Security Attacks in Vehicular Networks and Survey on Recent Developments in Detection and Protection Against Threats
Keywords:
Vehicular Ad hoc Networks, Routing protocols, Security threats, Trust managementAbstract
In today's automobiles, security is a primary issue. Among the numerous advantages provided by contemporary vehicle systems are reduced traffic congestion, improved safety, and decreased use of gasoline and diesel fuel. Personal information may be leaked and human lives put in jeopardy by security holes in automobile systems. Vehicle networks are vulnerable to a wide range of security risks, and this article aims to examine them all in relation to the network's cyber security. To help prevent these hazards, the study also provides a literature review of current practises in this area.
References
[1] Al-Turjman, F., & Lemayian, J. P. (2020). Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview. Computers and Electrical Engineering, 87, 106776. https://doi.org/10.1016/j.compeleceng.2020.106776
[2] Amin, R., Lohani, P., Ekka, M., Chourasia, S., & Vollala, S. (2020). An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Computers and Electrical Engineering, 82. https://doi.org/10.1016/j.compeleceng.2020.106554
[3] Awais Javed, M., Zeadally, S., & Hamid, Z. (2018). Trust-based security adaptation mechanism for Vehicular Sensor Networks. Computer Networks, 137, 27-36. https://doi.org/10.1016/j.comnet.2018.03.010
[4] Cherkaoui, B., Beni-Hssane, A., & Erritali, M. (2017). Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks. Procedia Computer Science, 113, 170-177. https://doi.org/10.1016/j.procs.2017.08.337
[5] Eftekhari, S. A., Nikooghadam, M., & Rafighi, M. (2021). Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Vehicular Communications, 28, 100306. https://doi.org/10.1016/j.vehcom.2020.100306
[6] Ghaleb, F. A., Zainal, A., Maroof, M. A., Rassam, M. A., & Saeed, F. (2019). Detecting Bogus Information Attack in Vehicular Ad Hoc Network: A Context-Aware Approach. Procedia Computer Science, 163, 180-189.https://doi.org/10.1016/j.procs.2019.12.099
[7] Hidalgo, C., Vaca, M., Nowak, M. P., Frölich, P., Reed, M., Al-Naday, M., Mpatziakas, A., Protogerou, A., Drosou, A., & Tzovaras, D. (2021). Detection, control and mitigation system for secure vehicular communication. Vehicular Communications, 1, 100425.https://doi.org/10.1016/j.vehcom.2021.100425
[8] Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. D. A., Panigrahi, B. K., & Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure https://doi.org/10.1016/j.micpro.2020.103352
[9] AODV routing algorithm. Microprocessors and Microsystems, 80(October), 103352. https://doi.org/10.1016/j.micpro.2020.103352
[10] Malhi, A. K., Batra, S., & Pannu, H. S. (2020). Security of vehicular ad-hoc networks: A comprehensive survey. Computers and Security, 89, 101664. https://doi.org/10.1016/j.cose.2019.101664
[11] Mokhtar, B., & Azab, M. (2015). Survey on Security Issues in Vehicular Ad Hoc Networks. Alexandria Engineering Journal, 54(4), 1115-1126. https://doi.org/10.1016/j.aej.2015.07.011
[12] Nandy, T., Idris, M. Y. I., Noor, R. M., Das, A. K., Li, X., Ghani, N. A., & Bhattacharyya, S. (2021). An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network. Computer Communications, 177(June 2020), 57-76. https://doi.org/10.1016/j.comcom.2021.06.013
[13] Pan, L., Zheng, X., Chen, H. X., Luan, T., Bootwala, H., & Batten, L. (2017). Cyber security attacks to modern vehicular systems. Journal of Information Security and Applications, 36, 90-100. https://doi.org/10.1016/j.jisa.2017.08.005
[14] Pu, Y., Xiang, T., Hu, C., Alrawais, A., & Yan, H. (2020). An efficient blockchain-based privacy preserving scheme for vehicular social networks. Information Sciences, 540, 308-324. https://doi.org/10.1016/j.ins.2020.05.087
[15] Sultana, R., Grover, J., & Tripathi, M. (2021). Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges. Vehicular Communications, 27, 100284. https://doi.org/10.1016/j.vehcom.2020.100284
[16] Sun, Z., Liu, Y., Wang, J., Yu, R., & Cao, D. (2021). Cross-layer tradeoff of QoS and security in Vehicular ad hoc Networks: A game theoretical approach. Computer Networks, 192(2699), 108031. https://doi.org/10.1016/j.comnet.2021.108031
[17] Tyagi, P., & Dembla, D. (2017). Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egyptian Informatics Journal, 18(2), 133-139.https://doi.org/10.1016/j.eij.2016.11.003