Abstract
This study encompasses the following areas: vulnerability analysis, proposition of cryptographic solutions, design of intrusion detection systems, resolution of privacy problems, evaluation of key management, and assessment of overall performance in Vehicular Ad Hoc Networks (VANETs). The research endeavors to shed light on the development of intelligent transportation systems that prioritize efficiency and safety. Vehicular Ad Hoc Networks (VANETs) are playing a vital role in today’s digital age, to make the lives of civilians easier and simpler in every respect. The VANETs focuses on boosting traffic regulation by reducing traffic congestion and monitoring unexpected events. The objective of this study is to ascertain vulnerabilities, assess potential risks, and propose viable remedies with the intention of enhancing the security of VANETs. This paper focuses on key management, performance evaluation, cryptographic solutions, intrusion detection, assurance management, privacy protection, and key management in an effort to shed light on the development of secure, intelligent transportation systems. With respect of delivering route as well as transport security, decreasing congestion bottlenecks, enhancing driving rules and providing entertainment amenities within a car, the VANETs is omnipresent and effective. Everything is online in today’s digital world, so all the automobile companies are ready and equipped to connect their vehicles with information technology systems. VANETs shares important information with vehicles such as traffic guidelines, driving circumstances, and many more. This information is shared within the territory of the vehicle. For sharing this type of intelligence and improving the systematic transmission of data between the vehicles, VANETs came into the picture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sheikh, M.S., Liang, J.: A comprehensive survey on VANET security services in traffic management system. Hindawi Wirel. Commun. Mob. Comput. (2019). https://doi.org/10.1155/2423915
Hasrouny, H., et al.: VANET security challenges and so lutions: a survey. Veh. Commun. (2017). https://doi.org/10.1016/j.vehcom.2017.01.002
Pathak, S., Shrawankar, U.: Secure communication in real time VANET. In: Second International Conferences on Emerging Trends in Engineering and Technology, ICETET-09
Cui, J., Wei, L., et al.: An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. (2018). https://doi.org/10.1109/TITS.2018.2827460
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380–392 (2014). https://doi.org/10.1016/j.jnca.2013.02.036, ISSN 1084-8045
Sharma, B., Sharma, M.S.P., Tomar, R.S.: A survey: issues and challenges of vehicular Ad Hoc Networks (VANETs). In: International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM-2019), Amity University Rajasthan, Jaipur, pp. 2491–2503, 26–28 February 2019
Mejri, M.N., et al.: Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. (2014). https://doi.org/10.1016/j.vehcom.2014.05.001
Afzal, Z., Kumar, M.: Security of vehicular ad-hoc network (VANET): a survey. In: Third National Conference on Computational Intelligence (NCCI 2019). Journal of Physics: Conference Series, https://doi.org/10.1088/1742-6596/1427/1/012015
Choi, J.Y., Jakobsson, M., Wetzel, S.: Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM International workshop Quality Service Security Wireless Mobile Network, pp.79–87, Quebec, QC, Canada, October 2005
**, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: Enforcing privacy using symmetric random key set in vehicular ad hoc network. In: Proceedings of the 8th international symposium IEEE autonomous Decentralized System (ISADS), pp. 344–351, Sedona, AZ, USA, March 2007
Vijayakumar, P., Azees, M., Kannan, A., Deborah, L.J.: Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1015–1028 (2016)
Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P.-H., Shen, X.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2008)
Rhim, W.: A study on MAC-based efficient message authentication scheme for VANET, M.S. thesis, Hanyang University, Seoul, South Korea (2012)
