The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions
Abstract
:1. Introduction
1.1. Motivation and Contribution
1.2. Organization
2. Preliminary Understanding of VANETs
2.1. Architecture of VANETs
2.2. VANET Applications
- Safety applications [27]: Safety applications include all those services which ensure the safety of vehicles and passengers traveling in these vehicles. Collision detection systems, real-time traffic information, and finding congestion-free paths are some of the services in this category.
- Comfort applications [28]: These applications are used for entertainment of the drivers and passengers in the vehicles such as audio and video facilities, and even gaming applications. On tolls, payment may be collected electronically, which saves time and fuel of customers and also saves the time of toll collectors. In big cities, parking is a big challenge, but with the help of VANET-based applications, it is easy to identify parking locations using VANET communications.
- Commercial applications [29]: Vehicles can download personalized settings of vehicles using the internet. Many companies use VANETs for providing security for rented cabs/vehicles. Commercial advertisements are used by companies to attract customers who are general drivers of vehicles. These advertisements may relate to restaurants, petrol pumps, hotels, etc.
- Environmental applications [30]: These applications use many sensors to get information from the environment, which proves beneficial to travelers. Vehicles may get information related to weather, and based on this information, traveling-related decisions are taken. For example, applications may suggest not using a path which may have snowfall, rainfall, or storm-like condition.
2.3. Features of VANETs
- Centralized security system: In VANETs, a centralized security system is used, which is responsible for the implementation of security among all the nodes. Generally, servers are used for this. Packets are not monitored or rarely monitored in ad hoc networks, which make it more insecure. In these networks, either no security-protocol is used or used at very few occasions that make it more vulnerable to attacks.
- Time constraint: In critical situations, messages need to be forwarded within a specified time, otherwise collision cannot be avoided. On the other hand, the authenticity of these messages needs verification, which may lead to extra delays. Time constraint specifies that secure and authentic messages should be forwarded within a specified time.
- Shared broadcast channel: VANET is a wireless network that uses broadcast for transmission. Therefore, it is very easy for hackers to get the information traveling in these networks.
- Volatility and no fixed topology: Vehicles never move at the same speed and in the same direction, so it is not possible to maintain a network for a very long period. It is a short-lived communication network where an attacker may launch an attack and move from its location and escape. Moving vehicles leads to another issue of no fixed topology of the network. Without topology, routing becomes a difficult process to be implemented. Routes are frequently reconfigured, which increases routing overheads.
- Infrastructure less: VANET is an ad hoc network, and all the ad hoc networks do not contain any infrastructure. Although V2I communication considers RSUs and TAs as infrastructure, but still major infrastructure components like routers and servers are not used. Therefore, a trust relationship should be established among vehicles using reputation management systems. Other important features are Quality of Service (QoS), authentication, repudiation, scalability, heterogeneity, and multi-hop connection, etc.
2.4. Future of Vehicular Networks
2.5. Security Requirements in Vehicular Networks
3. Classification of Attacks in VANETs
3.1. Classification Based on Security Services
- Attacks on confidentiality: When the information is exchanged between vehicles, various solutions like public keys and certificates are used to encrypt the information and make it confidential. Still, attackers launch various kinds of attacks on the confidentiality of information using novel attack methods. Some common and popular attacks launched on the confidentiality of information include man-in-the-middle attack, traffic analysis attack, social attack, and eavesdropping attack.
- Attacks on data integrity: With the help of integrity, it is made sure that the information transferred is not modified, delayed, or deleted during the transmission process. Attacks that may be launched against this security service include masquerading attack, replay attack, message tampering attack, and illusion attack.
- Attacks on availability: Availability defines that all the information should be available to legitimate users when they require it. If data is not available to the right person at the right time, then it means vehicular networks are not working efficiently. Attacks that may be launched against this security service include DoS/DDoS, sleep deprivation, jamming attacks, jellyfish attack, intelligent cheater attack, blackhole attack, greyhole attack, greedy behavior attack, spamming attack, etc.
- Attacks on authentication: Authentication is also a significant service that ensures that the information is provided to users after proper cross-checking. This way, with the help of authentication, the share of information that belongs to a specific user is provided to that particular user only. However, still many types of attacks may be launched against authentications include sybil attack, tunneling attack, GPS spoofing, free-riding attack, certificate/key replication attack, etc.
- Attacks on non-repudiation: With the help of this service, it ensured that once after sending any particular message, the sender cannot say that he has not sent any message. In case of any dispute, this service provides proof regarding the message sent by the attacker. Repudiation attacks and loss of event are attacks in this category.
3.2. Classification Based on Attacker Type
3.3. Classification Based on VANET Layers
- Application Layer [69]: This layer is responsible for receiving the inputs from the user and forwarding it to further layers. All the application-based attacks try to modify the basic functionalities of this layer. The heterogeneity of VANET modules make it a greater concern to create a security baseline for this layer.
- Transport layer [70]: This layer ensures process to process delivery of messages. It also ensures that these messages are sent in proper order without any alteration. Replaying, tunneling, session hijacking, or message sequence tampering are some of the attack examples of this category.
- Network layer [71]: It propagates data packets from one node to another node. In VANETs security, concerns are not the same as in the case of other networks. Because it has features like topology, mobility, and network size, attacks launched on this network are also different. Location revealing and routing attacks are some of the examples in this layer.
- LLC Layer and MAC layer [72]: It helps in congestion control using various algorithms. Congestion control may be proactive, reactive, or it may be a hybrid. This layer performs the tasks of scheduling and contention window adjustment. The jamming and identity impersonation are some of the examples of vulnerabilities in this layer.
- Physical layer [72]: DSRC uses 802.11p OFDM that works in the frequency spectrum of 5.9 GHz band (5.885–5.905) with a 10 MHz wide channel. This type of communication data rate is generally 3 Mbps with a 6 Mbps default data rate. Eavesdropping, signal loss, and jamming are some of the attack examples in this layer. Analysis of such frequencies, even with speech signal in a compromised environment, is also very easy [73].
3.4. Classification Based on VANET Components
- (i)
- Vehicles: Vehicles are the mobile units which contain OBU and AU used in the communication. These mobile components may be easily targeted because these are the least secure units in the VANETs. Some of the attacks which may be launched against these units are social engineering attack, sensor impersonation attack, malware integration to vehicle attack, etc.
- (ii)
- Information: Information which flows in all directions of the network is also targeted by the attacker by launching different novel attacks like eavesdropping, jamming spoofing, and false position attack, etc. These attacks may hamper both safety and non-safety applications of the network.
- (iii)
- Infrastructure: It includes RSUs, central registration agency, charging spots of EVs, trusted authority, video cameras, and other components place alongside the road or at any other place like a parking place. Attacks that may be launched include network attack, DoS/DDoS, sybil attack, man in the middle attack, etc. The computer network software based attacks are also viable for VANET environment [81]. Component-based attacks are listed in Table 4.
