Loading [MathJax]/extensions/MathMenu.js
Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation | IEEE Conference Publication | IEEE Xplore

Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation


Abstract:

The state-of-the-art improvements in cellular communication and ubiquitous availability of internet have led to significant breakthroughs in intelligent transportation sy...Show More

Abstract:

The state-of-the-art improvements in cellular communication and ubiquitous availability of internet have led to significant breakthroughs in intelligent transportation systems where connectivity, autonomous driving and infotainment play a pivotal role in the enhanced driving experience. The Vehicle ad hoc Networks (VANET) have emerged as a distinguished branch of wireless communication pertaining to transportation systems. VANET is intended to dispense on-road vehicle safety and to boost the comfort experienced by drivers, passengers and other commuters. Whereas VANET offers exciting applications and explores unfamiliar dimensions in transportation, concerns regarding VANET security also continue to intensify. Security of vehicular networks, the authenticity and integrity of data dissemination remains a concern of utmost significance in VANET deployment. VANET architecture, by virtue of an abundance of networked vehicles, is susceptible to illegal use, unauthorized access, protocol tunneling, eavesdropping, and denial-of-service as the vehicles are unknowingly exposed to illegitimate information from unidentified adversaries. This paper investigates the security aspects of VANET and the attacks and vulnerabilities the VANET architecture is prone to. The study of security features and flaws is expected to lead to developed broadcasting and routing services, adding to the quality-of-service. Due to mobility of vehicles, large scale networks, rapidly restructuring nodes and frequently changing topological structure; a fundamental requirement of VANETs is to ensure safe transmission of the time critical data. The paper examines various security threats in VANETs, analyses how they are implemented and their impact on the VANET security architecture. A few gaps in the VANET security frameworks have also been highlighted which can be worked upon in the future.
Date of Conference: 24-27 September 2014
Date Added to IEEE Xplore: 01 December 2014
ISBN Information:
Conference Location: Delhi, India
References is not available for this document.

I. Introduction

Regardless of a striking operational life of over 40 years, the existence and applications of internet and cyberinfrastructure still continue to evolve. More than ever before, the internet and wireless communication has affected our lives by opening countless possibilities and opportunities [1]. The recent trend in interdisciplinary research has been to embed everyday objects with computers and communication capabilities [2]. Of late, data transfer and information processing has emerged as a widespread phenomenon, permeating almost every type of object. One such category of communication capable smart devices is intelligent vehicles, intelligent transportation systems (ITS) and communication capable roadside infrastructure. These smart vehicles function based on the principles of Vehicle ad hoc Networks (VANET), which is essentially a computer-to-computer network where mobile nodes, i.e. vehicles, behaving as computers, connect directly to each other, rather than to a server or hub. The vehicles themselves form a temporary network, and the participating vehicles also serve as a wireless router, acting over an approximate range of 100–300 meters of each other. As the nodes are mobile, they continuously fall out of the signal range and drop out of a particular network, join in a neighboring network, connecting vehicles to one another thus maintaining a mobile internet [3]. The VANET architecture is also extended to road side infrastructure, known as InfoStations (IS) and Road Side Units (RSU) as depicted in figure 1. As vehicles tend to move in an organized fashion, therefore the interactions with RSU is also characterized fairly accurately. VANETs have succeeded in addressing a number of today's traffic challenges and enable drivers to have better awareness of their driving environment and take timely and evasive actions in response to abnormal situations. VANETs lend a valuable contribution to solve many traffic and road-safety problems and in the recent years, the road transportation system with the help of VANET is being evolved into a safer and efficient establishment [4].

Select All
1.
A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, et al., "Attacks on inter vehicle communication systems - an analysis", 3 rd International Workshop on Intelligent Transportation , 2006.
2.
A. Weimerskirch et al., "Data security in vehicular communication networks", pp. 309-320.
3.
B. Aslam and D. Turgut, "Defense Against Sybil attack in vehicular ad hoc networks", IEEE Military Communications Conference MILCOM, pp. 1-7, 2009.
4.
B. Parno and A. Perrig, "Challenges in Securing Vehicular Networks", Proc. Workshop on Hot Topics in Networks (HotNets-IV)2005.
5.
C. Laurendeau and M. Barbeau, "Threats to security in DSRC/WAVE", In 5 th Int. Conf. ADHOC-NOW , 2006.
6.
C. Marco, "Body Personal and Local Ad Hoc Wireless Networks", The Handbook of Ad Hoc Wireless Networks, 2003.
7.
F. Kargl et al., "Secure vehicular communication systems: Implementation performance and research challenges", IEEE Comm. Magazine, vol. 46, no. 11, pp. 110-118, Nov. 2008.
8.
G. Karagiannis et al., "Vehicular Networking: A Survey and Tutorial on Requirements Architectures Challenges Standards and Solutions", In IEEE Communications Surveys & Tutorials, pp. 584-616, 2011.
9.
H. Lu, J. Li and M. Guizani, "A novel ID-based authentication framework with adaptive privacy preservation for VANET", In IEEE Computing Communications and Applications Conf. (ComComAp), pp. 345-350, 2012.
10.
I. Aad, J.P. Hubaux and E.W. Knightly, "Impact of Denial of Service attacks on Ad Hoc Networks", IEEE/ACM Transactions on Networking, pp. 16-24, 2008.
11.
J. Cheambe, J. Tchouto and M. Gerlach, "Security in Active Safety Applications", 2 nd International workshop on Intelligent Transportation (WIT) , 2005.
12.
J. Hubaux, S. Hapkun and J. Luo, "The Security and Privacy of Smart Vehicles", Magazine of IEEE Security and Privacy, June 2004.
13.
J. Liu et al., "Privacy-Preserving Quick Authentication in Fast Roaming Networks", Proc. 31 st IEEE conference on Local Computer Networks , pp. 975-982, 2006.
14.
J. Sun et al., "An Identity-Based Security System for User Privacy in VANETs", IEEE Trans.on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, 2010.
15.
K. Plößl, T. Nowey and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks", Proc. First Int. Conf. on Availability Reliability and Security (ARES '06), 2006.
16.
K.C. Lee and M. Gerla, "Survey of Routing Protocols in Vehicular Ad Hoc Networks", In Car2Car communication consortium, 2010.
17.
Parul Tyagi and Deepak Dembla, "A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs)" in International Journal of Computer Applications, New York, USA:Foundation of Computer Science, vol. 91, no. 7, pp. 22-29, April 2014.
18.
M. Raya and J.P. Hubaux, "The security of VANETs", In Proceedings of the 2 nd ACM International Workshop on Vehicular Ad Hoc Networks 2005 .
19.
M. Raya et al., "On data-centric trust establishment in ephemeral ad hoc networks", In IEEE Conf. on Computer Communications, pp. 1238-1246, 2008.
20.
M. Raya, P. Papadimitratos and J.P. Hubaux, "Securing vehicular communications", IEEE Wireless Communications Magazine, vol. 13, no. 5, pp. 8-15, 2006.
21.
A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton and T. Razafindralambo, "A survey on facilities for experimental Internet of Things research", IEEE Communications Magazine, vol. 49, pp. 58-67, 2011.

Contact IEEE to Subscribe

References

References is not available for this document.