CFP last date
20 January 2025
Reseach Article

A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs)

by Parul Tyagi, Deepak Dembla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 7
Year of Publication: 2014
Authors: Parul Tyagi, Deepak Dembla
10.5120/15893-5040

Parul Tyagi, Deepak Dembla . A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs). International Journal of Computer Applications. 91, 7 ( April 2014), 22-29. DOI=10.5120/15893-5040

@article{ 10.5120/15893-5040,
author = { Parul Tyagi, Deepak Dembla },
title = { A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs) },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 7 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number7/15893-5040/ },
doi = { 10.5120/15893-5040 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:08.950900+05:30
%A Parul Tyagi
%A Deepak Dembla
%T A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs)
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 7
%P 22-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VANET has turned into an effective area of research, standardization and advancement, because it has impressive potential to raise vehicle and road safety, welfare, as well as convenience to both drivers and passengers and traffic adaptability. A lot of VANET Research work has been centered on particular areas including broadcasting, routing, surveillance and quality of service. The security benchmarks of vehicular Ad hoc network are examined here. Due to the unguarded nature of the VANET system routing protocols, such networks are also unsafe from the malicious mobile nodes in the structure itself. Hence the fundamental objective of vehicular ad hoc networks (VANETs), i. e. , safe transmission of the time critical data, is possible only if a sturdy framework provides this insurance at all times. In this paper, various security protocols for vehicular ad hoc networks and achievement of mechanisms are discussed to give security. In this paper various types of security complications and objections of VANET have been figured out and examined.

References
  1. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.
  2. Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005.
  3. Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
  4. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
  5. J. Kong, X. Hong and M. Gerla, "A new set of passive routing attack in Mobile ad hoc networks", Proc. IEEE Military Communication Conference MILCOM, October 2003.
  6. M. Pirrete and R. Brooks, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence", International Journal of Distributed Sensor Networks, Vol. 2, No. 3, pp 267-287, 2006.
  7. S. Kurosawa and A. Jamalipour, "Detecting Blackhole Attack on AODVbased Mobile Ad Hoc Networks by Dynamic Learning method", International Journal of Network Security, Vol. 5, No. 3, pp 338-345, November 2007.
  8. Soyoung Park, B. Aslam, D. Turgut and C. C. "Defense Against Sybil attack in vehicular ad hoc network" Military Communications Conference, MILCOM,IEEE, 2009, pp. 1-7
  9. Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, in Proceedings of ACM Mobi Com Workshop - WiSe'03,2003.
  10. P. Yi, Z. Dai, Y. Zhong and S. Zhang, "Resisting Flooding Attack in Ad Hoc Networks", Proc. IEEE International Conference on Information Technology Coding & Computing ITCC, April 2005.
  11. Yi Qian; Moayeri, N. 2008. Design of Secure and Application-Oriented VANETs. Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, vol. , no. , pp. 2794-2799, 11-14 May 2008.
  12. Ching-Hung Yeh, Yueh-Min Huang, Tzone-I Wang, Hsiao- Hwa Chen. 2009. DESCV - A Secure Wireless Communication Scheme for Vehicle ad hoc Networking. MONET. Published in Journal Mobile Networks and Applications, Volume 14, Issue 5, pp. 611-624, October 2009.
  13. Gosman, C. ; Dobre, C. ; Cristea, V. 2010. A Security Protocol for Vehicular Distributed Systems. Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010 12th International Symposium on, vol. , no. , pp. 321- 327, 23-26 Sept. 2010.
  14. Rawat, D. B. ; Bista, B. B. ; Yan, G. ; Weigle, M. C. 2011. Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach. Complex, Intelligent and Software Intensive Systems (CISIS), 2011 International Conference on, vol. , no. , pp. 146-151, June 30 2011-July 2 2011.
  15. P. Papadimitratos et al. , "Secure vehicular communication systems: design and architecture, IEEE Communications Magazine, vol. 46, no. 11, pp. :100–109, Nov. 2008.
  16. P. Yi et al. , "Resisting Flooding Attack in Ad Hoc Networks", Proc. IEEE Int. Conf. on Information Tech. Coding & Computing (ITCC), April 2005.
  17. Q, Wu et al. , "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications", IEEE Transactions on Vehicular Technology, vol. 59, no. 2, pp. 559-573, 2010.
  18. R. Mehmood and M. Nekovee, "Vehicular Ad hoc and Grid Networks: Discussion, Design and Evaluation", Proc. 14th World Congress on Intelligent Transport Sys. , pp. 8-21, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

VANET MANET Security Broadcasting Routing