3.5. Attacks on Electric Vehicles
4. Security Solutions
4.1. Identity-Based Solutions for VANETs
4.2. Key-Based Solutions for VANETs
4.3. Trust-Based Solutions for VANETs
4.4. Machine Learning and Deep Learning Solutions for VANETs
4.5. Hybrid Solutions for VANETs
4.6. Solutions for EV Infrastructure
4.7. Comparison of Existing Surveys
5. Open Research Problems
- Dynamic topology: Dynamic topology is an obvious feature of VANETs. When a vehicle sends a message, it passes through several intermediate nodes. The maliciousness of those nodes is always a question due to the ad hoc-ness. Therefore, research must be carried out to map these dynamic topologies in some directed acyclic graph and to compute some reputation system over it depending upon the past behavior or trust score. Another considerable aspect is that we can also try to use distributed ledgers for the transparency of the system transactions in this dynamic topology.
- Real-time constraints: The mobility of vehicular networks always has been a challenging issue. The real-time data monitoring, prediction of anomalies with high accuracy, and low false rates always have attracted the research community. Various machine learning and deep learning methods exist for these; however, we should explore more for collaborative learning or federated learning to gather the attack knowledge from the environment adaptive. This would help to detect the zero-day vulnerabilities in VANETs. As VANETs majorly use Dedicated Short-Range Communication (DSRC), the novel futuristic methods must support the short range communication maintaining the QoS of the networks.
- Privacy: Maintaining the privacy of user information is also an important research area. In today’s VANETs or ITS, multimedia transmission is another issue. Users always prefer the seamless multimedia data transfer while moving from one place to another. These multimedia are controlled and stored by various clouds and service providers, and therefore, cloud security must be enhanced. On the other way, VANET security can also affect the cloud security. In both the cases, users’ privacy must be protected. For example, the GPS-based location in taxi services must not unnecessarily reveal the user’s travel behavior to a third party. The information that is sensitive and requires confidentiality, if leaked, may impact organizations by losing its credibility. Even users’ personal information stored on a device from which multimedia is getting transferred using a VANET may be misused for financial frauds. Such vulnerabilities must be checked thoroughly, and necessary solutions need to be developed by all the possible stakeholders.
- Liability and revocability: It is based on the non-repudiation service which makes drivers liable for the mistakes they have made (if any). There may be vehicle drivers which can disturb the network or may launch some kind of attack. It includes a process of ID traceability in which real identities of vehicles are identified, which also locates the real source of the message. It is a real challenge to find the real attacker or malicious vehicle in the network due to camouflage identities; however, if such messages are detected, the network can be protected with prediction. Moreover, from the drivers’ point of view, sentiment analysis of the drivers and the behavioral aspects can also work as attack enablers in VANETs, which needs to be explored further. When an attacker is identified or any vehicle user misbehaves in the network, central authority may revoke its certification and de-register it from the network. In this process, malicious nodes are removed from the network. In trust-based networks, it is very difficult to find the misbehaving node and then revoke the assigned privileges, and therefore, some suitable methods need to be developed.
- Safe and economical hardware: Vehicles should be deployed with tamper-proof hardware which will have more security as compared to software issues. These hardware components should be economical and within the budget of all the users. Though this is not directly technically connected, it is for making awareness to the VANET users to always go for validated trusted platforms of security hardware.
- Network scale: The increasing number of vehicles in VANETs are a concerning parameter. Many security solutions exist in the literature that are unable to address the scalability of the VANETs. For example, the generic security models use traditional PKIs, which are time consuming as compared to the advanced security provisions. Therefore, the progress of lattice based cryptography should be explored rigorously to enhance the performance of VANET security. The lightweight and less complex methods should be developed to scale the network efficiently.
- Information authenticity: In vehicular networks, there are different kinds of attacks in which the attacker may send fake messages using a spoofed identity. So the authenticity of the information is also an important research area. With the increasing number of multimedia forms and the increasing demand of the users, the information authenticity process also faces problems. For example, a user of a vehicle may be interested in some infotainment or it may be a simple document from their google drive; in such cases, different authenticity mechanisms are required, as infotainment requires seamless authentication and continuous availability of data stream.
- Jamming: There are various kinds of attacks in which radio interference are used to block the communication. These attacks may be launched against any wireless device. Therefore, it is perfectly suitable for VANETs. Jamming may be further classified into four categories, which are constant, deceptive, random, and reactive. In the existing literature, this jamming problem is less addressed, and therefore, it can be explored further with the new technologies.
- Handling data: With the increase in vehicular networks, it is expected that a massive amount of data will exist in these networks. These data are heterogeneous and distributed in nature and are stored in clouds. This growing amount of data and the size of the vehicular networks will lead to new and unique challenges in handling this data. Therefore, cloud storage security and backup security, and recovery and maintenance, should be some of the concerns to look out for in future ventures.
- Access control: VANETs consist of various layers of data communication such as V2V, V2I, or I2V. In each of these communications, proper access control is required. For example, a vehicle running on a road must not be able to access the other vehicle’s infotainment system in V2V communication. Similarly, a vehicle must not be able to include its data in EV charging machine or RSUs. Only some controlled access must be allowed. Some decentralized mechanisms of access control and their verifiability must be researched.
- Heterogeneity: In vehicular networks, there are different kinds of OBUs, cellular transmitters, sensors, digital audio systems, GPS, etc. Therefore, the data is heterogeneous. A standard security model or the benchmark for VANET security is a missing link. It will be very much beneficial for VANETs to have such a baseline security attempting to detect the anomalies and adapting itself to increase the knowledge base for analysis of new vulnerabilities.
- Attacks solution: From the literature, we have observed that DoS/DDoS attacks are the major consideration in VANET security. This is true, as these attacks are executed in all the layers of VANETs and may take various forms. However, the other categories of attacks need to be explored for developing optimized security method.
- IoE consideration: The future of VANETs is closely connected with IoE that is connected with power generation units with various resources. The connection of vulnerabilities between VANETs and IoEs must be explored in all possible directions. Appropriate solutions must be developed to mitigate the risk of attacking energy infrastructure through VANET components.
