VANETs Security Privacy and Authenticity A Study
VANETs Security Privacy and Authenticity A Study
net/publication/349199456
CITATIONS READS
4 27
4 authors, including:
Raafiya Gulmeher
Khaja Bandanawaz University
6 PUBLICATIONS 8 CITATIONS
SEE PROFILE
All content following this page was uploaded by Syed Thouheed Ahmed on 16 September 2022.
Abstract. Vehicular Adhoc Network’s (VANET) has gained popularity and fo-
cus of research in recent days, due to their distinctive characteristics like fre-
quently changing topology with predictable mobility. Much attention of Indus-
try and academia both are attracted towards VANETs. Security of data is a cru-
cial aspect of safety related applications of vehicular networks due to their dis-
tributed nature and mobility of vehicular ad hoc networks VANETs a critical
challenge arises such as collisions of uncoordinated data transmissions and un-
stable topologies. This paper presents the basic vehicular ad hoc network’s ar-
chitecture then shows research issues. This paper provides a survey of research
perspective of main aspects of VANETs such as general authentication and se-
curity techniques.
1 Introduction
Vehicular Adhoc Networks (VANETs) are Mobile Adhoc networks (MANETs) with
a special type of wireless communication within short range. VANETs are self-
organizing and distributed networks which have been designed for communication
between the moving vehicles and road side infrastructures. In 2001 VANETSs were
introduced and mentioned [1] for mobile adhoc car-to-car networking and communi-
cation applications. One of the key part of the Intelligent Transportation systems
(ITS) framework is VANETs.
VANETs are being used for many applications such as providing routing infor-
mation to the other vehicles efficiently, accidents, emergency warning, , broadcasting
road conditions, and managing lane-changing etc. This wireless network technology
is a promising one which can encounter critical vehicular safety situations. Due to
these applications requirement VANETs experience fast development, as well as tran-
spires self-driving car technologies. Transmission of a secure data is crucial in
VANETs. Hence implementing data security is a critical challenge due to the frequent
and rapid change of the topology in the Adhoc networks.
Sensor devices are used to monitor the network conditions in VANET. These Sen-
sor devices are capable of transmitting the data to others vehicles and collecting rele-
vant information. Size of the sensor devices are very small, have low cost and can be
deployed in very large numbers in the VANET. Vehicles are capable of providing
themselves continuous power transmission to support functions like communication,
significant computing, and sensing[2].
2 Communication in VANETs
communication, the drivers can get real time traffic and weather updates and pro-
vides monitoring and environmental sensing features.
Vehicle-to-broadband cloud (V2B) communication :With the help of Vehicle-to-
broadband cloud (V2B) communication, the vehicles can communicate each other
using wireless broadband mechanisms such as 3G/4G , because the broadband cloud
will be having both information regarding traffic and monitoring the data , such type
of communication will be most useful for tracking the vehicles and assisting to the
drivers.
Now a day’s lot of personal information and vehicular trajectory data are stored us
hybrid broad applications,which can disclose individual habits, activities and trails of
system connection. The threats such as exploitation of messages or traces the trajec-
tory of vehicles by attacker have to be overcome before communication architecture
in VANETs is deployed to increase the reliability ,dependability and individual`s
acceptance of the VANETs system,
Formerly many approaches have been proposed to address the security and privacy
issues. Most of the literatures pay more attention to two important aspects such as
architecture of VANETs and communication over it[20].
The objectives to guarantee or secure VANETs are same as that for securing any
system. The fundamental point is to give verification, trustworthiness, accessibility,
privacy, and non-renouncement. Verification is affirmation that their conveying ele-
ment is the one that it professes to be and empowers a hub to guarantee the personali-
ty of their imparting hub. Main task is to check , vehicle status i.e whether it is ap-
proved or not. It is vital that the hub getting information is sent from a substantial
sender. Privacy manages the security of information from unapproved disclosure.
Classification of information guarantees that the information is n't spilled or revealed
to unapproved hubs or vehicle in the system. For eg.the data being transmitted is from
enrolled vehicles . Revelation of this information may prompt recognizable proof of
essential data. Integrity is especially vital for basic security. Data can be deleted or
turned out to be out of reach, bringing about loss of accessibility. This implies indi-
viduals who are approved to get data can't get what they require.
Accessibility guarantees that the frame work , works appropriately and their
administration is given to approved clients alone when it is required. An opponent
refuse any assistance to legitimate hubs by stick their channel, by disturbing their
routing rules, by depleting battery of intensity, and so forth. For eg. At essential time
the services are given to vehicle by unit of road side . The elements involved in ex-
change of data are being participated in all or part of the transmission are provided a
protection against rejection.. For eg. Subsequent to communicating something specif-
4
ic, the vehicle ought not deny having those sent message is called as sender non-
renouncement. Additionally after getting a message, the vehicle should not deny hav-
ing those gotten message is called as recipient non-renouncement [16].
4 Related work
related and uses two session keys namely group keys and pairwise keys. In[13] ,the
authors explains several security solutions which have been proposed in depth,like
CA ,signature of group and VPKI.
cation , it will check the validity of senders certificate upon receiving a message by
the vehicle. If sender does not hold a valid certificate then message from it will be
ignored and if the sender do not have a certificate at all then receiver reports about
the sender to the RSU. After checking the correctness of the message RSU will as-
sign sender a valid certificate (VC), or else an invalid certificate (IC) is issued by
RSU to the node and registers the ID of the vehicle to the CRL.
[15] This paper proposes two modes for basic communication -communication
between OBUs with each other and with other infrastructure Road Side Units. As the
communication between vehicles is through wireless channel, so there may many
types of attacks take place easily such as manipulation of messages, insertion of false
information etc. the system proposes Dual group key management scheme where a
group key is assigned to the set of users which can also be updated during operations.
By updating a small amount of information an addition or revocation of the user from
group in VANET is performed efficiently in this scheme. Here various services are
provided by a Trusted Expert (TE) for the online customer through Vehicular Net-
works. Hence it is necessary to maintain data confidentiality and authenticity that are
being exchanged between TE and VANET nodes. The security issue is addressed by
classifying users as unauthorized, primary and secondary by the TE. This paper pro-
poses implementation of Dual Authentication scheme for providing high level securi-
ty that prevents entering of unauthorized vehicles in the VANET.
5 Conclusion
References
1. M. Sivasakthi and S. Suresh. (2013) “Research on vehicular ad hoc networks (VANETs):
an overview,” Journal of Applied Sciences and Engineering Research, vol. 2, no. 1, pp.
23–27.
2. T. Kosch, C. Schroth, M. Strassberger, and M. Bechler, (2012), Automo-tive Internetwork-
ing, Wiey, New York, NY, USA.
3. M. Raya and J.-P. Hubaux, (2007), “Securing vehicular ad hoc net-works,” Journal of
Computer Security, vol. 15, no. 1, pp. 39–68.
4. F. Dotzer, “Privacy issues in vehicular ad hoc networks, (2005), ” in Proceedings of the
5th International Workshop on Privacy Enhancing Technologies (PET ’05), pp. 197–209.
7