IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 7, July 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Survey On Security Requirements In Vehicular Ad-Hoc Networks

[Full Text]

 

AUTHOR(S)

Ravneet Kaur, Dr. Jyoteesh Malhotra.

 

KEYWORDS

Keywords: Vehicle ad-hoc networks (VANETs), Smart city through VANET, ITS, Security.

 

ABSTRACT

ABSTRACT: This paper presents a literature survey on security issues in Vehicle Ad-hoc Networks (VANETs). Many researchers have done work on Mobile Ad-Hoc Networks (MANETs) where VANETs routing protocol has been taken as a new protocol. In VANET cars are allowed to talk to each other where a wireless device sends information to nearby vehicles. In this research we will discuss the security issues such as confidentiality, authenticity, availability and non-repudiation aimed to secure communication between V2V and V2I. Tabulated statistics on the relationship between security services versus the technique to encounter the possible attacks is shown. Five security services with security attacks and techniques have been presented. The new technique for VANETs can be build taking this paper as reference.

 

REFERENCES

[1] B. Xiao, B. Yu, and C. Gao, “Detection and localization of sybil node in VANETs,” B. Proceedings of the 2006 Workshop on Dependability Issues in Wireless ad Hoc Networks and Sensor Networks, 2006, pp. 1-8.

[2] Y.Qian, N.Moayeri,”Design of Secure and Application Oriented Vanets”Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE,11-14 May 2008, Singapore.

[3] J. Jakubiak, Y. Koucheryavy,”State of the Art and Research Challenges for VANETs” Consumer Communications and Networking Conference, 2008, 5th IEEE, date: 10-12 Jan. 2008, pp: 912-916.

[4] M. Raya, J. Pierre, Hubaux,”Securing vehicular ad hoc Networks” Journal of Computer Security,vol.15, january 2007, pp: 39-68

[5] A.Weimerskirch, J.JHaas, Y.C.Hu, K.P.Laberteaux,”Data security in vehicular communication networks”, chapter no.09, pp309-310. Z. Tong, R. R. Choudhury, N. Peng, and K. Chakrabarty, “P2DAPsybil attacks detection in vehicular ad hoc networks,” IEEE Journal onSelected Areas in Communications, vol. 22, no. 3, 2011, pp. 582 - 594.

[6] S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense against Sybil attack in vehicular ad-hoc network - based on roadside units support,”in Proceedings of the IEEE Military Communications Conference(MILCOM'09), Boston, MA, vol. 18, no. 21, October, 2009.

[7] W. W. Neng, M. H. Wueh, and M. C. We, “Anovelsecure communication schemein vehicular ad hocnetworks,” ComputerCommunications Archive, vol. 31, no. 12, pp 2827-2837, July 2008.

[8] D. Ameneh and P. R. A. Ghaffar, “Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks,” accepted for publication in Springer Multimedia Tools and Applications, SpecialIssue on Secure Multimedia Communications in VANET.

[9] L. Wenjia and J. Anupam, “Outlier detection in ad hoc networks using dempster-shafer theory,” 10th International Conference on Mobile Data Management'2009, pp. 112- 121, 2009.

[10] J. Guo, J. P. Baugh, and S. Wang, “A group signature based secure and privacy-preserving vehicular communication framework,”Proceedings of the Mobile Networking for Vehicular Environments(MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage,Alaska, May 2007.

[11] F. A. Hawi, C. Y. Yeun, and M. A. Qutayti, The 4th International Conference on Information Tecnology, ICIT 2009, pp. 3-5 October, 2009.

[12] M. Ghosh, A. Varghese, A. Kherani, and A. Gupta, “Distributed misbehavior detection in VANETs,” WCNC 2009, IEEE WirelessCommunication and Networking Conference, Budapest, Hungary,IEEE Press, April 2009.