- Blockchain aspects: The decentralization and distribute computing is one of the major enablers in the present technologies. Blockchain ensures these features efficiently. Therefore, such blockchain-based solutions can be beneficial for VANET security. The VANET infrastructural components can work in a transparent and decentralized way to account the transactions of data. However, methods should be developed to enhance this feature along with maintaining the required security services.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Sirohi, D.; Kumar, N.; Rana, P.S. Convolutional neural networks for 5G-enabled Intelligent Transportation System: A systematic review. Comput. Commun. 2020. [Google Scholar] [CrossRef]
- Choffnes, D.R.; Bustamante, F.E. An integrated mobility and traffic model for vehicular wireless networks. In Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks (VANET ’05), Cologne, Germany, 2 September 2005. [Google Scholar]
- Kumar, G.; Saha, R.; Rai, M.K.; Kim, T.H. Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication. IEEE Access 2018, 6, 46558–46567. [Google Scholar] [CrossRef]
- Gkatzikis, L.; Koutsopoulos, I.; Salonidis, T. The Role of Aggregators in Smart Grid Demand Response Markets. IEEE J. Sel. Areas Commun. 2013, 31, 1247–1257. [Google Scholar] [CrossRef]
- Bui, N.; Castellani, A.P.; Casari, P.; Zorzi, M. The internet of energy: A web-enabled smart grid system. IEEE Netw. 2012, 26, 39–45. [Google Scholar] [CrossRef]
- Mohammad, S.A.; Rasheed, A.; Qayyum, A. VANET Architectures and Protocol Stacks: A Survey. Commun. Technol. Veh. 2011, 95–105. [Google Scholar] [CrossRef]
- Tomar, R.; Prateek, M.; Sastry, G.H. Vehicular Adhoc Network (VANET)—An Introduction. Int. J. Control. Theory Appl. 2016, 9, 8883–8888. [Google Scholar]
- Balu, M.; Kumar, G.; Lim, S.-J. A review on security techniques in vanets. Int. J. Control. Autom. 2019, 12, 1–14. [Google Scholar] [CrossRef]
- Paranjothi, A.; Khan, M.S.; Nijim, M.; Challoo, R. MAvanet: Message authentication in VANET using social networks. In Proceedings of the 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 20–22 October 2016. [Google Scholar]
- Papadimitratos, P.; Buttyan, L.; Holczer, T.; Schoch, E.; Freudiger, J.; Raya, M.; Hubaux, J.-P. Secure vehicular communication systems: Design and architecture. IEEE Commun. Mag. 2008, 46, 100–109. [Google Scholar] [CrossRef] [Green Version]
- Engoulou, R.G.; Bellaïche, M.; Pierre, S.; Quintero, A. VANET security surveys. Comput. Commun. 2014, 44, 1–13. [Google Scholar] [CrossRef]
- Purkait, R.; Tripathi, S. Fuzzy Logic Based Multi-criteria Intelligent Forward Routing in VANET. Wirel. Pers. Commun. 2020, 111, 1871–1897. [Google Scholar] [CrossRef]
- Salem, F.M.; Ali, A.S. SOS: Self-organized secure framework for VANET. Int. J. Commun. Syst. 2020, e4317. [Google Scholar] [CrossRef]
- Silva, C.M.; Masini, B.M.; Ferrari, G.; Thibault, I. A Survey on Infrastructure-Based Vehicular Networks. Mob. Inf. Syst. 2017, 2017, 1–28. [Google Scholar] [CrossRef] [Green Version]
- Ho, K.Y.; Kang, P.C.; Hsu, C.H.; Lin, C.H. Implementation of WAVE/DSRC devices for vehicular communications. In Proceedings of the International Symposium on Computer, Communication, Control and Automation, Tainan, China, 5–7 May 2010; pp. 522–525. [Google Scholar]
- Pauzie, A. In-vehicle communication systems: The safety aspect. Inj. Prev. 2002, 8, 26–29. [Google Scholar] [CrossRef]
- Neumann, A.; Mytych, M.J.; Wesemann, D.; Wisniewski, L.; Jasperneite, J. Approaches for In-vehicle Communication—An Analysis and Outlook. Commun. Comput. Inf. Sci. 2017, 395–411. [Google Scholar] [CrossRef]
- Yang, X.; Liu, L.; Vaidya, N.H.; Zhao, F. A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), Boston, MA, USA, 22–26 August 2004. [Google Scholar]
- Jurgen, R. V2V and V2I Technical Papers. In V2V/V2I Communications for Improved Road Safety and Efficiency; SAE: Warrendale, PA, USA, 2012. [Google Scholar]
- Anaya, J.J.; Merdrignac, P.; Shagdar, O.; Nashashibi, F.; Naranjo, J.E. Vehicle to pedestrian communications for protection of vulnerable road users. In Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, Dearborn, MI, USA, 8–11 June 2014; pp. 1037–1042. [Google Scholar]
- Guille, C.; Gross, G. A conceptual framework for the vehicle-to-grid (V2G) implementation. Energy Policy 2009, 37, 4379–4390. [Google Scholar] [CrossRef]
- Loisel, R.; Pasaoglu, G.; Thiel, C. Large-scale deployment of electric vehicles in Germany by 2030: An analysis of grid-to-vehicle and vehicle-to-grid concepts. Energy Policy 2014, 65, 432–443. [Google Scholar] [CrossRef]
- Heddebaut, M.; Rioult, J.; Ghys, J.P.; Gransart, C.; Ambellouis, S. Broadband vehicle-to-vehicle communication using an extended autonomous cruise control sensor. Meas. Sci. Technol. 2005, 16, 1363–1373. [Google Scholar] [CrossRef] [Green Version]
- Campolo, C.; Molinaro, A.; Iera, A.; Menichella, F. 5G Network Slicing for Vehicle-to-Everything Services. IEEE Wirel. Commun. 2017, 24, 38–45. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Abdullah, A.H.; Anwar, R.W.; Anwar, M.; Awan, K.M. Aegrp: An enhanced geographical routing protocol for vanet. J. Teknol. 2016, 78. [Google Scholar] [CrossRef] [Green Version]
- Kumar, V.; Mishra, S.; Chand, N. Applications of VANETs: Present & future. Commun. Netw. 2013, 5, 12. [Google Scholar] [CrossRef] [Green Version]
- National Highway Traffic Safety Administration (NHTSA). Vehicle Safety Communications Project Task3 Final Report: Identify Intelligent Vehicle Safety Applications Enabled by DSRC; Technical Report DOT HS; US Department of Transportation: Washington, DC, USA, 2005; pp. 809–859.
