often one in all the foremost
serious attack in any network. The main motive of the DOS
attack is to prevent the services access by the authorized
user. In DOS attack attacker transmit several dummy
messages to jam the network in order to conceive attention or
to take privilege of the network or to disrupt the efficiency of
the network.
Fig 2. Denial of Service (DOS) Attack
Figure 2 shows that a malicious black car applies a DOS
attack to demolish the communication between V2V and V2I
by transmitting the dummy messages “Lane close ahead” to
the vehicles near to it and also transmit that dummy message
to nearest RSU. Because of this, legitimate cars on white
receive a false information and take their decision based on
false information.
B. Distributed Denial of Service (DDOS) Attack:
DDOS attack is much savior attack than DOS in VANET
environment as mechanism of this attack is in distributed
environment. In DDOS attack multiple malicious vehicles
launch attack on a legitimate vehicle from different locations
and they may use different time slots for sending those
messages. That’s why it very difficult to prevent or trace this
attack.
Fig. 3 Distributed Denial of Service (DDOS) Attack
Figure 3 demonstrates DDOS attack where malicious
cars in black launch DDOS attack on a legitimate car A form
different locations and at a different time because of that car
A cannot communicate with other trusted cars [9].
C. Black Hole Attack:
In this attack, malicious nodes in a network create an
area where the network traffic is redirected or message
packets are dropped. The malicious nodes transmit a
false routing information and pretend to have an
optimum route for the destination in order to attract
sender node. As the sender node transmits that packet,
malicious vehicles drop that packet or missus that
packet for their benefit [12].
Fig 4. Black Hole Attack
Figure illustrates black hole attack where legitimate cars D
and C send packets to malicious cars in black, these cars
create a black hole in the network and do not transmit that
packet to the other legitimate vehicles i.e E and F.
D. Wormhole attack:
This attack is a variation of black hole attack, in
wormhole attack legitimate cars receive data packet by the
malicious cars. In this attack, malicious cars create a
wormhole or tunnel between the sender and receiver with
minimum hope count and make that entry in the routing
table. When sender node needs to transmit data it looks for
the destination path with minimum hope count and it identify
the route with minimum hope count created by malicious
nodes and then start transmitting the data packets by that
route. As the communication between the sender and
receiver initiated through this malicious tunnel, so malicious
nodes have all the freedom either to drop that packet or just
listen the data packets or modify the data packet or use data
packet for their benefit.
Fig 5. Worm Hole Attack
Figure 5 shows the wormhole attack, where two black
malicious cars create a tunnel to transmit the data between
legitimate source and destination.
E. Illusion Attack:
In this attack, the attacker tries to deliberately manipulate his
vehicles reading or incorrect traffic information and transmit
that false reading to nearby vehicles and RSU. In VANET
driver behavior will depend on the warning messages it
receives, as driver receives false warning messages it may
change the driver behavior and can cause an accident, traffic
jam or can reduce the performance of the network by
manipulating network topology.
4
Fig 6. Illusion Attack
Figure illustrates Illusion attack, where black malicious
car generates false traffic warning message and broadcast
that false message “accident ahead” to the neighbor vehicle
and even to RSU.
F. Timing Attack:
In VANET vehicles on the road need a real-time data so
if the information received at the correct time then it is worth
and if not then that information is worthless. So transmission
of data at the right time form source vehicle to destination
vehicle is important in order to achieve security and
integrity. In timing attack, if a malicious vehicle receives an
emergency message, they do not forward that message to the
destination instantly while it adds a time slot to the original
message in order to create a delay. Because of that receiver
vehicle receives the message after that actually it requires.
Fig 7. Timing Attack
Figure 7 shows timing attack on VANET network, where
a black malicious car receive a message “accident ahead”
form car D, it does not transmit that message at correct time,
when car F was actually at its right place instead transmit
that message by adding some time slot so whenever car F
receives that message it is on spot F1 where accident has
actually happened.
G. Man in Middle Attack:
In man in middle attack, malicious vehicles include
himself into the communication between two vehicles and
impersonate both the vehicles in order to gain the access of
the information that both vehicles were trying to send each
other and inject false information between vehicles, this
attack impersonate as it’s a normal exchange of information.
Fig 8. Man in Middle Attack
Figure 8 illustrates man in middle attack where black
malicious car C listens to the communication between B and
D and transmit false information to E.
