923 research outputs found
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent
Transportation Systems (ITS) by facilitating communication between vehicles and
infrastructure. This communication aims to enhance road safety, improve traffic
efficiency, and enhance passenger comfort. The secure and reliable exchange of
information is paramount to ensure the integrity and confidentiality of data,
while the authentication of vehicles and messages is essential to prevent
unauthorized access and malicious activities. This survey paper presents a
comprehensive analysis of existing authentication mechanisms proposed for
cluster-based VANETs. The strengths, weaknesses, and suitability of these
mechanisms for various scenarios are carefully examined. Additionally, the
integration of secure key management techniques is discussed to enhance the
overall authentication process. Cluster-based VANETs are formed by dividing the
network into smaller groups or clusters, with designated cluster heads
comprising one or more vehicles. Furthermore, this paper identifies gaps in the
existing literature through an exploration of previous surveys. Several schemes
based on different methods are critically evaluated, considering factors such
as throughput, detection rate, security, packet delivery ratio, and end-to-end
delay. To provide optimal solutions for authentication in cluster-based VANETs,
this paper highlights AI- and ML-based routing-based schemes. These approaches
leverage artificial intelligence and machine learning techniques to enhance
authentication within the cluster-based VANET network. Finally, this paper
explores the open research challenges that exist in the realm of authentication
for cluster-based Vehicular Adhoc Networks, shedding light on areas that
require further investigation and development
A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing
In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to secure integrity and reliability of applications. In general, trust and reliability help vehicles to collect correct and credible information from surrounding vehicles. On top of that, a secure trust model can deal with uncertainties and risk taking from unreliable information in vehicular environments. However, inaccurate, incomplete, and imprecise information collected by vehicles as well as movable/immovable obstacles have interrupting effects on VANET. In this paper, a fuzzy trust model based on experience and plausibility is proposed to secure the vehicular network. The proposed trust model executes a series of security checks to ensure the correctness of the information received from authorized vehicles. Moreover, fog nodes are adopted as a facility to evaluate the level of accuracy of event's location. The analyses show that the proposed solution not only detects malicious attackers and faulty nodes, but also overcomes the uncertainty and imprecision of data in vehicular networks in both line of sight and non-line of sight environments
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has
begun and many research challenges still need to be addressed. Location privacy
continues to be in the top of these challenges. Indeed, both of academia and
industry agreed to apply the pseudonym changing approach as a solution to
protect the location privacy of VANETs'users. However, due to the pseudonyms
linking attack, a simple changing of pseudonym shown to be inefficient to
provide the required protection. For this reason, many pseudonym changing
strategies have been suggested to provide an effective pseudonym changing.
Unfortunately, the development of an effective pseudonym changing strategy for
VANETs is still an open issue. In this paper, we present a comprehensive survey
and classification of pseudonym changing strategies. We then discuss and
compare them with respect to some relevant criteria. Finally, we highlight some
current researches, and open issues and give some future directions
- …