Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead

Author(s):  
M. A. Razzaque ◽  
Ahmad Salehi S. ◽  
Seyed M. Cheraghi
Author(s):  
Mekelleche Fatiha ◽  
Haffaf Hafid

Vehicular Ad-Hoc Networks (VANETs), a new mobile ad-hoc network technology (MANET), are currently receiving increased attention from manufacturers and researchers. They consist of several mobile vehicles (intelligent vehicles) that can communicate with each other (inter-vehicle communication) or with fixed road equipment (vehicle-infrastructure communication) adopting new wireless communication technologies. The objective of these networks is to improve road safety by warning motorists of any event on the road (accidents, hazards, possible deviations, etc.), and make the time spent on the road more pleasant and less boring (applications deployed to ensure the comfort of the passengers). Practically, VANETs are designed to support the development of Intelligent Transportation Systems (ITS). The latter are seen as one of the technical solutions to transport challenges. This chapter, given the importance of road safety in the majority of developed countries, presents a comprehensive study on the VANET networks, highlighting their main features.


2017 ◽  
Vol 63 (3) ◽  
pp. 309-313 ◽  
Author(s):  
C. Suganthi Evangeline ◽  
S. Appu

Abstract A special type of Mobile Ad-hoc Networks (MANETs) which has frequent changes of topology and higher mobility is known as Vehicular Ad-hoc Networks (VANETs). In order to divide the network into groups of mobile vehicles and improve routing, data gathering, clustering is applied in VANETs. A stable clustering scheme based on adaptive multiple metric combining both the features of static and dynamic clustering methods is proposed in this work. Based on a new multiple metric method, a cluster head is selected among the cluster members which is taken from the mobility metrics such as position and time to leave the road segment, relative speed and Quality of Service metrics which includes neighborhood degree, link quality of the RSU and bandwidth. A higher QoS and cluster stability are achieved through the adaptive multiple metric. The results are simulated using NS2 and shows that this technique provides more stable cluster structured with the other methods.


2012 ◽  
Vol 8 (2) ◽  
pp. 153-172 ◽  
Author(s):  
Hajar Mousannif ◽  
Ismail Khalil ◽  
Stephan Olariu

The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET), specializing from the well-known Mobile Ad Hoc Networks (MANET) to Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) wireless communications. While the original motivation for Vehicular Networks was to promote traffic safety, recently it has become increasingly obvious that Vehicular Networks open new vistas for Internet access, providing weather or road condition, parking availability, distributed gaming, and advertisement. In previous papers [27,28], we introduced Cooperation as a Service (CaaS); a new service-oriented solution which enables improved and new services for the road users and an optimized use of the road network through vehicle's cooperation and vehicle-to-vehicle communications. The current paper is an extension of the first ones; it describes an improved version of CaaS and provides its full implementation details and simulation results. CaaS structures the network into clusters, and uses Content Based Routing (CBR) for intra-cluster communications and DTN (Delay–and disruption-Tolerant Network) routing for inter-cluster communications. To show the feasibility of our approach, we implemented and tested CaaS using Opnet modeler software package. Simulation results prove the correctness of our protocol and indicate that CaaS achieves higher performance as compared to an Epidemic approach.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4253
Author(s):  
Xiaoqiang Sun ◽  
F. Richard Yu ◽  
Peng Zhang ◽  
Weixin Xie ◽  
Xiang Peng

In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly. Because homomorphic encryption supports computations of the ciphertext, it can completely solve this problem. In this paper, we provide a comprehensive survey of secure computation based on homomorphic encryption in VANETs. We first describe the related definitions and the current state of homomorphic encryption. Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. Then, we describe the state of the art of secure basic operations, data aggregation, data query and other data computation in VANETs. Finally, several challenges and open issues are discussed for future research.