H. Global Positioning System (GPS) Spoofing:
All the vehicles connected to VANET transmit a signal
to GPS satellite, the GPS satellite maintain a location table of
all the vehicles by the use of the location of vehicles and
vehicle unique identity within the network. In GPS spoofing
attack, attackers vehicle push a false reading in the GPS in
order to deceive other vehicle to think that they are at the
different location. In order to generate false signal vehicle
use GPS satellite simulator which generates a false signal
that was much stronger than those actual signal.
I. Social Attack:
All frail attack comes under this attack. In Social Attack,
the intention of the attacker is to indirectly compose a
problem for the users of the network. Attacker sends some
random messages “You are stupid” to the authentic user of
the network with the intention to change the behavior of the
user when authenticated user read those messages its
behavior get change from positive to negative angry
behavior[10].
J. Sybil Attack:
Sybil attack is a noxious attack, which was first
mentioned in context of a peer-to-peer network. In this, an
attacker creates an illusion of the existence of multiple false
vehicles in order to dominate over the whole network and
infect false information to harm the legitimate user or to
demolish the network performance. This attack is one of the
most serious attack, as the attacker claimed to be at the
different geographical location at the same time [10][11].
Fig 9. Sybil Attack
Figure 9 shows the Sybil attack where a black malicious
car creates an illusion of multiple vehicles on the road
because of that, other vehicles on the road realize that
there is a heavy traffic on the road. The impact of this
attack is serious because after spoofing vehicles identity
and location of the vehicle, an attacker can implement
any types of attack in the network.
VI. DISCUSSION & CONCLUSION
As we know motive behind implementation of VANET is
to improve efficiency and safety in transportation. To
transfer data between nodes VANET use wireless medium as
the medium is wireless there is good chance for attacker to
attack on the network and damage whole network. In the
current work, we have discussed VANET including its
components, types of communications etc. Then we discuss
prominent research issue and challenges like security and
attacks in VANET. The idea of this paper is to study the
research perspective on various attacks based on activity,
5
Intension, and membership in VANET. In the future work,
we will extend our work to propose a feasible solution to
protect the Vehicles from Sybil attack under VANET.
REFERENCES
[1] http://pib.nic.in/newsite/PrintRelease.aspx?relid=170577 assessed on
6 March 2018.
[2] Maxim Raya, Jean-Pierre Hubaux., “ The Security of Vehicular Ad
Hoc Network”, SASN’05. Nov 7, 2005, Alexanderia Virginia, USA,
pp 11-21.
[3] J.P. Hubaux, S.Capkun, and J.Luo,” The security and privacy of smart
vehicles”, IEEE Security and Privacy Magazine, Vol. 2, No. 3, pp 49-
55,2004.
[4] J.T. Issac, S.Zeaddly, J.S.Camara, “Security attacks and solutions for
vehicular ad hoc networks”, IET Communications, pp 894-903, 2009.
[5] Wenshuang Liang, Zhuorong Li, Hongyang Zhang, “Vehicular Ad
Hoc Networks: Architectures, Research Issues, Methodologies,
Challenges, and Trends”, International Journal of Distributed Sensor
Network, Volume: 11 issue: 8, August 2015.
[6] Sabih ur Rehman, M.Arif Khan, Tanveer A., Lihong Zheng,
Vehicular Ad-hoc Networks(VANETs) - An Overview and
Challenges, Journal of Wireless Networking and Communications,
2013.
[7] Bharti Mishra, Priyadarshini Nayak,Subhashee Behera, Security in
Vehicular Adhoc Networks: A Survey, ICCCS '11 Proceedings of the
2011 International Conference on Communication, Computing &
Security, ACM Digital Library, Pages 590-595, February 2011.
[8] Rashmi Mishra, Akhilesh Singh, Rakesh Kumar, VANET Security:
Issues, Challenges, and Solutions, International Conference on
Electrical,
Electronics, and Optimization Techniques (ICEEOT), 24-Nov-2016.
[9] Mohammad Saeed Al-kahtani, Survey on Security Attack in
Vehicular Ad-hoc Networks, 6th International Conference on Signal
Processing and Communication Systems, Dec. 2012.