- Arif, M.; Wang, G.; Zakirul Alam Bhuiyan, M.; Wang, T.; Chen, J. A Survey on Security Attacks in VANETs: Communication, Applications and Challenges. Veh. Commun. 2019, 100179. [Google Scholar] [CrossRef]
- Mak, T.K.; Laberteaux, K.P.; Sengupta, R. A multi-channel VANET providing concurrent safety and commercial services. In Proceedings of the 2nd ACM International Workshop on Vehicular Adhoc Networks, Cologne, Germany, 22–26 September 2005. [Google Scholar]
- Hartenstein, H.; Laberteaux, K. (Eds.) VANET: Vehicular Applications and Inter-Networking Technologies; John Wiley & Sons: New York, NY, USA, 2009; Volume 1. [Google Scholar]
- Sadatpour, V.; Zargari, F.; Ghanbari, M. A Collision Aware Opportunistic Routing Protocol for VANETs in Highways. Wirel. Pers. Commun. 2019, 109, 175–188. [Google Scholar] [CrossRef]
- Zhu, L.; Zhang, C.; Xu, C.; Du, X.; Guizani, N.; Sharif, K. Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis. IEEE Wirel. Commun. 2019, 26, 18–23. [Google Scholar] [CrossRef]
- Englund, C.; Chen, L.; Vinel, A.; Lin, S.Y. Future Applications of VANETs. Veh. Hoc Netw. 2015, 525–544. [Google Scholar] [CrossRef]
- Kumar, G.; Rai, M.; Saha, R.; Buchanan, W.J.; Thomas, R.; Geetha, G.; Rodrigues, J. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 2020, 69, 7707–7722. [Google Scholar] [CrossRef]
- Wang, M.; Liang, H.; Deng, R.; Zhang, R.; Shen, X.S. VANET based online charging strategy for electric vehicles. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 4804–4809. [Google Scholar]
- Gago, R.G.; Pinto, S.F.; Silva, J.F. G2V and V2G electric vehicle charger for smart grids. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–6. [Google Scholar]
- Liu, J.; Xiao, Y.; Li, S.; Liang, W.; Chen, C.P. Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 2012, 14, 981–997. [Google Scholar] [CrossRef]
- Stallings, W. Cryptography and Network Security: Principles and Practice; Prentice Hall: Upper Saddle River, NJ, USA, 1999. [Google Scholar]
- Mokthar, B.; Azab, M. Survey on security issues in vehicular ad hoc networks. Alex. Eng. J. 2015, 54, 1115–1126. [Google Scholar] [CrossRef] [Green Version]
- Pathre, A.; Agrawal, C.; Jain, A. Identification of malicious vehicle in vanet environment from ddos attack. Int. J. Glob. Res. Comput. Sci. 2013, 4, 30–34. [Google Scholar]
- Gamal, M.S.; Nasr, A.A.; Nouh, S.A. Vanet Security: Defense and detection, a review. J. Azhar Univ. Eng. Sect. 2020, 15, 810–827. [Google Scholar] [CrossRef]
- Ahmad, F.; Adnane, A.; Franqueira, V.N.; Kurugollu, F.; Liu, L. Man-in-the-middle attacks in vehicular ad hoc networks: Evaluating the impact of attackers’ strategies. Sensors 2018, 18, 4040. [Google Scholar] [CrossRef] [Green Version]
- Li, W.; Wen, Q.; Su, Q.; Jin, Z. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 2012, 35, 188–195. [Google Scholar] [CrossRef]
- Cencioni, P.; Di Pietro, R. A mechanism to enforce privacy in vehicle-to-infrastructure communication. Comput. Commun. 2008, 31, 2790–2802. [Google Scholar] [CrossRef]
- Sumra, I.A.; Ahmad, I.; Hasbullah, H. Classes of attacks in VANET. In Proceedings of the 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 24–26 April 2011. [Google Scholar]
- Choudhari, D.P.; Dorle, S.S. Maximization of packet delivery ratio for DADCQ protocol after removal of Eavesdropping and DDoS attacks in VANET. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–8. [Google Scholar]
- Malhi, A.K.; Batra, S. Genetic-based framework for prevention of masquerade and DDoS attacks in vehicularad hocnetworks. Secur. Commun. Netw. 2016, 9, 2612–2626. [Google Scholar] [CrossRef] [Green Version]
- Hezam Al Junaid, M.A.; Syed, A.A.; Mohd Warip, M.N.; Fazira Ku Azir, K.N.; Romli, N.H. Classification of Security Attacks in VANET: A Review of Requirements and Perspectives. In Proceedings of the MATEC Web of Conferences, Lille, France, 8–10 October 2018. [Google Scholar]
- Malik, K.M.; Malik, H.; Baumann, R. Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay Attacks. In Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, CA, USA, 28–30 March 2019. [Google Scholar]
- Singh, K.; Sharma, S. Advanced Security Attacks on Vehicular AD HOC Network (VANET). Int. J. Innov. Technol. Explor. Eng. 2019, 9, 2278–3075. [Google Scholar]
- Lo, N.; Tsai, H. Illusion Attack on VANET Applications—A Message Plausibility Problem. In Proceedings of the 2007 IEEE Globecom Workshops, Washington, DC, USA, 26–30 November 2007; pp. 1–8. [Google Scholar]
- Komal, B.; Sahare, D.R.; Malik, L.G. An approach for detection of attack in VANET. In Proceedings of the International Conference on Industrial Automation and Computing (ICIAC), Strathclyde, UK, 2–4 September 2014. [Google Scholar]
- Alomari, E.; Manickam, S.; Gupta, B.; Karuppayah, S.; Alfaris, R. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. Int. J. Comput. Appl. 2012, 49, 24–32. [Google Scholar] [CrossRef]
- Bibhu, V.; Roshan, K.; Singh, K.B.; Singh, D.K. Performance Analysis of Black Hole Attack in Vanet. Int. J. Comput. Netw. Inf. Secur. 2012, 4, 47–54. [Google Scholar] [CrossRef] [Green Version]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Marianne, A.; Noha, G.; Sherif, M.; Ahmed, E. Jamming Attacks on VANETs. In Proceedings of the International Conference on Big Data Science and Computing, Beijing, China, 4–7 August 2014. [Google Scholar]
- Sakiz, F.; Sen, S. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Hoc Netw. 2017, 61, 33–50. [Google Scholar] [CrossRef]
- Kshirsagar, D.; Patil, A. Blackhole attack detection and prevention by real time monitoring. In Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 4–6 July 2013; pp. 1–5. [Google Scholar]
- Sen, J.; Chandra, M.G.; Harihara, S.G.; Reddy, H.; Balamuralidhar, P. A mechanism for detection of gray hole attack in mobile Ad Hoc networks. In Proceedings of the 2007 6th International Conference on Information, Communications & Signal Processing, Singapore, 10–13 December 2007; pp. 1–5. [Google Scholar]
- Mejri, M.N.; Ben-Othman, J. Entropy as a new metric for denial of service attack detection in vehicular ad hoc networks. In Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems-MSWiM ’14, Montreal, QC, Canada, 21–26 September 2014. [Google Scholar]
- John, R.; Cherian, J.P.; Kizhakkethottam, J.J. A survey of techniques to prevent sybil attacks. In Proceedings of the 2015 International Conference on Soft-Computing and Networks Security (ICSNS), Coimbatore, India, 25–27 February 2015; pp. 1–6. [Google Scholar]
- Douceur, J.R. The Sybil Attack. In Peer-to-Peer Systems. IPTPS 2002; Druschel, P., Kaashoek, F., Rowstron, A., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2429. [Google Scholar]
- Sheikh, M.S.; Liang, J.; Wang, W. A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [Green Version]