Author(s):  
Pietro Manzoni ◽  
Carlos T. Calafate ◽  
Juan-Carlos Cano ◽  
Antonio Skarmeta ◽  
Vittoria Gianuzzi

Vehicular Ad hoc NETworks (VANETs) is an area under intensive research that promises to improve security on the road by developing an intelligent transport system (ITS). The main purpose is to create an inter-communication network among vehicles, as well as between vehicles and the supporting infrastructure. The system pretends to offer drivers data concerning other nearby vehicles, especially those within sight. The problem of information sharing among vehicles and between the vehicle and the infrastructure is another critical aspect. A general communication infrastructure is required for the notification, storage, management, and provision of context-aware information about user travel. Ideally an integrated vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication paradigm enriched with an information management system would solve the problem. The infrastructure should manage all the collected safety events garnered from vehicles and the interesting information to be provided to the user, which is adapted to the car context and driver preferences. Finally, security issues should be considered. Since the information conveyed over a vehicular network may affect critical decisions, fail-safe security is a necessity. The first directive for any V2V communication scheme is, therefore, that every safety message must be authenticated. Because of the high speed and therefore short duration within which communication between two cars is possible, communication must be non-interactive, and message overhead must be very low. The urgency of safety messages implies that authentication must be instantaneous without additional communication. Moreover, providing strong security in vehicular networks raises important privacy concerns that must also be considered. Safety messages include data that is dangerous to the personal privacy of vehicle owners. Most relevant is the danger of tracking a vehicle through positional information. A set of security basics to address these challenges should be proposed that can be used as the building blocks of secure applications. In this article we will focus on the aforementioned technologies and engineering issues related to vehicular ad-hoc networks, emphasizing the challenges that must be overcome to accomplish the desired vehicular safety infrastructure.


2019 ◽  
Vol 24 (5) ◽  
pp. 575-584 ◽  
Author(s):  
Jinhui Liu ◽  
Yong Yu ◽  
Jianwei Jia ◽  
Shijia Wang ◽  
Peiru Fan ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2900
Author(s):  
Thokozani Felix Vallent ◽  
Damien Hanyurwimfura ◽  
Chomora Mikeka

Vehicular Ad hoc networks (VANETs) as spontaneous wireless communication technology of vehicles has a wide range of applications like road safety, navigation and other electric car technologies, however its practicability is greatly hampered by cyber-attacks. Due to message broadcasting in an open environment during communication, VANETs are inherently vulnerable to security and privacy attacks. However to address the cyber-security issues with optimal computation overhead is a matter of current security research challenge. So this paper designs a secure and efficient certificate-less aggregate scheme (ECLAS) for VANETs applicable in a smart grid scenario. The proposed scheme is based on elliptic curve cryptography to provide conditional privacy-preservation by incorporating usage of time validated pseudo-identification for communicating vehicles besides sorting out the KGC (Key Generation Center) escrow problem. The proposed scheme is comparatively more efficient to relevant related research work because it precludes expensive computation operations likes bilinear pairings as shown by the performance evaluation. Similarly, communication cost is within the ideal range to most related works while considering the security requirements of VANETs system applicable in a smart grid environment.


Author(s):  
Kishor N. Tayade, Et. al.

Vehicular Ad hoc Networks is a promising sub-group of MANET. VANET is deployed on the highways, where the vehicles are mobile nodes. Safety and intelligent transportation are important VANET applications that require appropriate communication among vehicles, in particular routing technology. VANETs generally inherit their common features from MANETs where vehicles operate in a collaborative and dispersed way for promoting contact among vehicles and with network infrastructure like the Road Side Units (RSU) for enhanced traffic experience. In view of the fast growth of Intelligent Transportation Systems (ITS), VANETs has attracted considerable interest in this decade. VANET suffer from a major problem of link failure due to dynamic mobility of vehicles. In this paper we proposed a position based routing algorithm to identify stable path, this will improve the routing by decreasing overhead and interrupting the number of links. Link Expiration Time (LET) is used to provide the stable link, the link with the longest LET is considered as the most stable link. The multicast Ad-hoc On-demand Distance Vector (MAODV) is proposed to avoid the link breakages by using a link with longest LET.  Data loss is reduced by avoiding link breakages and enhance throughput by reducing the communication delay.


Sign in / Sign up

Export Citation Format

Share Document