Professional Documents
Culture Documents
Abstract— Over the years, area of Vehicular Ad-hoc dispensation capacity. VANET is normally targeted at offering
Network(VANET) attained vast interest and research initiatives security related details and visitor’s administration. The
is also increased due to the range of solutions it can provide. various types of conversation in VANET are of following:
Information safety is considered as most critical issue in any
network system and it also the case in VANET. In VANETs
wireless conversation between automobiles thus attackers breach
confidentiality, privacy, and authenticity properties which impact
further protection. This paper presents the safety challenges and
existing threads in the VANET system. This paper focus on basic
security requirements which must be fulfilled for securing
VANETs. Different classes of VANET attacks are also discussed
in this paper.
I INTRODUCTION
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018)
IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
II LITERATURE REVIEW J.P Habaux et.al (2010) described a model that identifies
the most applicable conversation components. they also
Vehicular ad-hoc networks are the most effective proposed protection structure at the side of the associated
technology which enables communication among the motors protocols. digital Signatures showed to be the maximum
or infrastructure units. Now a days these networks suffer from appropriate method regardless of their apparently excessive
various security issues. overhead. however those network solutions can't be
Akhilesh Singh et.al (2016) describe the various security implemented within the reward state of interaction [15].
issues in VANETs. He researched that VANET offers increase
in methodologies and technologies which identifies with III SECURITY IN VANET
additional safety and satisfaction during driving. In this paper
he covered the various attacks such as denial of service and Rapid growth in the development of vehicular networks
replay attack by using cryptography, hash functions and digital leads to increase in security requirements. Like as other
signatures [7]. networks, users of Vehicular network also demand security in
Arturo Ribagorda et.al (2010) states that VANETs has the terms of integrity of data, confidentiality, availability and
various characteristics. Due to these advanced characteristics, so on. Every vehicular user needs privacy i.e; the information
traditional methods of security are not enough for providing regarding the vehicle and driver must be distributed safely to
security services. He addressed the problems related to DoS the other legitimate users [16]. Security of VANETs greatly
attacks, evasdropping attack etc [8]. depends up on communication medium. The delivery of
Ahmed Shoeb Al Hasan et.al (2015) proposed the messages should be secure. Delay in the transmission leads to
transportation scheme which use V2V and V2I various security issues. Due to the delay, attackers gets more
communication for providing reliable and secure time to attack on vehicles [17].
communication. He had tried to solve the problem of traffic
jam with the help of V2V and V2I communication schemes. A. Entities concerned with VANETs security
This paper defines that the security of vehicular networks There are various terms or entities involved in the security
greatly depends on the transmission medium. He had studied of vehicular netwoks. Table 1 shows various entities and their
on DoS and fabrication attacks [9]. description. The basic entities are:
Jason J. et.al (2016) presented a novel simulator for
VANET. This simulator can handle more vehicles as compare x The vehicles
to NS-2 . he compared the outcomes of both and showed that x The infrastructure
this simulator provide same results with NS2 [10]. x The drivers
Asif Ali Wagan et.al (2009) studied about attacks related x Third parties
to time synchronization. He researched that there is a need to x The attacker
pay attention on time synchronisation attacks. Delay caused in
delivery of messages at the destination nodes cause many Table 1: Entities in VANETs
serious problems. This paper discuss about various issues
related to timing attacks [11].
Xuan Zha et.al (2017) Presented a 3-D Markov approach Entity name Description
for providing security in VANETs. In this paper two
encryption keys are used i.e; keys generated by AES algorithm
and keys generated by Eliptic Curve Cryptography. In this The vehicle Vehicle include all types of
paper problem of mismatching of keys and packet collision vehicles i.e; cars, buses etc.
has been discussed. Results of proposed approach were
validated by simulation. The author has discussed about the
various collision attacks in VANETs. In this paper parameters The infrastructure It includes road-side infra-
like throughput and transmission success rate [12]. structure.
Victor Sucasas et.al (2015) studied about various
authentication and validation problems exist in VANETs. In
this paper, the author has implemented a protocol to maintain The driver Responsible for movement
the user privacy and to solve the authentication problem. The of vehicles
proposed approach authenticates and verifies the users,
generate pseudonyms. It also verifies the data or message send
by users. The output parameters are performance overhead Third parties It includes traffic police,
[13]. transport regulator etc.
Sebastian Bittl et.al (2015) investigated that the various
strong mechanisms designed for security in VANETs increase
the security of network but also increase the performance The attacker It includes both types of
overhead. Some security mechanisms increase the attackers i.e; internal
transmission delay. In this paper approach of message attacker and external
assembling coordination by cross layer has been used to attackers
overcome this problem [14].
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018)
IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
x Accessibility: It affirms that data should only be x Information Correlation: information correlation schemes
accessible to the real client. The attacks made on system receive the information with the improved level of
should close down the system, in order to protect the data. noteworthiness, essentialness and consistency of data.