- Shilpa, P.; Patil, R.B. Cooperative message authentication and resisting free riding attacks in VANETS. Int. Res. Eng. Technol. 2015, 4, 127–131. [Google Scholar]
- Li, J.; Lu, H.; Guizani, M. ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 938–948. [Google Scholar] [CrossRef]
- Leinmuller, T.; Schmidt, R.K.; Schoch, E.; Held, A.; Schafer, G. Modeling Roadside Attacker Behavior in VANETs. In Proceedings of the 2008 IEEE Globecom Workshops, New Orleans, LA, USA, 30 November–4 December 2008. [Google Scholar]
- Upadhyaya, A.N.; Shah, J.S. Attacks on vanet security. Int. J. Comp. Eng. Technol. 2018, 9, 8–19. [Google Scholar]
- Liang., W.; Li, Z.; Zhang, H.; Wang, S.; Bie, R. Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends. Int. J. Distrib. Sens. Netw. 2015. [Google Scholar] [CrossRef]
- Wang, Y.; Ding, Z.; Li, F.; Xia, X.; Li, Z. Design and implementation of a VANET application complying with WAVE protocol. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017. [Google Scholar]
- Shah, J.C.; Patel, K.; Trapasiya, S.D.; Rathod, J.M. Study for Implementation of VANET with Transport Layer Protocol. Int. J. Comput. Appl. 2014, 975, 8887. [Google Scholar]
- Ilavendhan, A.; Saruladha, K. Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 2018, 4, 46–50. [Google Scholar] [CrossRef]
- Khan, U.A.; Lee, S.S. Multi-Layer Problems and Solutions in VANETs: A review. Electronics 2019, 8, 204. [Google Scholar] [CrossRef] [Green Version]
- Kataeva, E.; Yakimuk, A.; Konev, A.; Shelupanov, A. Metric of Highlighting the Synchronicity of Time Series and Its Application in Analyzing the Fundamental Frequencies of the Speaker’s Speech Signal. Symmetry 2020, 12, 1943. [Google Scholar] [CrossRef]
- Porwal, V.; Patel, R.; Kapoor, D.R. An investigation of DoS flooding attack in VANET. Int. J. Adv. Found. Res. Comput. 2014, 1, 158–169. [Google Scholar]
- Tyagi, P.; Dembla, D. Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation. In Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India, 24–27 September 2014; pp. 2084–2090. [Google Scholar]
- Mansour, M.B.; Salama, C.; Mohamed, H.K.; Hammad, S.A. VANET Security and Privacy-An Overview. Int. J. Netw. Secur. Its Appl. 2018, 10. [Google Scholar] [CrossRef] [Green Version]
- Kong, J.; Hong, X.; Gerla, M. A new set of passive routing attack in Mobile ad hoc networks. In Proceedings of the IEEE Military Communication Conference MILCOM, Boston, MA, USA, 13–16 October 2003. [Google Scholar]
- Karagiannis, D.; Argyriou, A. Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Veh. Commun. 2018, 13, 56–63. [Google Scholar] [CrossRef]
- Tolba, A.M.R. Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs. IEEE Access 2018. [Google Scholar] [CrossRef]
- Bhatt, M.; Sharma, S.; Prakash, A.; Pandey, U.S.; Jyoti, K. Traffic Collision Avoidance in VANET Using Computational Intelligence. Int. J. Eng. Technol. 2016, 8, 364–370. [Google Scholar]
- Novokhrestov, A.; Konev, A.; Shelupanov, A. Model of Threats to Computer Network Software. Symmetry 2019, 11, 1506. [Google Scholar] [CrossRef] [Green Version]
- Rawat, A.; Sharma, S.; Sushil, R. VANET: Security attacks and its possible solutions. J. Inf. Oper. Manag. 2012, 3, 301. [Google Scholar]
- Dennis, O.; Ulf, L. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure. J. Netw. 2009, 4. [Google Scholar] [CrossRef]
- Whyte, W.; Weimerskirch, A.; Kumar, V.; Hehn, T. A Security Credential Management System for V2V Communications. In Proceedings of the IEEE Vehicular Networking Conference, Ulm, Germany, 16–18 December 2013. [Google Scholar]
- Wang, M.; Zhang, R.; Shen, X. Mobility-Aware Coordinated EV Charging in VANET-Enhanced Smart Grid. Mob. Electr. Veh. 2015, 21–54. [Google Scholar] [CrossRef]
- Saxena, N.; Choi, B. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid. Energies 2015, 8, 11883–11915. [Google Scholar] [CrossRef] [Green Version]
- Li, G.; Sun, Q.; Boukhatem, L.; Wu, J.; Yang, J. Intelligent Vehicle-to-Vehicle Charging Navigation for Mobile Electric Vehicles via VANET-Based Communication. IEEE Access 2009, 7, 170888–170906. [Google Scholar] [CrossRef]
- Falk, R.; Fries, S. Electric vehicle charging infrastructure security considerations and approaches. In Proceedings of the INTERNET, Helsinki, Finland, 17 August 2012; pp. 58–64. [Google Scholar]
- Tanwar, S.; Vora, J.; Tyagi, S.; Kumar, N.; Obaidat, M.S. A systematic review on security issues in vehicular ad hoc network. Secur. Priv. 2018. [CrossRef] [Green Version]
- Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil Pairings. In Advances in Cryptology-Asiacrypt; Springer: New York, NY, USA, 2001; pp. 514–532. [Google Scholar]
- Zhang, F.; Kim, K. ID-based blind signature and ring signature from pairings. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 1–5 December 2002; pp. 533–547. [Google Scholar]
- Choon, J.C.; Hee Cheon, J. An Identity-Based Signature from Gap Diffie-Hellman Groups. In International Workshop on Public Key Cryptography; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; pp. 18–30. [Google Scholar] [CrossRef] [Green Version]
- Chow, S.S.M.; Yiu, S.-M.; Hui, L.C.K. Efficient Identity Based Ring Signature. In International Conference on Applied Cryptography and Network Security; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; pp. 499–512. [Google Scholar] [CrossRef] [Green Version]
- Gamage, C.; Gras, B.; Crispo, B.; Tanenbaum, A.S. An identity-based ring signature scheme with enhanced privacy. In Proceedings of the 2006 Securecomm and Workshops, Baltimore, MD, USA, 28 August–1 September 2006; pp. 1–5. [Google Scholar]
- Kamat, P.; Baliga, A.; Trappe, W. An identity-based security framework For VANETs. In Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks—VANET ’06, Los Angeles, CA, USA, 29 September 2006. [Google Scholar]
- Sun, J.; Zhang, C.; Zhang, Y.; Fang, Y. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE Trans. Parallel Distrib. Syst. 2010, 21, 1227–1239. [Google Scholar] [CrossRef] [Green Version]
- Lim, H.W.; Paterson, K.G. Identity-based cryptography for grid security. Int. J. Inf. Secur. 2010, 10, 15–32. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Ali, I.; Lawrence, T.; Li, F. An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs. J. Syst. Archit. 2019, 101692. [Google Scholar] [CrossRef]
- Limbasiya, T.; Das, D. Identity based proficient message verification scheme for vehicle users. Pervasive Mob. Comput. 2019, 60, 101083. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Yassin, A.A. VPPCS: VANET-Based Privacy-Preserving Communication Scheme. IEEE Access 2020, 8, 150914–150928. [Google Scholar] [CrossRef]