[10] Vinh Hoa LA, Ana CA VILLI, Security Attacks and Solution In
Vehicular Ad Hoc Networks: A Survey, International Journal on
AdHoc Networking Systems(IJANS), Vol 4, No 2, April 2014.
[11] Cheng-ZhongXu, BinXiao, Detecting Sybil attacks in VANETs,
Journal of Parallel and Distributed Computing, ELSEVIER, Vol 7,
Issue 6, Page 746-756, June 2013.
[12] P Sai Gautham, R Shanmughasundaram, Detection and isolation of
Black Hole in VANET, International Conference on Intelligent
Computing, Instrumentation and Control Technologies (ICICICT), 23
April 2018.
[13] Karlof, C., and Wagner, D. (2003), ‘Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures’, Ad Hoc Networks,
1, 293315.
[14] R. Hussain, H. Oh, On secure and privacy-aware Sybil attack detection
in vehicular communications, Wireless Pers. Commun., 77(4), 2649-
2673, 2014
[15] J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor
networks: analysis & defenses, in Proc. of the Third International
Symposium on Information Processing in Sensor Networks, IPSN
2004, pp. 259268, 2004.
[16] S. Park, B. Aslam, D. Turgut, C.C. Zou, Defense against Sybil attack
in vehicular ad hoc network based on roadside unit support, in Proc.
of Military Communications Conference, 2009.
[17] J. Grover, D. Kumar, M. Sargurunathan, M.S. Gaur and V. Laxmi,
“Performance evaluation and detection of Sybil attacks in vehicular
Ad-Hoc networks” Communications in Computer and Information
Science Vol. 89 CCIS, pp. 473-482, 2010.
[18] H. Lu and J. Li and M. Guizani, “A novel ID-based authentication
framework with adaptive privacy preservation for VANETs,” IEEE
Computing, Communications, and Applications Conference, February
2012.
[19] Lu, R., Security and Privacy Preservation in Vehicular Social
Networks, Doctoral dissertation, University of Waterloo, 2012.
[20] J. T. Isaac, S. Zeadally, J. S. Camara, “Security attacks and solutions
for vehicular ad hoc networks” Communications IET, Vol. 4, No. 7,
894-903, 2010.
[21] S. Chang, Y. Qi, H. Zhu, J. Zhao, X. Shen, “Footprint: detecting Sybil
attacks in urban vehicular networks,” IEEE Transactions on Parallel
and Distributed Systems, Vol. 23, No. 6, 1103-1114, 2012.
[22] R. Xiu-li, Y. Wei, Method of Detecting the Sybil Attack Based on
Ranging in Wireless Sensor Network, 5th International Conference on
Wireless Communications, Networking and Mobile Computing,
WiCom ’09, 1–4, 2009.
[23] ]K.F. Ssu, W.T. Wang, W.C. Chang, Detecting Sybil attacks in
Wireless Sensor Networks using neighboring information, Computer
Networks 53(18), 30423056, 2009.
[24] Raya, M. and Hubaux, J. P. (2007) “Securing vehicular ad hoc
networks”, Journal of Computer Security, 15, pp.39–68.
[25] Muawia Abdelmagid Elsadig, Yahia A. Fadlalla, “VANETs Security
issues and Challenges: A Survey”, Indian Journal of Science and
Technology, Volume 9, Issue 28, July 2016.
[26] Vimal Bibhu, Kumar Roshan, Kumar Balwant Singh, Dhirendra
Kumar Singh, “Performance Analysis of Black Hole Attack in
VANET”, International Journal of Computer Network and
Information Security(IJCNIS), October 2012.
6
... Such attacks have the capability to interrupt the whole system or even manipulate the system's operations to gain ownership. Te classifcation of attackers in VANET is determined by the nature of the attacks executed, as illustrated in Figure 2 [36,37]. ...
