4 research outputs found

    Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks

    Get PDF
    Vehicular Ad-Hoc Network (VANET) is an indispensable part of the Intelligent Transportation System (ITS) due to its abilities to enhance traffic management and safety. Many researchers have been focused on specific areas involving management and storage data, protocols standardization, network fragmentation, monitoring, and quality of service.  The benchmarks of security of VANET are studied and figured out in this paper. VANET provides the driver and passenger with the safety application as well as entertainment service. However, the communication between nodes in VANET is susceptible to security threats in both communication modes, which indicates the main hazard. In this paper, we identified different Man-In-The-Middle (MITM) attacks with various behaviors such as message tampering, message delaying, and message dropping, according to the literature. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of MITM attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for MITM attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the MITM attack in VANET. This review paper could serve as evidence and reference in the development of any new security schemes for VANETs

    Analysis of cyber risk and associated concentration of research (ACR)虏 in the security of vehicular edge clouds

    Get PDF
    Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS. Security has been identified as one of the greatest challenges for the ITS, and security measures require consideration from design to implementation. This work focuses on providing an analysis of cyber risk and associated concentration of research (ACR2). The introduction of ACR2 approach can be used to consider research challenges in VEC and open up further investigation into those threats that are important but under-researched. That is, the approach can identify very high or high risk areas that have a low research concentration. In this way, this research can lay the foundations for the development of further work in securing the future of ITS

    Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review

    Get PDF
    Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development of highly supportive legal and regulatory and testing environments. However, systemic threats to the security and privacy of technologies and lack of data transparency have created a dynamic threat landscape within which the establishment and verification of security and privacy requirements proved to be an arduous task. In CAVs security and privacy issues can affect the resilience of these systems and hinder the safety of the passengers. Existing research efforts have been placed to investigate the security issues in CAVs and propose solutions across the whole spectrum of cyber resilience. This paper examines the state-of-the-art in security and privacy solutions for CAVs. It investigates their integration challenges, drawbacks and efficiencies when coupled with distributed technologies such as Blockchain. It has also listed different cyber-attacks being investigated while designing security and privacy mechanism for CAVs

    Aspectos de seguridad para sistemas de c贸mputo social-inspirados construidos sobre manets

    Get PDF
    the present paper makes a literary review about the present and future advances that are expected in security for Ad hoc networks, furthermore, it exposes the principal features that the security models should have it and how could the social-inspired model TL脰N have it. The Software Defined Network (SDN) are revised and how could they be applied to wireless systems like Ad hoc networks, the article describes the main attacks on an Ad hoc network and how could Through the attributes of security: Confidentiality, Integrity, Availability, resolve some of the main problems of security.El presente art铆culo realiza una revisi贸n literaria sobre el presente y los avances futuros que se esperan en temas relacionados con seguridad inform谩tica para sistemas de c贸mputo basados en MANETs (Mobile Ad hoc Network), adem谩s, expone las principales caracter铆sticas que deber铆an tener los modelos de seguridad y c贸mo se podr铆an aplicar al modelo social-inspirado TL脰N.  Se da una revisi贸n a las redes definidas por software (SDN) y c贸mo se podr铆an aplicar a sistemas inal谩mbricos como las redes Ad hoc, el articulo describe los principales ataques sobre una red Ad hoc y c贸mo mediante los atributos de seguridad: confidencialidad, integridad y disponibilidad, se pueden resolver algunos de los problemas principales de seguridad
    corecore