- Paterson, K.G.; Price, G. A comparison between traditional public key infrastructures and identity-based cryptography. Inf. Secur. Tech. Rep. 2003, 8, 57–72. [Google Scholar] [CrossRef]
- Sanzgiri, K.; Dahill, B.; Levine, B.N.; Shields, N.; Belding-Royer, E.M. A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 12–15 November 2002; pp. 78–87. [Google Scholar]
- Hu, Y.C.; Perrig, A.; Johnson, D.B. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of the MobiCom’02, Atlanta, GA, USA, 23–26 September 2002; pp. 23–26. [Google Scholar]
- Hu, Y.-C.; Johnson, D.B.; Perrig, A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw. 2003, 1, 175–192. [Google Scholar] [CrossRef]
- Poongodi, M.; Hamdi, M.; Sharma, A.; Ma, M.; Singh, P.K. DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET. IEEE Access 2019, 7, 183532–183544. [Google Scholar] [CrossRef]
- Nandy, T.; Noor, R.M.; Yamani Idna Bin Idris, M.; Bhattacharyya, S. T-BCIDS: Trust-Based Collaborative Intrusion Detection System for VANET. In Proceedings of the 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), Durgapur, India, 12–18 March 2020; pp. 1–5. [Google Scholar]
- Grover, J.; Prajapati, N.K.; Laxmi, V.; Gaur, M.S. Machine learning approach for multiple misbehavior detection in VANET. Commun. Comput. Inf. Sci. 2011, 192, 644–653. [Google Scholar]
- Kosmanos, D.; Pappas, A.; Maglaras, L.; Moschoyiannis, S.; Aparicio-Navarro, F.J.; Argyriou, A.; Janicke, H. A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles. Array 2019, 100013. [Google Scholar] [CrossRef]
- Liu, T.; Shi, S.; Gu, X. Naive Bayes Classifier Based Driving Habit Prediction Scheme for VANET Stable Clustering. Mob. Netw. Appl. 2020. [Google Scholar] [CrossRef]
- Li, W.; Joshi, A.; Finin, T. SVM-CASE: An SVM-based context aware security framework for vehicular ad hoc networks. In Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, USA, 6–9 September 2015; pp. 1–5. [Google Scholar]
- Kim, M.; Jang, I.; Choo, S.; Koo, J.; Pack, S. Collaborative security attack detection in software-defined vehicular networks. In Proceedings of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, 27–29 September 2017; pp. 19–24. [Google Scholar]
- Yu, Y.; Guo, L.; Liu, Y.; Zheng, J.; Zong, Y. An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks. IEEE Access 2018, 6, 44570–44579. [Google Scholar] [CrossRef]
- Adhikary, K.; Bhushan, S.; Kumar, S.; Dutta, K. Hybrid Algorithm to Detect DDoS Attacks in VANETs. Wirel. Pers. Commun. 2020. [Google Scholar] [CrossRef]
- Ghaleb, F.A.; Zainal, A.; Rassam, M.A.; Mohammed, F. An Effective Misbehavior Detection Model using Artificial Neural Network for Vehicular Ad hoc Network Applications. In Proceedings of the 2017 IEEE Conference on Application, Information and Network Security (AINS), Sarawak, Malaysia, 13–14 November 2017; pp. 13–18. [Google Scholar]
- Liang, J.; Chen, J.; Zhu, Y.; Yu, R. A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Appl. Soft Comput. 2018. [Google Scholar] [CrossRef]
- Kaur, J.; Singh, T.; Lakhwani, K. An Enhanced Approach for Attack Detection in VANETs Using Adaptive Neuro-Fuzzy System. In Proceedings of the 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, UK, 24–26 April 2019. [Google Scholar]
- Aloqaily, M.; Otoum, S.; Ridhawi, I.A.; Jararweh, Y. An Intrusion Detection System for Connected Vehicles in Smart Cities. Ad Hoc Netw. 2019. [Google Scholar] [CrossRef]
- Kolandaisamy, R.; Noor, R.M.; Zaba, M.R.; Ahmedy, I.; Kolandaisamy, I. Markov Chain Based Ant Colony Approach for Mitigating DDoS Attacks Using Integrated Vehicle Mode Analysis in VANET. In Proceedings of the 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP), Chennai, India, 4–6 July 2019. [Google Scholar]
- Zeng, Y.; Qiu, M.; Zhu, D.; Xue, Z.; Xiong, J.; Liu, M. DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET. In Proceedings of the 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA, 25–28 May 2019. [Google Scholar]
- Shahverdy, M.; Fathy, M.; Berangi, R.; Sabokrou, M. Driver Behavior Detection and Classification Using Deep Convolutional Neural Networks. Expert Syst. Appl. 2020, 113240. [Google Scholar] [CrossRef]
- Manimaran, P. NDNIDS: An Intrusion Detection System for NDN Based VANET. In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May 2020; pp. 1–5. [Google Scholar]
- Schmidt, D.A.; Khan, M.S.; Bennett, B.T. Spline-based intrusion detection for VANET utilizing knot flow classification. Internet Technol. Lett. 2020. [Google Scholar] [CrossRef] [Green Version]
- Lahrouni, Y.; Pereira, C.; Bensaber, B.A.; Biskri, I. Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET. In Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access-MobiWac ’17, Miami, FL, USA, 21–25 November 2017. [Google Scholar]
- Li, G.; Li, X.; Sun, Q.; Boukhatem, L.; Wu, J. An Effective MEC Sustained Charging Data Transmission Algorithm in VANET-Based Smart Grids. IEEE Access 2020, 8, 101946–101962. [Google Scholar] [CrossRef]
- Wan, Z.; Zhu, W.T.; Wang, G. PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Comput. Secur. 2016, 62, 246–256. [Google Scholar] [CrossRef]
- Liu, H.; Zhang, Y.; Yang, T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar] [CrossRef]
- Kim, M.; Park, K.; Yu, S.; Lee, J.; Park, Y.; Lee, S.W.; Chung, B. A secure charging system for electric vehicles based on blockchain. Sensors 2019, 19, 3028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Marzougui, H.; Kadri, A.; Martin, J.P.; Amari, M. Implementation of energy management strategy of hybrid power source for electrical vehicle. Energy Convers. Manag. 2019, 195, 830–843. [Google Scholar] [CrossRef]
- Kavousi-Fard, A.; Jin, T.; Su, W.; Parsa, N. An Effective Anomaly Detection Model for Securing Communications in Electric Vehicles. IEEE Trans. Ind. Appl. 2020. [Google Scholar] [CrossRef]
- Cooper, C.; Franklin, D.; Ros, M.; Safaei, F.; Abolhasan, M. A Comparative Survey of VANET Clustering Techniques. IEEE Commun. Surv. Tutor. 2016, 19, 657–681. [Google Scholar] [CrossRef]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- Shahid, M.A.; Jaekel, A.; Ezeife, C.; Al-Ajmi, Q.; Saini, I. Review of potential security attacks in VANET. In Proceedings of the 2018 Majan International Conference (MIC), Muscat, Oman, 31 October 2018; pp. 1–4. [Google Scholar]
- Singh, D.; Ranvijay, N.A.; Yadav, R.S. A state-of-art approach to misbehaviour detection and revocation in VANET: Survey. Int. J. Hoc Ubiquitous Comput. 2018, 28, 77. [Google Scholar] [CrossRef]
Attacked Layer | Type of Attack | Reference(s) |
---|---|---|
Confidentiality | Man-in-the-middle attack | Ahmad et al. (2018) [42], Li et al. (2012) [43] |
Traffic analysis attack | Cencioni et al. (2008) [44] | |
Social attack | Sumra et al. (2011) [45] | |
Eavesdropping attack | Choudhari et al. (2019) [46] | |
Integrity | Masquerading attack | Malhi et al. (2016) [47] |
