No abstract
In recent years, the VANET has received a greater attention among researchers in academia and industry due to its potential safety application and nonsafety application. Malicious users are one of the types of attackers in VANET and create the security problems. Confidentiality, integrity and availability (CIA) are major components of security goals. The increasing research interest, potential applications, and security problem in VANET lead to the needs to review the attacks on security goals. In this paper, the aim is to present the survey of attacks on security goals and to describe in details the nature of attacks and the behaviour of attackers through different scenarios in the network. The paper also provides a better understanding of security goals and finally it provides an analysis and classifies the attacks on the basis of security goals into different threat levels that can help in the implementation of VANET in real life.
Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network. MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real environment. VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks. In this paper, we will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications.
Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network.
Advanced Analysis & Modeling (ADAM) MIMOS Berhad, Malaysia. jamalul.lail@mimos.my Abstract -Safety and non-safety applications of VANET provides solutions for road accidents in current traffic system. Security is one of the key research area for successful implementation of safety and non-safety applications of VANET in real environment. Trust and Privacy are two major components of security and dynamic topology and high mobility of vehicles make it more challenging task for end users in network. We propose a new and practical card-based scheme to ensure the Security, Trust and Privacy (STP) in vehicular network. Proposed scheme is based on security hardware module i-e trusted platform module (TPM). The basic objective of proposed scheme is to create trusted security environment for end users in network and user take benefits of potential application of VANET. Keywords -Vehicular Ad hoc Network (VANET), Safety Applications, Security, Trust and Privacy (STP), Card based scheme. trusted platform module (TPM).I.
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all times prevented from being altered by attackers. Attackers try to get benefits from the nature of open wireless medium to launch different kind of attacks in the network to achieve their specific goals. Current DSRC is used as a communication medium for sending the safety and non safety messages from vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). With the introduction of trusted computing several years ago, Trusted Platform Module (TPM) is a security hardware that can potentially handle the software attacks on VANET and maintain the integrity of the data within vehicular network. The main idea behind trusted computing is the hardware based TPM which contains active security modules that supports chain of trust to be built within components of the network. We propose a new model for chain of trust within vehicular to handle all types of attacks and maintain the integrity of messages. Direct Anonymous Attestation (DAA) digital group signature scheme play a key role for developing web of trust and provides security and privacy for vehicle.
Jamalul-lail bin Ab MananAdvanced Information Security Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur, Malaysia jamalul.lail@mimos.my Abstract -Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication network and high speed of the vehicles make it a challenging task of authenticating the users. Researchers have proposed different types of authentication mechanisms for secure vehicular communication. We propose a new and practical card-based scheme to make it possible for authentication of users and at the same time enable transactions with vehicle Service Provider (SP).Our proposed scheme provides secure communication environment while vehicle communicating with other vehicles (V2V) or communicating with road site unit (V2R). The SP is key module in vehicular business model in that it provides non safety services to vehicular users during their journey. Our proposed scheme will help solve the security and trust issues in authentication of the users while taking service from service providers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.