It works for the goal that the data can't be shared.
x Reliability: Reliability is the basic requirement of users
x Information verification: should kill those false which ensures the reliable transmission of messages. The
messaging, An standard confirmation from claiming delivery of messages to destination should be on time.
information is necessary. The message also includes their
consistency for comparative ones Since the sender x Scalability: Here scalability refers to scalable networks
camwood a chance to be real same time the message i.e; any increase in the size of network or nodes should
holds those false information. not degrade the performance of network to much extent. It
should be easy to increase the network size in terms of
x Privacy: There have to be a guarantee of maintaining users, traffic etc. without any change in its functionality
privacy of users messages against unautorised users. It and services.
works on eliminating message postpone attack.
IV ATTACKERS IN VANETs
x Event information recording: The information regarding
the vehicles must be recorded in accidental cases. Attacks are made to break the security of attacks. The
number of attacks are perfornmed to diminish the security of
VANETs. Attacks cannot be done without the involvement of
attackers. Attacker is the person who tries to lauch the attack.
The fig 3 describes the various types of attackers involved to
Authentication perform attacks.
Non Tamper
repudiation evidence Insider
atackers
hardware
Active Outsider
atackers attackers
Security
Information Electronic
requirements
correlation license plates
of VANETs
Passive Local
atackers Attackers attackers
Information
verification Privacy
Malicious Extended
Accessibility atackers atackers
Rational
atackers
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018)
IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
Class 2 Application attack x Bogus x Distributed denial of service attack: This kind of attack
information attack works same as DoS attack. But in this attack, attack is
x safety application atack done through number of mediums.
x non safety application
attack
x broadcast tampering
attack
x Illusion attack
x Message alteration
attack
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018)
IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
C. Timing attack
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI 2018)
IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
Due to this user gets angry and it will affect his behavior [14] S. Bittl, K. Roscher and A. Gonzalez, "Security Overhead and Its
Impact in VANETs", 2015 8th IFIP Wireless and Mobile Networking
in terms of bad driving, increased speed of vehicle. In the Fig.
Conference (WMNC), 2015.
9 attacker send the message to user A to get him angry. [15] J. Kamani and d. parikh, "A Review on Sybil Attack Detection
Techniques", journal for research, vol. 1, no. 1, 2015.
E. Monitoring attacks [16] K. Dixit, K. Joshi and N. Joshi, "A Novel Approach of Trust Based
Routing To Select Trusted Location In AODV Based VANET: A
Survey", International Journal of Hybrid Information Technology, vol.
These attacks are performed to track the vehicles or nodes 8, no. 7, pp. 335-344, 2015.
on the network. In this attack, attacker tries to monitor the [17] R. Shringar Raw, M. Kumar and N. Singh, "Security Challenges, Issues
activities of the users on the network. It includes: and Their Solutions For Vanet", International Journal of Network
Security & Its Applications, vol. 5, no. 5, pp. 95-105, 2013.
[18] F. Qu, Z. Wu, F. Wang and W. Cho, "A Security and Privacy Review
x Man in the middle attack of VANETs", IEEE Transactions on Intelligent Transportation
x Traffic analysis attack Systems, vol. 16, no. 6, pp. 2985-2996, 2015.
[19] Hoa La and A. Cavalli, "Security Attacks and Solutions in Vehicular
Ad Hoc Networks: A Survey", International Journal on AdHoc
Networking Systems, vol. 4, no. 2, pp. 1-20, 2014.
VI CONCLUSION [20] J. Isaac, S. Zeadally and J. Cámara, "Security attacks and solutions for
vehicular ad hoc networks", IET Communications, vol. 4, no. 7, p. 894,
2010.
As per the increasing demand of vehicles, the need of [21] "VANET, its Characteristics, Attacks and Routing Techniques: A
vehicular networks also increased day by day. VANETs plays Survey", International Journal of Science and Research (IJSR), vol. 5,
prominent role in providing safety applications to users. In this no. 5, pp. 1595-1599, 2016.
paper we have discussed various security requirements of the [22] R. Kaur and U. Kaur, "Various Techniques to detect DOS attack in
VANET: A Review", International Journal of Computer Applications,
users in the VANETs. This paper describes communication vol. 164, no. 8, pp. 38-41, 2017.
mediums and various aspects about VANETs. This paper [23] X. Feng, C. Li, D. Chen and J. Tang, "A method for defensing against
includes various aspects of security attacks performed on the multi-source Sybil attacks in VANET", Peer-to-Peer Networking and
VANET applications and networks. Various types of entities Applications, vol. 10, no. 2, pp. 305-314, 2016.
and attackers involved in the VANETS are also discussed.
REFERENCES
Authorized licensed use limited to: UNIVERSITAS GADJAH MADA. Downloaded on February 20,2023 at 06:06:52 UTC from IEEE Xplore. Restrictions apply.