Replay attack | Junaid et al. (2018) [48], Malik et al. (2019) [49] | |
Message tampering attack | Singh and Sharma (2019) [50] | |
Illusion attack | Lo and Tsai (2007) [51] | |
Availability | DoS/DDoS | Komal et al. (2014) [52], Almori et al. (2012) [53] |
Sleep deprivation | Vimal et al. (2012) [54] Hasrouny et al. (2017) [55] | |
Jamming attacks | Hasrouny et al. (2017) [55], Azer et al. (2014) [56] | |
Jellyfish attack | Vimal et al. (2012) [54], Sakiz et al. (2017) [57] | |
Intelligent cheater attack | Sakiz et al. (2017) [57] | |
Blackhole attack | Kshirsagar and Patil (2013) [58] | |
Grayhole attack | Sen et al. (2007) [59] | |
Greedy behaviour attack | Mejri et al. (2014) [60] | |
Spamming attack | Sumra et al. (2011) [45] | |
Authenticity | Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] |
Tunnelling attack | Sheikh et al. (2019) [63] | |
GPS spoofing | Gamal et al. (2020) [41] | |
Free-riding attack | Shilpa et al. (2015) [64] | |
Certificate/key replication attack | Junaid et al. (2018) [48] | |
Non-repudiation | Repudiation attack | Li et al. (2014) [65] |
Attacked Layer | Types of Attack | Reference(s) |
---|---|---|
Application layer | DoS and DDoS | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] |
Message tampering | Singh and Sharma (2019) [50] | |
Impersonation attack | Tyagi et al. (2014) [75] | |
Repudiation attack | Li et al. (2014) [65] | |
Replay attack | Junaid et al. (2018) [48], Malik et al. (2019) [49] | |
Illusion attacks | Lo and Tsai (2007) [51] | |
False position attacks | Gamal et al. (2020) [41] | |
Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] | |
Transport layer | DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] |
Replay attack | Junaid et al. (2018) [48], Malik et al. (2019) [49] | |
Tunnel attacks | Sheikh et al. (2019) [63] | |
Man in the middle attack | Ahmad et al. (2018) [42], Li et al. (2012) [43] | |
Message tampering | Singh and Sharma (2019) [50] | |
Session hijacking attack | Hasrouny et al. (2017) [55] | |
Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] | |
Network layer | Location disclosure | Mansour et al. (2018) [76] |
Packet dropping | Mansour et al. (2018) [76] | |
Flooding attack | Vimal et al. (2012) [54] | |
Replay attack | Junaid et al. (2018) [48], Malik et al. (2019) [49] | |
DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] | |
Message tampering | Singh and Sharma (2019) [50] | |
Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] | |
Wormhole | Sen et al. (2007) [59] | |
Blackhole attack | Kshirsagar and Patil (2013) [58] | |
Routing attack | Kong et al. (2003) [77] | |
LLC Layer and MAC layer | DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] |
Illusion attacks | Lo and Tsai (2007) [51] | |
Signal jamming attack | Karagiannis and Argyriou (2018) [78] | |
Replay attack | Junaid et al. (2018) [48], Malik et al. (2019) [49] | |
Impersonation attacks | Tyagi et al. (2014) [75] | |
Message tampering | Singh and Sharma (2019) [50] | |
Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] | |
Collision attack | Tolba Amr (2018) [79], Mayank et al. (2016) [80] | |
Physical layer | DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] |
GPS spoofing attack | Gamal et al. (2020) [41] | |
Jamming attack | Hasrouny et al. (2017) [55], Azer et al. (2014) [56] | |
Message tampering | Singh and Sharma (2019) [50] | |
Passive eavesdropping | Choudhari et al. (2019) [46] |
Type of Attack | Attack Layer |
---|---|
DoS and DDoS | All layers |
Message tampering | All layers |
Impersonation attack | Application, MAC |
Repudiation attack | Application |
Replay attack | Application, transport, network, MAC |
Illusion attacks | Application, MAC |
False position attacks | Application |
Sybil attack | Application, transport, network, MAC |
Tunnel attacks | Transport |
Man in the middle attack | Transport |
Session hijacking attack | Transport |
Location disclosure | Network |
Packet dropping | Network |
Flooding attack | Network |
Wormhole | Network |
Blackhole attack | Network |
Routing attack | Network |
Signal jamming attack | MAC and LLC |
Collision attack | MAC and LLC |
GPS spoofing attack | Physical |
Jamming attack | Physical |
Message altering attack | Physical |
Passive eavesdropping | Physical |
Attacked Component | Types of Attack | Reference(s) |
---|---|---|
Vehicles | Physical damage to the vehicle | Sumra et al. (2011) [45] |
Sensor impersonation attack | Rawat et al. (2012) [82] | |
Bogus information attack | Singh and Sharma (2019) [50] | |
Illegal remote firmware attack | Dennis and Larson (2009) [83] | |
Jamming attack at vehicle level | Hasrouny et al. (2017) [55], Azer et al. (2014) [56] | |
Social engineering attack | Sumra et al. (2011) [45] | |
Malware integration | Hasrouny et al. (2017) [55] | |
DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] | |
Credential revelation | Whyte et al. (2013) [84] | |
Information | Fake information attack | Singh and Sharma (2019) [50] |
Impersonation attack | Tyagi et al. (2014) [75] | |
False position attack | Gamal et al. (2020) [41] | |
Message tempering | Singh and Sharma (2019) [50] | |
Eavesdropping | Choudhari et al. (2019) [46] | |
Man in the middle attack | Ahmad et al. (2018) [42], Li et al. (2012) [43] | |
Spoofing attack | Gamal et al. (2020) [41] | |
Jamming attacks | Hasrouny et al. (2017) [55], Azer et al. (2014) [56] | |
Infrastructure | Man in the middle attack | Ahmad et al. (2018) [42], Li et al. (2012) [43] |
GPS tracking attack | Singh and Sharma (2019) [50] | |
Sybil attack | John et al. (2015) [61], Doucear J.R. (2002) [62] | |
Network attacks | Sumra et al. (2011) [45] | |
Bogus information | Singh and Sharma (2019) [50] | |
DoS and DDoS attack | Komal et al. (2014) [52], Almori et al. (2012) [53], Porwal et al. (2014) [74] | |
Wormhole attack | Sen et al. (2007) [59] |
Reference(s) | Year | Service | Attack Type Handling | Research Gap |
---|---|---|---|---|
Zhang et al. [91] | 2002 | Anonymity, Privacy | Signature forgery | Implementation efficiency needs to be increased |
Choon et al. [92] | 2002 | Confidentiality Authenticity | Forgery | Generic in nature and not for VANETs |
Chow et al. [93] | 2005 | Confidentiality, Authenticity, Non-repudiation | Message and identity attack | Required improvement in signature generation and verification |
Gamage et al. [94] | 2006 | Confidentiality, Authenticity | Forgery | Implementation efficiency needs to be increased |
Kamat et al. [95] | 2006 | Authentication, Confidentiality, Non-repudiation, Integrity | Modification attack, Man-in-the-middle, Replay attack | Validation incomplete |
Jinyuan et al. [96] | 2010 | Authentication, Non-repudiation, Integrity, Confidentiality | Forgery, Man-in-the-middle, Replay attack | Validation incomplete |
