Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks
Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to-infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET.
M. Al Shareeda, A. Khalil, & W. Fahs. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol., 16(3), 540–547.
B. H. Khudayer, M. Anbar, S. M. Hanshi, & T.-C. Wan. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8, 24019–24032.
M. Alzubaidi, M. Anbar, Y.-W. Chong, & S. Al-Sarawi. (2018). Hybrid monitoring technique for detecting abnormal behaviour in RPL-based network. J. Commun., 13(5).
M. Al Shareeda, A. Khalil, & W. Fahs. (2018). Towards the optimization of road side unit placement using genetic algorithm. In: International Arab Conference on Information Technology (ACIT), pp. 1–5.
A. K. Al-Ani, M. Anbar, A. Al-Ani, & D. R. Ibrahim. (2020). Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network. IEEE Access, 8, 27122–27138.
M. Al-Shalabi, M. Anbar, & T.-C. Wan. (2018). Proposed mechanism based on genetic algorithm to find the optimal multi-hop path in wireless sensor networks. In: International Conference of Reliable Information and Communication Technology, pp. 510–522.
M. A. Al-Shalabi, M. Anbar, & A. Obeidat. (2019). Alternating sensing process to prolong the lifetime of wireless sensor networks. J. Theor. Appl. Inf. Technol.(JATIT), 97(7), 2132–2141.
Z. Lu, G. Qu, & Z. Liu. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst., 20(2), 760–776.
D. Manivannan, S. S. Moni, & S. Zeadally. (2020). Secure authentication and privacy-preserving techniques in vehicular Ad-hoc NETworks (VANETs). Veh. Commun., pp. 100247.
H. Peng, L. Liang, X. Shen, & G. Y. Li. (2018). Vehicular communications: A network layer perspective. IEEE Trans. Veh. Technol., 68(2), 1064–1078.
M. Wazid, A. K. Das, R. Hussain, G. Succi, & J. J. P. C. Rodrigues. (2019). Authentication in cloud-driven IoT-based big data environment: Survey and outlook. J. Syst. Archit., 97, 185–196.
F. Qu, Z. Wu, F.-Y. Wang, & W. Cho. (2015) A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst., 16(6), 2985–2996.
V. K. V. Karthikeyan. (2016). An investigation of the factors leading drivers to overlook privacy issues in the vehicular infotainment system in India. University of Sheffield.
X. Yang et al. (2019). A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun., 15, 16–27.
C. Zhang, R. Lu, X. Lin, P.-H. Ho, & X. Shen. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250.
C. Zhang, X. Lin, R. Lu, & P.-H. Ho. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: IEEE International Conference on Communications, pp. 1451–1457.
H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017). Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access, 6, 2241–2250.
L. Wu, J. Fan, Y. Xie, J. Wang, & Q. Liu. (2017). Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int. J. Distrib. Sens. Networks, 13(3), 1550147717700899.
J. Li et al. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun., 13, 104–113.
M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access, 7, 71424–71435.
M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Trans. Internet Inf. Syst., 13(12), 6121–6144.
Copyright (c) 2020 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.