Article
Full-text available
The vehicle ad-hoc network (VANET) is a crucial technology that will play a significant role in shaping the future of transition systems, which is widely used as a subset of ad-hoc networks. VANET aims to ensure driver safety by establishing independent communication with nearby vehicles. A key requirement for successful data transmission is cooperation among nodes, as factors such as high mobility, limited radio range, signal fading, and noise lead to packet loss. Security issues in vehicle ad-hoc networks have recently become a major concern. One factor that affects security is the presence of abusive nodes in the network. Like selfish nodes, they are reluctant to share their sources with their neighbors and try to keep their property. The misbehavior of malicious nodes includes dissemination of false traffic information, false location information, and redirection of packets to a wrong path, retransmission of packets, impersonation, so these nodes should be tracked down to ensure the operation of the network. This article provides a complete summary of various research works proposed to detect selfish and malicious nodes and isolate them from honest vehicles. This review article first describes the types of attacks. It then presents the methods proposed by researchers to deal with uncooperative nodes and compares their performance based on parameters such as the number of misbehaving nodes detected, overhead, throughput, layer involved in the attacks.
... The VANET communication architecture is divided into four categories [10]: ...
Article
Full-text available
Vehicular Ad-hoc Network (VANET) is a type of wireless network with Dedicated Short-Range Communication (DSRC) that enables communication between vehicles (V2V) and communication between vehicles to infrastructure around them (V2I). VANET has several security requirements to consider in order to maintain the network functionality. Availability is the most important security requirement due to its responsibility of maintaining the functionality of the network, attack on availability may cause the lack of availability and reduce the efficiency of VANET. One of the attack that threat the availability of VANET is black hole. In this paper, we address the problem of black hole attack in VANET, using Modified Sequence Number (MSN) as a detection method. The simulation is performed using NS-2 as a simulator and AODV as a routing protocol. Detection Rate (DR) and False Alarm Rate (FAR) are used to evaluate the performance of MSN algorithm in detecting black hole attack. Evaluation with variation in the number of CBR packets shows that MSN algorithm successfully detects black hole attacks with DR values reaching 69.0909% at 10 CBR packets and FAR values reaching 0.0037 at 20 CBR packets. We also evaluate the performance of MSN algorithm with variations of node density. The evaluation shows that MSN algorithm successfully detects black hole attack with DR values reaching 100% with a density of 10 and 20 nodes, with the percentage of FAR values reaching 0% in all numbers of node density.
Article
Full-text available
VANET is an emerging technology for intelligent transportation systems in smart cities. Vehicle communication raises many challenges, notably in the fields of communication security and road safety. This paper focuses on one of the security issues of VANETs, which is the gray hole attack. In gray hole attack, messages are dropped randomly, making them difficult to detect in large, dynamic network. The cluster based method to detect and prevent the gray hole attack has been proposed in this paper. Clustering is fast and easy method for detection and reduces the consumption of resources thereby improving the performance of the network. Clustering is an effective approach to deal with this attack by strengthening network security measures and minimizing its impact. In addition to providing security, the suggested technique contributes to enhance network performance in terms of metrics—packet delivery ratio, end-to-end delay, packet loss and throughput. This work has been implemented through NS2 network simulator.
Article
Full-text available
Advanced Driver Assistance Systems (ADAS) are advanced technologies that assist drivers with vehicle operation and navigation. Recent improvements and brisk expansion in the ADAS market, as well as an increase in the frequency of incidents such as sensor spoofing, communication interruption etc., in autonomous vehicles (AVs), have raised the need to research ADAS security technology. The security issues raised by incorporating these technologies into automobiles must be addressed to protect the privacy and safety of passengers and other road users. As a result, the purpose of this research is to investigate the security issues that arise from the integration of ADAS technologies. Addressing these challenges holds the potential to establish a foundation for enhanced safety and dependability within transportation networks amidst the ongoing advancements in vehicle technology. This paper starts by describing the vulnerabilities, threats, assaults, and defense mechanisms of the ADAS. It then delves into the attacks and countermeasures in three categories, namely VANET, Hardware, and Adversarial attacks. VANET attacks encompass threats targeting Vehicular Ad Hoc Networks, aiming to disrupt communication among vehicles or between vehicles and infrastructure. Hardware attacks focus on vulnerabilities within the physical components of ADAS, including sensors, processors, or communication modules. Adversarial attacks involve deliberate manipulations or perturbations introduced into machine learning models or algorithms utilized within ADAS. These attacks aim to deceive or undermine the functionality of AI-based systems, causing misclassification, compromising system integrity, and posing risks to user safety by exploiting vulnerabilities in the AI decision-making process. Finally, this study highlights potential areas for future research, such as the utilization of artificial intelligence (AI), the necessity of industry-wide standardization, and recommends specific future work tailored to each attack described in the corresponding sections.