Taeho, S., Jaeyoon, J., Hyunsung, K., Sung-Won, L.: Enhanced MAC-based efficient message authentication scheme over VANET. In: Proceedings of the 7th International Multi-Conference on Engineering and Technological Innovation, IMETI, pp. 110–113, Orlando, FL, USA, January 2014
Zhang, C., Lin, X., Lu, R., Ho, P., Shen, X.S.: An efficient message authentication scheme for vehicular communications. IEEE Trans. Veh. Technol. 57(6), 33573368 (2008)
Chuang, M., Lee, J.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. In: Proceedings of the International Conference on Consumer Electronics, Communications and Networks CECNet, p. 17581761, **an-ning, China, April 2011
Chim, T.W., Yiu, S.M., Hui, L.K., Li, V.K.: Security and privacy issues for inter vehicle communications in VANETs. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Net-works Workshops, p. 13, Rome, Italy, June 2009
Vighnesh, V., Kavita, N., Shalini, R.U., Sampalli, S.: A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks. In: Proceedings of the IEEE Symposium on Wireless Technology and Applications ISWTA-2011, p. 2528, Langkawi, Malaysia, September 2011
He, L., Zhu, W.T.: Mitigating DoS attacks against signature-based authentication in VANETs. In: Proceeding IEEE International Conference on Computer Science and Automation Engineering CSAE-2012, p. 261265, Zhangjiajie, China, May 2012
Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor1, p. 1121, Alexandria, VA, USA, November 2005
Calandriello, G., Papadimitratos, P., Hubaux, J., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28, Montreal, Quebec, Canada, September 2007
Wasef, A., Shen, X.: EMAP: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78–89 (2013)
Eichler, S.: Strategies for pseudonym changes in vehicular ad hoc networks depending on node mobility. In: Proceedings of the IEEE Intelligent Vehicle Symposium, pp. 541–546, Istanbul, Turkey, June 2007
Zeng, K.: Pseudonymous PKI for ubiquitous computing. In: Atzeni, A.S., Lioy, A. (eds.) Public Key Infrastructure. EuroPKI 2006. LNCS, vol. 4043, pp. 207–222. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/11774716_17
Schaub, F., Kargl, F., Ma, Z., Weber, M.: V tokens for conditional Pseudonymity in VANETs. In: Proceedings of the IEEE Wireless Communication Networking Conference (WCNC), pp. 1–6, Sydney, Australia, April 2010
Lo, N.W., Tsai, H.-C.: Illusion attack on VANET applications-a message plausibility problem. In: 2007 IEEE GLOBECOM Workshops, Washington, DC, USA, pp. 1–8 (2007)
Grover, J., Gaur, M.S., Laxmi, V., et al.: Detection of incorrect position information using speed and time span verification in VANET. In: Proceedings of the Fifth International Conference on Security of Information and Networks, Jaipur, India, pp. 53–59 (2012)
Ruj, S., Cavenaghi, M.A., Huang, Z., et al.: On data centric misbehavior detection in VANETs. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, pp. 1–5 (2011)
Sedjelmaci, H., Senouci, S.M., Abu-Rgheff, M.A.: An efficient and lightweight intrusion detection mechanism for service-oriented vehicular network. IEEE Internet Things J. 1(6), 570–577 (2014)
Molina-Gil, J., Caballero-Gil, P., Caballero-Gil, C.: Countermeasures to prevent misbehavior in VANETs. J. UCS 18(6), 857–873 (2012)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad hoc Networks, Philadelphia, PA, USA, pp. 29–37 (2004)
Arshad, M., et al.: Beacon trust management system and fake data detection in vehicular ad- hoc network. IET Intell. Transp. Syst. 13(5), 780–788 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Patil, M.J., Adhiya, K.P. (2024). A Comprehensive Study on VANET Security. In: Rajagopal, S., Popat, K., Meva, D., Bajeja, S. (eds) Advancements in Smart Computing and Information Security. ASCIS 2023. Communications in Computer and Information Science, vol 2039. Springer, Cham. https://doi.org/10.1007/978-3-031-59100-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-59100-6_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-59099-3
Online ISBN: 978-3-031-59100-6
eBook Packages: Computer ScienceComputer Science (R0)