A Comprehensive Study on VANET Security

  • Conference paper
  • First Online:
Advancements in Smart Computing and Information Security (ASCIS 2023)

Abstract

This study encompasses the following areas: vulnerability analysis, proposition of cryptographic solutions, design of intrusion detection systems, resolution of privacy problems, evaluation of key management, and assessment of overall performance in Vehicular Ad Hoc Networks (VANETs). The research endeavors to shed light on the development of intelligent transportation systems that prioritize efficiency and safety. Vehicular Ad Hoc Networks (VANETs) are playing a vital role in today’s digital age, to make the lives of civilians easier and simpler in every respect. The VANETs focuses on boosting traffic regulation by reducing traffic congestion and monitoring unexpected events. The objective of this study is to ascertain vulnerabilities, assess potential risks, and propose viable remedies with the intention of enhancing the security of VANETs. This paper focuses on key management, performance evaluation, cryptographic solutions, intrusion detection, assurance management, privacy protection, and key management in an effort to shed light on the development of secure, intelligent transportation systems. With respect of delivering route as well as transport security, decreasing congestion bottlenecks, enhancing driving rules and providing entertainment amenities within a car, the VANETs is omnipresent and effective. Everything is online in today’s digital world, so all the automobile companies are ready and equipped to connect their vehicles with information technology systems. VANETs shares important information with vehicles such as traffic guidelines, driving circumstances, and many more. This information is shared within the territory of the vehicle. For sharing this type of intelligence and improving the systematic transmission of data between the vehicles, VANETs came into the picture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 102.71
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 139.09
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sheikh, M.S., Liang, J.: A comprehensive survey on VANET security services in traffic management system. Hindawi Wirel. Commun. Mob. Comput. (2019). https://doi.org/10.1155/2423915

  2. Hasrouny, H., et al.: VANET security challenges and so lutions: a survey. Veh. Commun. (2017). https://doi.org/10.1016/j.vehcom.2017.01.002

  3. Pathak, S., Shrawankar, U.: Secure communication in real time VANET. In: Second International Conferences on Emerging Trends in Engineering and Technology, ICETET-09

    Google Scholar 

  4. Cui, J., Wei, L., et al.: An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. (2018). https://doi.org/10.1109/TITS.2018.2827460

  5. Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380–392 (2014). https://doi.org/10.1016/j.jnca.2013.02.036, ISSN 1084-8045

  6. Sharma, B., Sharma, M.S.P., Tomar, R.S.: A survey: issues and challenges of vehicular Ad Hoc Networks (VANETs). In: International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM-2019), Amity University Rajasthan, Jaipur, pp. 2491–2503, 26–28 February 2019

    Google Scholar 

  7. Mejri, M.N., et al.: Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. (2014). https://doi.org/10.1016/j.vehcom.2014.05.001

  8. Afzal, Z., Kumar, M.: Security of vehicular ad-hoc network (VANET): a survey. In: Third National Conference on Computational Intelligence (NCCI 2019). Journal of Physics: Conference Series, https://doi.org/10.1088/1742-6596/1427/1/012015

  9. Choi, J.Y., Jakobsson, M., Wetzel, S.: Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM International workshop Quality Service Security Wireless Mobile Network, pp.79–87, Quebec, QC, Canada, October 2005

    Google Scholar 

  10. **, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: Enforcing privacy using symmetric random key set in vehicular ad hoc network. In: Proceedings of the 8th international symposium IEEE autonomous Decentralized System (ISADS), pp. 344–351, Sedona, AZ, USA, March 2007

    Google Scholar 

  11. Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)

    Article  Google Scholar 

  12. Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P.-H., Shen, X.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2008)

    Google Scholar 

  13. Rhim, W.: A study on MAC-based efficient message authentication scheme for VANET, M.S. thesis, Hanyang University, Seoul, South Korea (2012)

    Google Scholar 

  14. Taeho, S., Jaeyoon, J., Hyunsung, K., Sung-Won, L.: Enhanced MAC-based efficient message authentication scheme over VANET. In: Proceedings of the 7th International Multi-Conference on Engineering and Technological Innovation, IMETI, pp. 110–113, Orlando, FL, USA, January 2014

