Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks

  • Mahmood A. Al-shareeda
  • Mohammed Anbar
  • Selvakumar Manickam
  • Iznan H. Hasbullah
Keywords: Vehicular Ad hoc Networks (VANETs), Security, Man-In-The-Middle (MITM), Authentication and Attacks

Abstract

Vehicular Ad-Hoc Network (VANET) is an indispensable part of the Intelligent Transportation System (ITS) due to its abilities to enhance traffic management and safety. Many researchers have been focused on specific areas involving management and storage data, protocols standardization, network fragmentation, monitoring, and quality of service.  The benchmarks of security of VANET are studied and figured out in this paper. VANET provides the driver and passenger with the safety application as well as entertainment service. However, the communication between nodes in VANET is susceptible to security threats in both communication modes, which indicates the main hazard. In this paper, we identified different Man-In-The-Middle (MITM) attacks with various behaviors such as message tampering, message delaying, and message dropping, according to the literature. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of MITM attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for MITM attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the MITM attack in VANET. This review paper could serve as evidence and reference in the development of any new security schemes for VANETs.

Downloads

Download data is not yet available.

References

M. Bayat, M. Pournaghi, M. Rahimi, & M. Barmshoory. (2019). NERA: A new and efficient RSU based authentication scheme for VANETs. Wirel. Networks, pp. 1–16.

Z. Afzal & M. Kumar. (2020). Security of vehicular Ad-hoc networks (VANET): A survey. In Journal of Physics: Conference Series, 1427(1), 12015.

A. K. Malhi, S. Batra, & H. S. Pannu. (2020). Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur., 89, 101664.

B. H. Khudayer, M. Anbar, S. M. Hanshi, & T.-C. Wan. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8, 24019–24032.

M. Al Shareeda, A. Khalil, & W. Fahs. (2018). Towards the optimization of road side unit placement using genetic algorithm. In: International Arab Conference on Information Technology (ACIT), pp. 1–5.

M. Al-Shalabi, M. Anbar, T.-C. Wan, & A. Khasawneh. (2018). Variants of the low-energy adaptive clustering hierarchy protocol: Survey, issues and challenges. Electronics, 7(8), 136.

M. Al-Shalabi, M. Anbar, T.-C. Wan, & Z. Alqattan. (2019). Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm. Inf. Sci. (Ny)., 500, 259–273.

M. A. Al-Shalabi, M. Anbar, & A. Obeidat. (2019). Alternating sensing process to prolong the lifetime of wireless sensor networks. J. Theor. Appl. Inf. Technol.(JATIT), 97(7), 2132–2141.

A. K. Al-Ani, M. Anbar, A. Al-Ani, & D. R. Ibrahim. (2020). Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network. IEEE Access, 8, 27122–27138.

J. Cui, W. Xu, Y. Han, J. Zhang, & H. Zhong. (2020). Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh. Commun., 21, 100200.

S. Wang, K. Mao, F. Zhan, & D. Liu. (2020). Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer-to-Peer Netw. Appl., 1–16.

M. A. Alazzawi, K. Chen, A. A. Yassin, H. Lu, & F. Abedi. (2019). Authentication and revocation scheme for VANETs based on Chinese Remainder Theorem. In: IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1541–1547.

S. A. Alfadhli, S. Alresheedi, S. Lu, A. Fatani, & M. Ince. (2019). ELCPH: An efficient lightweight conditional privacy-preserving authentication scheme based on hash function and local group secrete key for VANET. In: Proceedings of the 2019 The World Symposium on Software Engineering, pp. 32–36.

J. Cui, D. Wu, J. Zhang, Y. Xu, & H. Zhong. (2019). An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Veh. Technol., 68(3), 2972–2986.

X. Zhang, L. Mu, J. Zhao, & C. Xu. (2019). An efficient anonymous authentication scheme with secure communication in intelligent vehicular ad-hoc networks. TIIS, 13(6), 3280–3298.

M. S. Sheikh, J. Liang, & W. Wang. (2019). A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors, 19(16), 3589.

I. Ali, A. Hassan, & F. Li. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun., 16, 45–61.

H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017). Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access, 6, 2241–2250.

S. M. Pournaghi, B. Zahednejad, M. Bayat, & Y. Farjami. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Networks, 134, 78–92.

S. E. Shladover. (2018). Connected and automated vehicle systems: Introduction and overview. J. Intell. Transp. Syst., 22(3), 190–200.

J. Zhang, J. Cui, H. Zhong, Z. Chen, & L. Liu. (2019). PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. Available at: https://leicester.figshare.com/articles/PA-CRT_Chinese_Remainder_Theorem_Based_Conditional_Privacy-preserving_Authentication_Scheme_in_Vehicular_Ad-hoc_Networks/10237562/1.

J. Cui, L. Wei, J. Zhang, Y. Xu, & H. Zhong. (2018). An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst., 20(5), 1621–1632.

M. S. Sheikh, J. Liang, & W. Wang. (2020). Security and privacy in vehicular ad hoc network and vehicle cloud computing: A survey. Available at: https://www.hindawi.com/journals/wcmc/2020/5129620/.

D. Manivannan, S. S. Moni, & S. Zeadally. (2020). Secure authentication and privacy-preserving techniques in vehicular ad-hoc NETworks (VANETs). Veh. Commun., pp. 100247.

J. B. Kenney. (2011). Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE, 99(7), 1162–1182.

M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Trans. Internet Inf. Syst., 13(12), 6121–6144.

M. Al Shareeda, A. Khalil, & W. Fahs. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol., 16(3A), 540–547.

X. Yang et al. (2019). A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun., 15, 16–27.

G. N. Nayak & S. G. Samaddar. (2010). Different flavours of man-in-the-middle attack, consequences and feasible solutions. In: 3rd International Conference on Computer Science and Information Technology, 5, 491–495.

F. Ahmad, A. Adnane, V. N. L. Franqueira, F. Kurugollu, & L. Liu. (2018). Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies. Sensors, 18(11), 4040.

J. Tobin, C. Thorpe, & L. Murphy. (2017). An approach to mitigate black hole attacks on vehicular wireless networks. In: IEEE 85th Vehicular Technology Conference (VTC Spring), pp. 1–7.

D. He, S. Zeadally, B. Xu, & X. Huang. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur., 10(12), 2681–2691.

I. Ali & F. Li. (2020). An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Veh. Commun., 22, 100228.

L. Wu, J. Fan, Y. Xie, J. Wang, & Q. Liu. (2017). Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int. J. Distrib. Sens. Networks, 13(3), 1550147717700899.

Y. Ming & H. Cheng. (2019). Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Available at: https://www.hindawi.com/journals/misy/2019/7593138/.

J. Cui, L. Wei, H. Zhong, J. Zhang, Y. Xu, & L. Liu. (2020). Edge computing in VANETs- an efficient and privacy-preserving cooperative downloading scheme. IEEE J. Sel. Areas Commun., 38(6), 1191–1204.

M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access, 7, 71424–71435.

J. Li et al. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun., 13, 104–113.

I. Ali, T. Lawrence, & F. Li. (2020). An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. J. Syst. Archit., 103, 101692.

Published
2020-06-30
How to Cite
Mahmood A. Al-shareeda, Mohammed Anbar, Selvakumar Manickam, & Iznan H. Hasbullah. (2020). Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks. International Journal of Engineering and Management Research, 10(3), 153-158. https://doi.org/10.31033/ijemr.10.3.23
Section
Articles

Most read articles by the same author(s)