Vanet Security and Privacy – an Overview
Keywords:
VANET Attacks; Security; Privacy PreservationAbstract
While vehicular ad-hoc networks (VANETs) offer substantial benefits to society, they also present numerous challenges, particularly in terms of security and privacy. Given the significant impact of VANETs on modern transportation systems, ensuring robust security and safeguarding user privacy are paramount. This paper provides an overview of VANET security and privacy, exploring fundamental challenges, state-of-the-art solutions, and emerging trends in this field. By examining the unique characteristics of VANETs, such as dynamic topology and resource constraints, this paper highlights the vulnerabilities inherent in these networks and the potential threats they face, including malicious attacks and privacy breaches. Additionally, the paper explores the intricate balance between security and privacy requirements, highlighting the trade-offs involved in deploying protective measures while preserving user anonymity and data confidentiality. Finally, the paper discusses future research directions and open challenges, advocating for interdisciplinary approaches and innovative solutions to address the evolving landscape of VANET security and privacy. This paper aims to provide researchers, practitioners, and policymakers with a nuanced understanding of the complex interplay between security, privacy, and attacks in VANET environments.
References
Abdelgader, A. M. S.; Shu, F.; Zhu, W. & Ayoub, K. (2017). Security challenges and trends in vehicular communications.
IEEE Conference on Systems, Process and Control (ICSPC). Melaka, Malaysia, pp. 105-110.
Ahmad, Farhan; Adnane, Asma; Franqueira, Virginia N. L.; Kurugollu, Fatih & Liu, Lu (2018). Man in the Middle Attacks in
Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies. Retrieved from https://www.mdpi.com/1424-
/18/11/4040.
Al-Qutayri, Mahmoud; Chan Yeun & Faisal, Al-Hawi (2010). Security and Privacy of Intelligent VANETs. Computational
Intelligence and Modern Heuristics. InTech.
Cui, Jie; Lu, Wei; Hong, Zhong; Jing, Zhang; Yan, Xu & Lu, Liu (2020). Edge Computing in VANETs-An Efficient and
Privacy-Preserving Cooperative Downloading Scheme. IEEE Journal on Selected Areas in Communications, Vol. 38, pp. 1191-
Douceur, John R. (2002). The Sybil Attack. International Workshop on Peer-to-Peer Systems. Retrieved from
https://api.semanticscholar.org/CorpusID:5310675.
Esteban, Egea Lopez (2006). Simulation scalability issues in wireless sensor networks. Journal Communications Magazine
Publisher, IEEE Institute of Electrical and Electronics.
Freudiger, Julien; Raya, Maxim; Félegyházi, Márk; Papadimitratos, Panos & Hubaux, Jean-Pierre (2007). Mix-Zones for
Location Privacy in Vehicular Networks. Published in ACM Workshop on Wireless Networking for Intelligent Transportation
Systems (WiN-ITS), Vancouver, BC, Canada.
Gerlach, M. & Guttler, F. (22 April, 2007). Privacy in VANETs using Changing Pseudonyms - Ideal and Real. Published in
IEEE Vehicular Technology Conference Computer Science.
Gerlach, Matthias (2006). Assessing and Improving Privacy in VANETs. Retrieved from
https://api.semanticscholar.org/CorpusID:18699706.
Gianmarco, Baldini (2022). Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification
analysis. Computer Communications, Vol. 191, pp. 486-499.
Global status report on road safety (2023). World Health Organization.
Jaya Krishna, N. & Prasanth, N. (2022). An Insight View on Denial of Service Attacks in Vehicular Ad Hoc Networks.
Advances in Computational Intelligence and Communication Technology, pp. 273–285.
Khan, S.; Sharma, I.; Aslam, M.; Khan, M. Z. & Khan, S. (2021). S. Security Challenges of Location Privacy in VANETs and
State-of-the-Art Solutions: A Survey. Future Internet, Vol. 13(4), p. 96.
Krzysztof, Stepien & Aneta, Poniszewska-Maranda (26–28 August, 2019). Security Measures in the Vehicular Ad-Hoc
Networks – Man in the Middle Attack. Mobile Web and Intelligent Information Systems: 16th International Conference,
MobiWIS, pp. 136–147.
Levine, Brian Neil, et. al. (2006). A Survey of Solutions to the Sybil Attack. Retrieved from
https://api.semanticscholar.org/CorpusID:15204796.
Marvy, B. Mansour; Cherif Salama; Hoda, K. Mohamed & Sherif, A. Hammad (March, 2018). Vanet security and privacy –
an overview. International Journal of Network Security & Its Applications (IJNSA), Vol. 10(2).
Maxim and Jean-Pierre Hubaux (2005). The security of vehicular ad hoc networks. ACM Workshop on Security of Ad Hoc and
Sensor Networks.
Maxim, Raya & Jean-Pierre, Hubaux (2007). Securing vehicular ad hoc networks. IOS Press Journal of Computer Security,
Vol. 15, pp. 39–68.
Mintemur, Omer & Sen, Sevil (2017). Attack Analysis in Vehicular Ad Hoc Networks. Proceedings of 7th International
Conference on Computer Science, Engineering & Applications. pp. 35-46.
Obaidat, M.; Khodjaeva, M.; Holst, J. & Ben Zid, M. (2020). Security and Privacy Challenges in Vehicular Ad Hoc Networks.
In: Mahmood, Z. (eds) Connected Vehicles in the Internet of Things. Springer, Cham.
Papadimitratos, P.; Buttyan, L.; Holczer, T.; Schoch, E.; Freudiger, J.; Raya, M.; Ma, Z.; Kargl, F.; Kung, A. & Hubaux, J. P.
(November, 2008). Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine,
Vol. 46(11), pp. 100—109.
Parno, Bryan & Adrian, Perrig (2005). Challenges in Securing Vehicular Networks. Computer Science, Engineering. Corpus.
Pravin, Mundhe; Shekhar, Verma & S. Venkatesan. (2021). A comprehensive survey on authentication and privacy-preserving
schemes in VANETs. Computer Science Review, Vol. 41.
Qi, J.; Gao, T. & Zhao, C. (2023). An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing
for VANETs. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2023. Lecture Notes
on Data Engineering and Communications Technologies, Vol. 177. Springer, Cham.
Rawat, D. B.; Popescu, D. C.; Yan, G. & Olariu, S. (2011). Enhancing VANET Performance by Joint Adaptation of
Transmission Power and Contention Window Size. IEEE Transactions on Parallel and Distributed Systems, Vol. 22(9,) pp.
-1535.
Ryma, Abassi (04 January, 2019). VANET security and forensics: Challenges and opportunities.
Sanjeev Kumar Dwivedi; Ruhul Amin; Ashok, Kumar Das; Mark, T. Leung; Kim-Kwang, Raymond Choo & Satyanarayana,
Vollala (2022). Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Networks, Vol. 137.
Xiaodong, Lin; Rongxing, Lu; Chenxi, Zhang; Haojin, Zhu; Pin-Han, Ho & Xuemin, Sherman (April, 2008). Security in
vehicular ad hoc networks. IEEE Communications Magazine, vol. 46(4), pp. 88-95.
Yousefi, S.; Mousavi, M. S. & Fathy, M. (2006). Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives, 6th
International Conference on ITS Telecommunications. Chengdu, China, pp. 761-766.
Zhang, J. (2011). A Survey on Trust Management for VANETs. IEEE International Conference on Advanced Information
Networking and Applications. Biopolis, Singapore, pp. 105-112.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 EIRP Proceedings
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.