DOI QR코드

DOI QR Code

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan (DIT, Loyola ICAM College of Engineering and Technology) ;
  • Arockia, Xavier Annie R. (DCSE, Anna University)
  • Received : 2021.06.05
  • Published : 2021.06.30

Abstract

VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Keywords

References

  1. Shan C, Yong Qi, Hongzi Zhu,Jizhong Zhao,and Xuemin (Sherman) Shen,"Footprint: Detecting Sybil Attacks in Urban Vehicular Networks",, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 6, June 2012.
  2. Bo Yua, Cheng-Zhong Xu, Bin Xiao, "Detecting Sybil attacks in VANETs", February 2013, J. Parallel Distrib. Comput. 73 (2013) 746-756 https://doi.org/10.1016/j.jpdc.2013.02.001
  3. Kenza Mekliche, Dept. of Computer Science, USTHB Algiers, Algeria Samira Moussaoui, Dept. of Computer Science, USTHB Algiers, Algeria, 2013, "L-P2DSA: Location-based privacy-preserving detection of Sybil attacks", 11th International Symposium on Programming and Systems (ISPS).
  4. Rakesh Shrestha, Dept. of Information and Communication Engineering Yeungnam University, Korea, Sirojiddin Djuraev Dept. of Information and Communication Engineering Yeungnam University, Korea, Seung Yeob Nam, Dept. of Information and Communication Engineering Yeungnam University, Korea, 2014, "Sybil Attack Detection in Vehicular Network-based on Received Signal Strength", International Conference on Connected Vehicles and Expo (ICCVE).
  5. Khaled Rabieh, Mohamed M. E. A. Mahmoud, Terry N. Guo, and Mohamed Younis, 2015, "Cross-Layer Scheme for Detecting Large-scale Colluding Sybil Attack in VANETs", IEEE International Conference on Communications (ICC).
  6. D. Srinivas Reddy, V. Bapuji, A. Govardhan, S S V N Sarma, "Sybil Attack Detection Technique Using Session Key Certificate in Vehicular Ad Hoc Networks", 2017 International Conference on Algorithms, Methodology, Models, and Applications in Emerging Technologies (ICAMMAET), December 2017.
  7. C.Zhang, Kangqiang Chen, Xin Zeng, and Xiaoping Xue, "Misbehavior Detection Based on Support Vector Machine and Dempster-Shafer Theory of Evidence in VANETs", Special Section On Security and Privacy for Vehicular Networks, IEEE Access, Volume 6, 2018.
  8. Celestine Iwendi, (Senior Member, IEEE), Mueen Uddin, James A. Ansere, P. Nkurunziza, J. H. Anajemba, and Ali Kashif Bashir, (Senior Member, IEEE), "On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique", September 21, 2018, IEEE Access.
  9. Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidany, Mohamed Mahmoud, Mohamed Abdallahz, "Detecting Sybil Attacks using Proofs of Work and Location in VANETs", IEEE Transactions on Dependable and Secure Computing ( Early Access ), May 2020.
  10. Mevlut Turker Garip, Paul Hyungmin Kim, Peter Reiher, Mario Gerla, "INTERLOC: An Interference Aware RSSI Based Localization and Sybil Attack Detection Mechanism for Vehicular Ad Hoc Networks", IEEE Annual Consumer Communications & Networking Conference, August 2017.
  11. Elvin Eziama, Kemal Tepe, Ali Balador, Kenneth Sorle Nwizege, and Luz M. S. Jaimes, "Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning", 2018 IEEE Globecom Workshops (GC Wkshps), February 2019.
  12. Yao Y, Xiao B, Wu G, X Liu, Z Yu, K Zhang, and X Zhou, February 2019, IEEE Transactions on Mobile Computing, "Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI", Vol. 18, No. 2, February 2019.