Lim and Paterson [97] | 2010 | Confidentiality, Authenticity | Impersonation attack, Modification attack | More efficiency required in revoking public key certificates |
He et al. [98] | 2015 | Confidentiality, Privacy | Impersonation attack, Modification attack, Man-in-the-middle, Replay attack, tolen verifier table attack | Validation is not successful in VANETs. |
Ali et al. [99] | 2019 | Authentication | Forgery attack | Suitable only for V2V communication |
Limbasiya et al. [100] | 2019 | Authentication, Privacy | Impersonation attack, Modification attack, Man-in-the-middle attack, Replay attack, Session key enclosure | Used only for V2ehicle to RSU communication |
Al-shareeda et al. [101] | 2020 | Privacy | Impersonation attack, Modification attack, Man-in-the-middle, Replay attack | Validation incomplete |
Reference(s) | Year | Service | Attack Type Handling | Research Gap |
---|---|---|---|---|
Sanzgiri et al. [103] | 2002 | Authentication, Non-repudiation | Replay attack, Impersonation, Eavesdropping | Delays in route discovery |
Hu et al. [104] | 2002 | Availability, Non-repudiation | DoS, Routing attack, Replay attack | More efficiency is required in PDR and computational overheads |
Hu and Johnson [105] | 2003 | Authentication, Availability | DoS, Routing attack, Impersonation | Higher latency and overheads need to be improved. |
Cencioni et al. [44] | 2008 | Confidentiality | Traffic Analysis Attack | Should be applicable in inter vehicle communication |
Li et al. [43] | 2012 | Confidentiality | Man-in-the- Middle | Requirement of focus on time constraint |
Reference(s) | Year | Service | Attack Handling | Research Gap |
---|---|---|---|---|
Grover et al. [108] | 2011 | Availability | DoS/DDoS | Not applicable for temporal attacks in a realistic scenario |
Li et al. [111] | 2015 | Availability | DoS/DDoS | Validation not successful |
Ghaleb et al. [115] | 2017 | Availability | DoS/DDoS | Validation is done without considering attacks of DoS/DDoS |
Kim et al. [112] | 2017 | Availability | DoS/DDoS | Suitable only for software-defined VANET |
Yu et al. [113] | 2018 | Availability | DoS/DDoS | Suitable only for software-defined VANET |
Karagiannis and Argyriou [76] | 2018 | Availability | DoS/DDoS | Parametric evaluation not validated |
Liang et al. [116] | 2018 | Availability | DoS/DDoS | Increased computational overheads |
Kosmanos et al. [109] | 2019 | Availability | DoS/DDoS | Suitable for electric vehicles |
Kaur et al. [117] | 2019 | Availability | DoS/DDoS | Parametric evaluation not validated |
Aloqaily et al. [118] | 2019 | Availability | DoS/DDoS | The dataset is not VANET-based |
Kolandaisamy et al. [119] | 2019 | Availability | DoS/DDoS | Parametric evaluation not validated |
Zeng et al. [120] | 2019 | Availability | DoS/DDoS | Parametric evaluation not validated |
Manimaran et al. [122] | 2020 | Availability | DoS/DDoS | Parametric evaluation not validated |
Shahverdy et al. [121] | 2020 | Availability | DoS/DDoS | Non-reputational and non-trustable |
Schmidt et al. [123] | 2020 | Availability | DoS/DDoS | Accuracy rate can be increased |
Adhikary et al. [114] | 2020 | Availability | DoS/DDoS | Parametric evaluation not validated |
Liu et al. [110] | 2020 | Availability | DoS/DDoS | Non-reputation and non-trustable |
Reference(s) | Year | Services | Attack Handling | Research Gap |
---|---|---|---|---|
Lo and Tsai [51] | 2007 | Integrity | Illusion Attack | Performance not quantified |
Mejri et al. [60] | 2014 | Availability | Greedy behavior attack | Handles only greedy behavior attacks |
Malhi et al. [47] | 2016 | Integrity | Masquerade | Computational overheads reduction |
Lahrouni et al. [124] | 2017 | Availability | DDoS attack | Root mean square (RMS), Mean Absolute Values (MAV) and Mean Squared Error (MSE) are not good evaluators |
Malik et al. [49] | 2019 | Integrity | Replay Attack | Suitable in case of voice based systems only. |
Li et al. [125] | 2020 | Availability | DoS/DDoS | Suitable only for EV infrastructure |
Reference(s) | Year | Service | Attack Type | Research Gap |
---|---|---|---|---|
Wan et al. [126] | 2016 | Authentication, privacy | Eavesdropping, Active adversaries | Suitable for V2G communication only |
Liu et al. [127] | 2018 | Authentication, Non-repudiation | Tampering attack | Specific for cloud and edge computing |
Kim et al. [128] | 2019 | Authentication | Replay attack, Man-in-the-middle | V2V communication needs to be discussed |
Marzougui et al. [129] | 2019 | Availability | not specific | Used for energy management and not for communication |
Kumar et al. [34] | 2020 | Confidentiality, Authentication, Non-repudiation | Authentication attacks | The trust management in aggregators requires focus. |
Kavousi et al. [130] | 2020 | Availability, authentication | Message flooding | Computational overheads require more concentration |
Sr. No. | Author(s) & Reference | VANET Taxonomy | Attack Classifications | ID-Based Solutions | Key-Based Solution | Trust-Based Solutions | Machine Learning & Deep Learning Solutions | Hybrid Solutions | EV Solutions | Future Challenges |
---|---|---|---|---|---|---|---|---|---|---|
1 | Cooper et al. (2017) [131] | Yes | No | No | No | No | No | No | No | Yes |
2 | Hasrouny et al. (2017) [55] | Yes | Yes | No | No | No | No | No | No | Yes |
3 | Manvi et al. (2017) [132] | Yes | Yes | No | No | No | No | No | No | No |
4 | Shahid et al. (2018) [133] | Yes | Yes | Yes | Yes | No | No | No | No | No |
5 | Tanwar et al. (2018) [89] | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
6 | Singh et al. (2018) [134] | Yes | No | No | No | No | No | No | No | No |
7 | Arif et al. (2019) [28] | Yes | No | Yes | Yes | Yes | Yes | Yes | No | Yes |
8 | Sheikh et al. (2019) [63] | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes |
9 | Gamal et al. (2020) [41] | Yes | Yes | Yes | Yes | Yes | No | No | No | No |
11 | Present survey | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Verma, A.; Saha, R.; Kumar, G.; Kim, T.-h. The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions. Appl. Sci. 2021, 11, 4682. https://doi.org/10.3390/app11104682
Verma A, Saha R, Kumar G, Kim T-h. The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions. Applied Sciences. 2021; 11(10):4682. https://doi.org/10.3390/app11104682
Chicago/Turabian StyleVerma, Amandeep, Rahul Saha, Gulshan Kumar, and Tai-hoon Kim. 2021. "The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions" Applied Sciences 11, no. 10: 4682. https://doi.org/10.3390/app11104682
APA StyleVerma, A., Saha, R., Kumar, G., & Kim, T. -h. (2021). The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions. Applied Sciences, 11(10), 4682. https://doi.org/10.3390/app11104682