Article
Full-text available
Vehicular ad hoc networks (VANETs) are used for vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications. They are a special type of mobile ad hoc networks (MANETs) that can share useful information to improve road traffic and safety. In VANETs, vehicles are in�terconnected through a wireless medium, making the network susceptible to various attacks, such as Denial of Service (DoS), Distributed Denial of Service (DDoS), or even black hole attacks that exploit the wireless medium to disrupt the network. These attacks degrade the network perfor�mance of VANETs and prevent legitimate users from accessing resources. VANETs face unique challenges due to the fast mobility of vehicles and dynamic changes in network topology. The high-speed movement of vehicles results in frequent alterations in the network structure, posing difficulties in establishing and maintaining stable communication. Moreover, the dynamic nature of VANETs, with vehicles joining and leaving the network regularly, adds complexity to imple�menting effective security measures. These inherent constraints necessitate the development of robust and efficient solutions tailored to VANETs, ensuring secure and reliable communication in dynamic and rapidly evolving environments. Therefore, securing communication in VANETs is a crucial requirement. Traditional security countermeasures are not pertinent to autonomous vehi�cles. However, many machine learning (ML) technologies are being utilized to classify malicious packet information and a variety of solutions have been suggested to improve security in VANETs. In this paper, we propose an enhanced intrusion detection framework for VANETs that leverages mutual information to select the most relevant features for building an effective model and syn�thetic minority oversampling (SMOTE) to deal with the class imbalance problem. Random Forest (RF) is applied as our classifier, and the proposed method is compared with different ML tech�niques such as logistic regression (LR), K-Nearest Neighbor (KNN), decision tree (DT), and Sup�port Vector Machine (SVM). The model is tested on three datasets, namely ToN-IoT, NSL-KDD, and CICIDS2017, addressing challenges such as missing values, unbalanced data, and categorical values. Our model demonstrated great performance in comparison to other models. It achieved high accuracy, precision, recall, and f1 score, with a 100% accuracy rate on the ToN-IoT dataset and 99.9% on both NSL-KDD and CICIDS2017 datasets. Furthermore, the ROC curve analysis demon�strated our model’s exceptional performance, achieving a 100% AUC score. Keywords: attacks; intrusion detection; machine learning; security; VANET
Article
Full-text available
Vehicular Ad-hoc Networks (VANETs) are sought to control traffic, avoid accidents, and control other aspects of traffic. It (VANET) is a piece of critical infrastructure that bolsters traffic management efficiency and road safety. Nowadays, VANET applications have received a great deal of attention by the research community due to the important role that such networks can play. However, security in VANETs still remains a big challenge due to its nature. This survey paper sheds some light on VANETs’ vulnerabilities and attacks. It surveys and examines some recent security solutions along with their achievements and limitations. As a result, we conclude that security is the key to success for VANET applications, but still some critical challenges remain. Moreover, when designing a sufficient security solution; privacy preservation, productivity, and usability should be taken into account. Therefore, the door for future research is open for a lot more contributions in this filed.
Article
Full-text available
Vehicular ad hoc networks (VANETs) have been quite a hot research area in the last few years. Due to their unique characteristics such as high dynamic topology and predictable mobility, VANETs attract so much attention of both academia and industry. In this paper, we provide an overview of the main aspects of VANETs from a research perspective. This paper starts with the basic architecture of networks, then discusses three popular research issues and general research methods, and ends up with the analysis on challenges and future trends of VANETs.
Article
Full-text available
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services. However, VANETs are themselves vulnerable against attacks that can directly lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as well as updating new attacks and categorizing them into different classes.
Article
Full-text available
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.
Article
Full-text available
Vehicular ad-hoc networks (VANETs) technology has emerged as an important research area over the last few years. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. Along with the benefits, there arise a large number of challenges in VANET such as provisioning of QoS, high connectivity and bandwidth and security to vehicle and individual privacy. This article presents state-of-the-art of VANET and discusses the related issues. Network architecture, signal modeling and propagation mechanism, mobility modeling, routing protocols and network security are discussed in detail. Main findings of this paper are that an efficient and robust VANET is one which satisfies all design parameters such as QoS, minimum latency, low BER and high PDR. Some key research areas and challenges in VANET are presented at the end of the paper.
Book
This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.
Article
Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.
Conference Paper
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.