  13. G Pengwenlong, Khatoun R, Youcef B, Serhrouchni A,2017, "Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks", (WCNC).
  14. Y L Morgan, 2010, 1-18, International Journal of Vehicular Technology. "Managing DSRC, WAVE Standards Operations in a V2V Scenario"
  15. Avleen Kaur Malhi , Shalini Batra , Husanbir Singh Pannu,"Security of vehicular ad-hoc networks: A comprehensive survey", 2019 Elsevier.
  16. Sameer Sheikh and Jun Liang ,"A Comprehensive Survey on VANET Security Services in Traffic Management System Muhammad", Wireless Communications and Mobile Computing, 2019, 1-23.
  17. Vishal Kumar, Shailendra Mishra, Narottam Chand, "Applications of VANETs: Present & Future", 5, 12-15, 2013, Communications and Network. https://doi.org/10.4236/cn.2013.51B004
  18. Lee M, Atkison T," VANET Applications: Past, Present, and Future", Vehicular Communications,2020.
  19. Momina Hafeez, Rehan Ahmad, Umair Hafeez, "International Journal of Advanced and Applied Sciences", 5(11) 2018, Pages: 1-15. https://doi.org/10.21833/ijaas.2018.11.001
  20. Ram Shringar R, Manish K, Nanhay S, "Security Challenges, Issues and their Solutions for VANETs", Vol.5, No.5, September 2013, International Journal of Network Security & Its Applications (IJNSA).
  21. Yousef Al-Raba'nah, Ghassan Samara, "Security Issues in Vehicular Ad Hoc Networks (VANET): a survey", International Journal of Sciences & Applied Research, IJSAR, 2015; 50-55.
  22. Salam Hamdan, Amjad Hudaib and Arafat Awajan, "Detecting Sybil attacks in vehicular ad hoc networks", International Journal of Parallel, Emergent and Distributed Systems,2019.
  23. Chaitanya Kumar Karn and Chandra Prakash Gupta," A Survey on VANETs Security Attacks and Sybil Attack Detection", International Journal of Sensors, Wireless Communications, and Control, 2016, 6, 45-62. https://doi.org/10.2174/2210327905999151103170103
  24. Lu Z, Qu G, and Liu Z,IEEE Transactions on Intelligent Transportation Systems, "A survey on recent advances in vehicular network security, trust, and privacy," vol. 20, no. 2, pp. 760-776, 2019. https://doi.org/10.1109/tits.2018.2818888
  25. Lu, H. , Li., J. , 2014.Wireless Communication Mobile Computing, Privacy preserving authentication schemes for vehicular ad hoc networks: a survey.
  26. Rasheed Hussain, Heekuck Oh, On secure and privacy-aware Sybil attack detection in vehicular communications.Wireless Personal Communication, 2014,77 (4), 2649-2673 https://doi.org/10.1007/s11277-014-1659-5
  27. J Grover, MS Gaur, V Laxmi, Open Computer Science, Multivariate verification for Sybil attack detection in VANET, 2015.
  28. Hasrouny, H. , Samhat, A.E. , Bassil, C. , Laouiti, A. , 2017a. VANet security challenges and solutions: a survey. Veh. Commun. 7, 7-20 . https://doi.org/10.1016/j.vehcom.2017.01.002
  29. Mejri, M.N. , Ben-Othman, J. , Hamdi, M. , 2014a. Vehicular Communication, Survey on VANET security challenges and possible cryptographic solutions".
  30. G E Richard, Martine B, Samuel P, Alejandro Q, VANET security surveys, Computer Communications 44 (2014) 1-13 https://doi.org/10.1016/j.comcom.2014.02.020
  31. A.A. Pouyan, M Alimohammadi, Sybil Attack Detection in Vehicular Networks, Computer Science and Information Technology 2(4): 197-202, 2014 https://doi.org/10.13189/csit.2014.020403
