Skip to main content

Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead

  • Chapter
Wireless Networks and Security

Part of the book series: Signals and Communication Technology ((SCT))

  • 3425 Accesses

Abstract

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ezell, S.: Explaining International IT Application Leadership: Intelligent Transportation Systems. The Information Technology & Innovation Foundation (January 2010)

    Google Scholar 

  2. David Wang, C., Thompson, J.P.: Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, US. Patent No. 5,613,039 (1997)

    Google Scholar 

  3. US Dept. Transportation, “Vehicle Safety Communications Project Task 3 Final Report” (March 2005), http://www.its.dot.gov/research_docs/pdf/59vehicle-safety.pdf

  4. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)

    Google Scholar 

  5. Raya, M., et al.: Securing vehicular communications. IEEE Wireless Communications 13(5), 8–15 (2008)

    Article  Google Scholar 

  6. Papadimitratos, P., et al.: Secure Vehicular Communications: Design and Architecture. IEEE Commun. Mag. (November 2008)

    Google Scholar 

  7. Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.H., Shen, X.: Security in vehicular ad hoc networks. IEEE Communications Magazine 46(4), 88–95 (2008)

    Article  Google Scholar 

  8. Kargl, F., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Communications Magazine 46(11), 110–118 (2008)

    Article  Google Scholar 

  9. Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommunication Systems, 1–25 (2010)

    Google Scholar 

  10. Qian, Y., Moayeri, N.: Design of secure and application-oriented VANETs. In: IEEE VTC 2008, pp. 2794–2799 (Spring 2008)

    Google Scholar 

  11. Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Vehicular ad hoc networks: A new challenge for localization-based systems. Computer Communications 31(12), 2838–2849 (2008)

    Article  Google Scholar 

  12. Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security, Special Issue on Secu- rity, Ad Hoc and Sensor Networks 15(1), 39–68 (2007)

    Google Scholar 

  13. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Proceedings of the Workshop on Hot Topics in Networks, HotNets-IV (2005)

    Google Scholar 

  14. Yin, J., ElBatt, T., Yeung, G., Ryu, B., Habermas, S., Krishnan, H., Talty, T.: Performance evaluation of safety applications over DSRC vehicular ad hoc networks. In: Proc. of ACM workshop on Vehicular Ad Hoc Networks, VANET (2004)

    Google Scholar 

  15. Leinmuller, T., Schoch, E., Maihofer, C.: Security requirements and solution concepts in vehicular ad hoc networks. In: IEEE 4th Annual Conference on Wireless on Demand Network Systems and Services, pp. 84–91 (2007)

    Google Scholar 

  16. Hubaux, J.-P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy Magazine 2(3), 49–55 (2004)

    Article  Google Scholar 

  17. IEEE P1609.2/D2 – Draft Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages (November 2005)

    Google Scholar 

  18. Jungels, D., Raya, M., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular ad hoc networks. Technical Report LCA-REPORT-2006-006, EPFL (2006)

    Google Scholar 

  19. Kounga, G., et al.: Proving Reliability of Anonymous Information in VANETs. IEEE Transactions on Vehicular Technology 58(6), 2977–2989 (2009)

    Article  Google Scholar 

  20. Papadimitratos, P., et al.: Architecture for secure and private vehicular communications. In: 7th International Conference on ITS Telecommunications, ITST 2007, pp. 1–6 (2007)

    Google Scholar 

  21. Petit, J.: Analysis of ECDSA Authentication Processing in VANETs. In: 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5 (2009)

    Google Scholar 

  22. Plößl, K., Federrath, H.: A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces 30(6), 390–397 (2008)

    Article  Google Scholar 

  23. Plößl, K., et al.: Towards a security architecture for vehicular ad hoc networks. In: The First International Conference on Availability, Reliability and Security, ARES 2006, pp. 1–8 (2006)

    Google Scholar 

  24. Rao, A., et al.: Secure V2V Communication With Certificate Revocations. In: 2007 Mobile Networking for Vehicular Environments, pp. 127–132 (2007)

    Google Scholar 

  25. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA, pp. 11–21. ACM (2005)

    Google Scholar 

  26. Sunnadkal, R., et al.: A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture. In: Fifth IEEE International Symposium on Electronic Design, Test and Application, DELTA 2010, pp. 177–182 (2010)

    Google Scholar 

  27. Trusted Platform Module (TPM), https://www.trustedcomputinggroup.org/groups/tpm/

  28. Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of the First ACM Workshop on Vehicular Ad Hoc Networks (VANET). ACM Press, Philadelphia (2004)

    Google Scholar 

  29. Leinmüller, T., Held, A., Schäfer, G., Wolisz, A.: Intrusion Detection in VANETs. In: Proceedings of 12th IEEE International Conference on Network Protocols (ICNP 2004) Student Poster Session (October 2004)

    Google Scholar 

  30. U.S. Dept. of Transportation, National Highway Traffic Safety Administration, Vehicle Safety Communications Project — Final Report (April 2006), http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/060419-0843/PDFTOC.htm

  31. IEEE Std. 1609.2-2006, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages (2006)

    Google Scholar 

  32. SeVeCom, “Secure Vehicular Communications: Security Architecture and Mechanisms for V2V/V2I, Delivarable 2.1” (2007-2008), http://www.sevecom.org

  33. Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 29(3), 582–594 (2011)

    Article  Google Scholar 

  34. Ahmed Soomro, I., Hasbullah, H., Ab Manan, J.-l.: Denial of Service (DOS) Attack and Its Possible Solution in VANET. In: ICCESSE-WASET 2010 Conference, Tokyo, Japan, May 26-28 (2010)

    Google Scholar 

  35. Karim El Defrawy, M., Tsudik, G.: Privacy-Preserving Location-Based On-Demand Routing in MANETs. IEEE Journal on Selected Areas in Communications 29(10) (December 2011)

    Google Scholar 

  36. Harsch, C., Festag, A., Papadimitratos, P.: Secure Position-Based Routing for VANETs. In: IEEE 66th Vehicular Technology Conference (2007)

    Google Scholar 

  37. Qian, Y., Lu, K., Moayeri, N.: A secure VANET MAC protocol for DSRC applications. In: IEEE GLOBECOM, pp. 1–5 (2008)

    Google Scholar 

  38. Sun, J., Fang, Y.: Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Networks 7(8), 1515–1525 (2009)

    Article  Google Scholar 

  39. Shen, P.-Y., Liu, V., Tang, M., William, C.: An efficient public key management system: an application in vehicular ad hoc networks. In: Pacific Asia Conference on Information Systems (PACIS), AIS Electronic Library (AISeL), Queensland University of Technology, Brisbane, Qld, p. 175 (2011)

    Google Scholar 

  40. Schoch, E., Kargl, F.: On the Efficiency of Secure Beaconing in VANETs. In: WiSec 2010, March 22-24 (2010)

    Google Scholar 

  41. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications 25(8) (October 2007)

    Google Scholar 

  42. Eichler, S., Dotzer, F., Schwingenschlogl, C., Caro, F.J.F., Eberspaher, J.: Secure routing in a vehicular ad hoc network. In: IEEE 60th Vehicular Technology Conference, pp. 3339–3343 (2004)

    Google Scholar 

  43. Papadimitratos, P., Haas, Z.: Secure Routing for Mobile Ad Hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 27–31 (January 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. A. Razzaque .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Razzaque, M.A., S., A.S., Cheraghi, S.M. (2013). Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36169-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36168-5

  • Online ISBN: 978-3-642-36169-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics