Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. The present paper is a provide a thorough background on VANETs and their entities; different security attacks; and all requirements of the privacy and security for VANETs. This paper may serve as a guide and reference for VANETs in the design and implementation of any new techniques for protection and privacy.
M. A. Al-shareeda, M. Anbar, I. H. Hasbullah, & S. Manickam. (2020). Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens. J., 1.
M. A. Al-Shareeda, M. Anbar, S. Manickam, & A. A. Yassin. (2020). VPPCS: VANET-based privacy-preserving communication scheme. IEEE Access, 8, 150914–150928.
M. A. Al-Shareeda, M. Anbar, I. H. Hasbullah, S. Manickam, & S. M. Hanshi. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access.
M. M. Hamdi, L. Audah, S. A. Rashid, A. H. Mohammed, S. Alani, & A. S. Mustafa. (2020). A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs). In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7.
M. S. Sheikh, J. Liang, & W. Wang. (2019). A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors, 19(16), 3589.
I. Ali, A. Hassan, & F. Li.m. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun., 16, 45–61.
M. Al Shareeda, A. Khalil, & W. Fahs. (2018). Towards the optimization of road side unit placement using genetic algorithm. In: 2018 International Arab Conference on Information Technology (ACIT), pp. 1–5.
M. S. Talib, A. Hassan, B. Hussin, Z. A. Abas, Z. S. Talib, & Z. S. Rasoul. (2018). A novel stable clustering approach based on Gaussian distribution and relative velocity in VANETs. Int. J. Adv. Comput. Sci. Appl., 9(4), 216–220.
M. S. Talib, A. Hassan, Z. A. Abas, A. Abdul-hussian, M. F. A. Hassan, & Z. J. AL-Araji. (2019). Clustering based affinity propagation in VANETs: Taxonomy and opportunity of research. Int. J. Recent Technol. Eng., 7, 672–679.
A. H. Mohammed, M. M. Hamdi, S. A. Rashid, & A. M. Shantaf. (2020). An optimum design of square microstrip patch antenna based on fuzzy logic rules. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7.
M. Al Shareeda, A. Khalil, & W. Fahs. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol., 16(3A), 540–547.
M. M. Hamdi, S. A. Rashid, M. Ismail, M. A. Altahrawi, M. F. Mansor, & M. K. AbuFoul. (2018). Performance evaluation of active queue management algorithms in large network. In: 2018 IEEE 4th International Symposium on Telecommunication Technologies (ISTT), pp. 1–6.
A. K. Malhi, S. Batra, & H. S. Pannu. (2020). Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur., 89, 101664.
Y. Ming & X. Shen. (2018). PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors, 18(5), 1573.
A. S. Mustafa, M. M. Al-Heeti, M. M. Hamdi, & A. M. Shantaf. (2020). Performance analyzing the effect of network size on routing protocols in MANETs. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–5.
M. M. Hamdi, L. Audah, S. A. Rashid, A. S. Mustafa, & M. S. Abood. (2020). A survey on data dissemination and routing protocol in VANET: Types challenges opportunistic and future role. Int. J. Adv. Sci. Technol, 29(5), 6473–6482.
M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access, 7, 71424–71435.
I. Ali, M. Faisal, & S. Abbas. (2017). A survey on lightweight authentication schemes in vertical handoff. Int. J. Coop. Inf. Syst., 26(01), 1630001.
X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar, & N. Kumar. (2020). A lightweight privacy-preserving authentication protocol for VANETs. IEEE Syst. J.
I. Ali & F. Li. (2020). An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs. Veh. Commun., 22, 100228.
Z. Lu, G. Qu, & Z. Liu. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst., 20(2), 760–776.
M. A. Al-Shareeda, M. Anbar, M. A. Alazzawi, S. Manickam, & A. S. Al-Hiti. (2020). LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access, 8, 170507–170518.
X. Yang et al. (2019). A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun., 15, 16–27.
M. A. Al-shareeda, M. Anbar, S. Manickam, & I. H. Hasbullah. (2020). Review of prevention schemes for modification attack in vehicular ad hoc networks. International Journal of Engineering and Management Research, 10(3), 153-158.
F. Ahmad, A. Adnane, V. N. L. Franqueira, F. Kurugollu, & L. Liu. (2018). Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors, 18(11), 4040.
M. A. Al-shareeda, M. Anbar, S. Manickam, & I. H. Hasbullah. (2020). Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks. International Journal of Engineering and Management Research, 10(3).
E. Vahedi, M. Bayat, M. R. Pakravan, & M. R. Aref. (2017). A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Networks, 129, 28–36.
A. Shamir. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, pp. 47–53.
C. Zhang, R. Lu, X. Lin, P.-H. Ho, & X. Shen. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250.
C. Zhang, P.-H. Ho, & J. Tapolcai. (2011). On batch verification with group testing for vehicular communications. Wirel. Networks, 17(8), 1851.
Y. Jiang, M. Shi, X. Shen, & C. Lin. (2008). BAT: A robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun., 8(4), 1974–1983.
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, & A. Lioy. (2007). Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28.
T. W. Chim, S.-M. Yiu, L. C. K. Hui, & V. O. K. Li. (2011). SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks, 9(2), 189–203.
M. Bayat, M. Pournaghi, M. Rahimi, & M. Barmshoory. (2019). NERA: A new and efficient RSU based authentication scheme for VANETs. Wirel. Networks, pp. 1–16.
Y. Ming & H. Cheng. (2019). Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mob. Inf. Syst., 2019.
Copyright (c) 2020 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.