  32. Razzaque, M.A. , Salehi, A. , Seyed, M.C. ,"Security and privacy in vehicular ad-hoc networks-Survey and the road ahead", 2013, Wireless Networks and Security, Springer, Berlin Heidelberg, pp. 107-132 .
  33. Hamdan S, Al-Qassas RS, Tedmori S. Comparative study on Sybil attack detection schemes. Int J Comput Technol.2015;14:5869-5876. https://doi.org/10.24297/ijct.v14i7.1898
  34. Jain M, Saxena R. 2nd International Conference on Computational Intelligence and Informatics. Springer; 2018.VANET: security attacks, solution, and simulation.
  35. Zaid A. Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah & Zuriati Ahmad Zukarnain, Vehicular Ad Hoc Networks and Security Issues: Survey, Modern Applied Science; Vol. 11, No. 5; 2017.
  36. Dhamgaye, Chavhan Nekita, Survey on security challenges in VANET, Wireless Communication, and Computing, International Journal of Computer Science and Network, Vol 2, Issue 1, 2013
  37. M. Azees, L J Deborah, and Vijayakumar P, IET Intelligent Transport Systems,"Comprehensive survey on security services in vehicular Adhoc networks," vol. 10, no. 6, pp. 379-388, 2016.
  38. Irshad Ahmed Sumra, Halabi Bin Hasbullah, and Jamalul-lail Bin AbMananan, "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey," in Vehicular Ad-hoc Networks Smart Cities, pp. 51-61, Singapore Springer, 2015.
  39. Jaballah, W. B., Conti, M., Lal, C., 2019. A survey on software defined vanets: benets, challenges, and future directions. arXiv preprint arXiv:1904.04577.
  40. Douceur J R, "The Sybil attack," Proceedings of the International Workshop on Peer to Peer Systems, 251-260, 2002.
  41. Zhou T, Choudhury R. R, Ning P, K Chakrabarty, "P2DAP-Sybil Attacks Detection in Vehicular Ad Hoc Networks," Selected Areas in Communications, IEEE Journal, Vol. 29, No. 3, 582-594, 2011. https://doi.org/10.1109/JSAC.2011.110308
  42. Zeadally Sherali, Hunt Ray, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, Vehicular ad hoc networks (VANETs): Status, results, and challenges. Telecommunication Systems, 50(4), 217-241, (2012) https://doi.org/10.1007/s11235-010-9400-5
  43. F. Zhang, D. Clarke, A. Knoll, Vehicle detection based on lidar and camera fusion, in: 17th Int. IEEE Conf. Intell. Transp. Syst., IEEE, 2014, pp. 1620-1625.
  44. R. Mishra, A. Singh, R. Kumar, VANET security: Issues, challenges and solutions, in: 2016 Int. Conf. Electr. Electron. Optim. Tech., IEEE, Chennai, India, 2016, p. N/A
  45. A. Vaibhav, D. Shukla, S. Das, S. Sahana, P. Johri, Security challenges, authentication, application and trust models for vehicular ad hoc network- A survey, I, J. Wireless MicrowaveTechnology (2017) 36-48.
  46. S.S. Manvi, S. Tangade, Vehicular Communication, A survey on authentication schemes in VANETs for secured communication, 9 (2017) 19-30.
  47. V. Hoa La, A. Cavalli, Security attacks and solutions in vehicular ad hoc networks: A survey, Int. J. AdHoc Netw. Syst. 4 (2014) 1-20.
  48. D. Kushwaha, P. Kumar Shukla, R. Baraskar, A survey on Sybil attack in a vehicular ad-hoc network, Int. J. Comput. Appl. 98 (2014) 31-36.
  49. M Rahbari, M Ali, J Jamali, International Journal of Network Security & Its Applications (IJNSA) (November 2011),Efficient Detection of Sybil Attack Based on Cryptography in VANET.
  50. G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, T. Weil,IEEE Communications Surveys and Tutorials, Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards, and solutions, 13 (4) (2011) 584-616.