Abstract
In recent decades, the importance of security has increased more and more especially in the field of research dealing with the Internet of Things (IoT) and implicitly ad hoc networks since they are part of it, considering they undergo several changes and that following these changes this area is exposed to several risks. Many researchers have shed light on different techniques to ensure the security of this intelligent universe. In this study, we identify the risks to which Vehicular ad hoc networks (VANETs) are exposed according to several criteria and metrics. For this purpose, we do bench-marking by carrying out research on the types of attacks that harm VANETs, after that we study the solutions proposed to ensure a high level of security in this type of network and finally we discuss these solutions to find out one that is most adapted to our teamwork and which is based on a relevant and recent technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Khan, U.A., Lee, S.S.: Multi-layer problems and solutions in VANETs: a review. Electronics 8, 204 (2019)
Hussain, R., Lee, J., Zeadally, S.: Trust in VANET: a survey of current solutions and future research opportunities. IEEE Trans. Intell. Transp. Syst. (2020). https://doi.org/10.1109/TITS.2020.2973715
Balu, M., Kumar, G., Lim, S.: A review on security techniques in VANETs. Int. J. Control Autom. 12(4), 1–14 (2019). https://doi.org/10.33832/ijca.2019.12.4.01
Bashir, N., Boudjit, S.: An energy-efficient collaborative scheme for UAVs and VANETs for dissemination of real-time surveillance data on highways. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1–6 (2020). https://doi.org/10.1109/CCNC46108.2020.9045425
Triwinarko, A., et al.: A PHY/MAC cross-layer design with transmit antenna selection and power adaptation for receiver blocking problem in dense VANETs. Veh. Commun. 24, 100233 (2020)
Yeferny, T., Sofian, H.: Vehicular ad-hoc networks: architecture, applications and challenges, arXiv preprint arXiv:2101.04539 (2021). https://doi.org/10.48550/arXiv.2101.04539
Xie, L., Ding, Y., Yang, H., Wang, X.: Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs. IEEE Access 7, 56656–56666 (2019). https://doi.org/10.1109/ACCESS.2019.2913682
Arif, M., et al.: A survey on security attacks in VANETs: communication, applications and challenges. Veh. Commun. 19, 100179 (2019)
Mahapatra, S.N., Singh, B.K., Kumar, V.: A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges. Arab. J. Sci. Eng. 45(8), 6211–6240 (2020). https://doi.org/10.1007/s13369-020-04461-2
Obaidat, M., Khodjaeva, M., Holst, J., Ben Zid, M.: Security and privacy challenges in vehicular ad hoc networks. In: Mahmood, Z. (ed.) Connected Vehicles in the Internet of Things, pp. 223–251. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-36167-9_9
Agarwal, D., Rout, R.R., Ravichandra, S.: Detection of node-misbehavior using over-hearing and autonomous agents in wireless Ad-Hoc networks. In: Applications and Innovations in Mobile Computing (AIMoC), 12 February, pp 152–157. IEEE (2015)
Pagadala, P.K., Saravana Kumar, N.M.: Enhancing the efficiency of routing protocols in VANETS by defending dos attacks using BF-IPCM. Int. J. Adv. Network. Appl. 9(4), 3510–3514 (2018)
Chikhaoui, O., Chehida, A.B., Abassi, R., Fatmi, S.G.E.: A ticket-based authentication scheme for VANETs preserving privacy. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds.) ADHOC-NOW 2017. LNCS, vol. 10517, pp. 77–91. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67910-5_7
Zhong, H., et al.: Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 476, 211–221 (2019)
Shabbir, M., et al.: Detection and prevention of distributed denial of service attacks in VANETs. In: 2016 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE (2016)
Nakamoto, S.: Bitcoin. A Peer-to-Peer Electronic Cash System (2008). http://bitcoin.org/
George, S.A., Jaekel, A., Saini, I.: Secure identity management framework for vehicular ad-hoc network using blockchain. In: 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, pp. 1–6 (2020). https://doi.org/10.1109/ISCC50000.2020.9219736
Rowan, S., et al.: Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels, arXiv preprint arXiv:1704.02553 (2017)
Leiding, B., Parisa, M., Dieter, H.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mouchfiq, N., Habbani, A., Benjbara, C., Berradi, H. (2022). An Overview of Security in Vehicular Ad Hoc Networks. In: Lazaar, M., Duvallet, C., Touhafi, A., Al Achhab, M. (eds) Proceedings of the 5th International Conference on Big Data and Internet of Things. BDIoT 2021. Lecture Notes in Networks and Systems, vol 489. Springer, Cham. https://doi.org/10.1007/978-3-031-07969-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-07969-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-07968-9
Online ISBN: 978-3-031-07969-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)