    Google Scholar 

  15. Zhang, C., Lin, X., Lu, R., Ho, P., Shen, X.S.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 33573368 (2008)

    Google Scholar 

  16. Chuang, M., Lee, J.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. In: Proceedings of the International Conference on Consumer Electronics, Communications and Networks CECNet, p. 17581761, **an-ning, China, April 2011

    Google Scholar 

  17. Chim, T.W., Yiu, S.M., Hui, L.K., Li, V.K.: Security and privacy issues for inter vehicle communications in VANETs. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Net-works Workshops, p. 13, Rome, Italy, June 2009

    Google Scholar 

  18. Vighnesh, V., Kavita, N., Shalini, R.U., Sampalli, S.: A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications ISWTA-2011, p. 2528, Langkawi, Malaysia, September 2011

    Google Scholar 

  19. He, L., Zhu, W.T.: Mitigating DoS attacks against signature-based authentication in VANETs. In: Proceeding IEEE International Conference on Computer Science and Automation Engineering CSAE-2012, p. 261265, Zhangjiajie, China, May 2012

    Google Scholar 

  20. Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor1, p. 1121, Alexandria, VA, USA, November 2005

    Google Scholar 

  21. Calandriello, G., Papadimitratos, P., Hubaux, J., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28, Montreal, Quebec, Canada, September 2007

    Google Scholar 

  22. Wasef, A., Shen, X.: EMAP: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78–89 (2013)

    Article  Google Scholar 

  23. Eichler, S.: Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility. In: Proceedings of the IEEE Intelligent Vehicle Symposium, pp. 541–546, Istanbul, Turkey, June 2007

    Google Scholar 

  24. Zeng, K.: Pseudonymous PKI for ubiquitous computing. In: Atzeni, A.S., Lioy, A. (eds.) Public Key Infrastructure. EuroPKI 2006. LNCS, vol. 4043, pp. 207–222. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/11774716_17

  25. Schaub, F., Kargl, F., Ma, Z., Weber, M.: V tokens for conditional Pseudonymity in VANETs. In: Proceedings of the IEEE Wireless Communication Networking Conference (WCNC), pp. 1–6, Sydney, Australia, April 2010

    Google Scholar 

  26. Lo, N.W., Tsai, H.-C.: Illusion attack on VANET applications-a message plausibility problem. In: 2007 IEEE GLOBECOM Workshops, Washington, DC, USA, pp. 1–8 (2007)

    Google Scholar 

  27. Grover, J., Gaur, M.S., Laxmi, V., et al.: Detection of incorrect position information using speed and time span verification in VANET. In: Proceedings of the Fifth International Conference on Security of Information and Networks, Jaipur, India, pp. 53–59 (2012)

    Google Scholar 

  28. Ruj, S., Cavenaghi, M.A., Huang, Z., et al.: On data centric misbehavior detection in VANETs. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, pp. 1–5 (2011)

    Google Scholar 

  29. Sedjelmaci, H., Senouci, S.M., Abu-Rgheff, M.A.: An efficient and lightweight intrusion detection mechanism for service-oriented vehicular network. IEEE Internet Things J. 1(6), 570–577 (2014)

    Article  Google Scholar 

  30. Molina-Gil, J., Caballero-Gil, P., Caballero-Gil, C.: Countermeasures to prevent misbehavior in VANETs. J. UCS 18(6), 857–873 (2012)

    Google Scholar 

  31. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad hoc Networks, Philadelphia, PA, USA, pp. 29–37 (2004)

    Google Scholar 

  32. Arshad, M., et al.: Beacon trust management system and fake data detection in vehicular ad- hoc network. IET Intell. Transp. Syst. 13(5), 780–788 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayur J. Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, M.J., Adhiya, K.P. (2024). A Comprehensive Study on VANET Security. In: Rajagopal, S., Popat, K., Meva, D., Bajeja, S. (eds) Advancements in Smart Computing and Information Security. ASCIS 2023. Communications in Computer and Information Science, vol 2039. Springer, Cham. https://doi.org/10.1007/978-3-031-59100-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-59100-6_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-59099-3

  • Online ISBN: 978-3-031-59100-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation