21 research outputs found

    A Review on Security Attacks in Vehicular Ad hoc Network

    Get PDF
    Whenever a communication takes place between two or more vehicles there has been a need for protection. The attacker can gain access to the network by compromising either the vehicle or road side unit or the communication medium that transfers the messages between vehicles. Vehicular Ad hoc Network (VANET) have motivated the interest towards the passenger comfort and secure driving environment. However, the open-wide communication becomes a tedious challenge for VANET organization. Because of the wireless self-structured background, VANET are prone to many attackers. In this paper, we are focusing on security issues like DoS, Sybil, DDoS, jamming and flooding attacks as well as techniques like TESLA which causes harm to VANET and also security countermeasures like digital signature which are used to prevent the mentioned security issues that alleviate VANET

    Towards a comparable evaluation for VANET protocols: NS-2 experiments builder assistant and extensible test bed

    Get PDF
    Proceedings of: 9th Embedded Security in Cars Conference (ESCAR 2011), November 9 to 10, 2011, Dresden, GermanyIn order to validate an Intelligent Transportation System (ITS) application or service, simulation techniques are usually employed. Nowadays, there are two problems associated to this kind of validation: the relative complexity of existing simulators and the lack of common criteria in the creation of simulation experiments. The first one makes it hard for users not familiar with a simulation tool to create and execute comprehensive experiments. The second one leads to a situation in which different proposals are validated in different scenarios, thus making it difficult to compare their performance. This work contributes on addressing both problems by proposing VanSimFM, an open-source assistant tool for creating NS-2 simulation experiments, and by defining an extensible test bed which contains a set of simulation scenarios. The test bed is intended to represent the different situations that may be found in a real vehicular environment.This work is partially supported by Ministerio de Ciencia e Innovacion of Spain, project E-SAVE, under grant TIN2009-13461.No publicad

    Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)

    Get PDF
    As the application of computer technology continues to proliferate and diversify, vehicles are becoming increasingly intelligent and it is expected that in the near future they will be equipped with radio interfaces for short range communications. This will enable the formation of vehicular networks, commonly referred to as VANETs, an instance of mobile ad hoc networks with vehicles as mobile nodes. Vehicular networks are receiving a lot of attention due to the wide variety of services they can provide and are likely to be deployed commercially in coming years. Security is a fundamental issue because such networks will provide the necessary infrastructure for various applications that can help improve the safety of road traffic. Effective security of vehicular ad hoc network is an ill-defined problem as most existing security mechanisms available for VANET do not combine efficiency, security and traceability. They tend to score well in one or two qualities, but not all three because of the potential contradictions between some of their attributes. In this paper, we give an overview of VANETs and the security challenges related to their deployment. We identify and analyse current security limitations, then an effort is made to show that efficiency, security and traceability are the key qualities to consider while implementing an effective security mechanism. Therefore the most suitable way to achieve this goal is by identifying the intersection point connecting their attributes. © 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other work

    Secure Authentication and Privacy-Preserving Techniques in Vehicular Ad-hoc NETworks (VANETs)

    Get PDF
    In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that need to be thoroughly addressed and solved for the widespread adoption/deployment of VANETs. Given the importance of these issues, researchers have spent a lot of effort in these areas over the last decade. We present an overview of the following issues that arise in VANETs: privacy, authentication, and secure message dissemination. Then we present a comprehensive review of various solutions proposed in the last 10 years which address these issues. Our survey sheds light on some open issues that need to be addressed in the future

    5G-based V2V broadcast communications: A security perspective

    Get PDF
    The V2V services have been specified by the 3GPP standards body to support road safety and non-safety applications in the 5G cellular networks. It is expected to use the direct link (known as the PC5 interface), as well as the new radio interface in 5G, to provide a connectivity platform among vehicles. Particularly, vehicles will use the PC5 interface to broadcast safety messages to inform each other about potential hazards on the road. In order to function safely, robust security mechanisms are needed to ensure the authenticity of received messages and trustworthiness of message senders. These mechanisms must neither add significantly to message latency nor affect the performance of safety applications. The existing 5G-V2V standard allow protection of V2V messages to be handled by higher layer security solutions defined by other standards in the ITS domain. However having a security solution at the 5G access layer is conceivably preferable in order to ensure system compatibility and reduce deployment cost. Accordingly, the main aim of this paper is to review options for 3GPP access layer security in future 5G-V2V releases. Initially, a summary of 5G-V2V communications and corresponding service requirements is presented. An overview of the application level security standards is also given, followed by a review of the impending options to secure V2V broadcast messages at the 5G access layer. Finally, paper presents the relevant open issues and challenges on providing 3GPP access layer security solution for direct V2V communication

    A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET

    Get PDF
    Security and privacy are the most important concerns related to vehicular ad hoc network (VANET), as it is an open-access and self-organized network. The presence of ‘selfish’ nodes distributed in the network are taken into account as an important challenge and as a security threat in VANET. A selfish node is a legitimate vehicle node which tries to achieve the most benefit from the network by broadcasting wrong information. An efficient and proper security model can be useful to tackle advances from attackers, as well as selfish nodes. In this study, a privacy-preserving node and message authentication scheme, along with a trust model was developed. The proposed node authentication ensures the legitimacy of the vehicle nodes, whereas the message authentication was developed to ensure the message's integrity. To deal with selfish nodes, an experience-based trust model was also designed. Additionally, to fulfill the privacy-preserving aspect, the mapping of each vehicle was performed using a different pseudo-identity. In this paper, fog nodes instead of road-side units (RSUs), were distributed along the roadside. This was mainly because of the fact that fog computing reduces latency, and results in increased throughput. Security analysis indicated that our scheme met the VANETs' security requirements. In addition, the performance analysis showed that the proposed scheme had a lower communication and computation overhead, compared to the other related works. Monte-Carlo simulation results were applied to estimate the false-positive rates (FPR), which also proved the validity of the proposed security scheme
    corecore