skip to main content
10.1145/3386723.3387830acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

A Survey of Intrusion Detection Algorithm in VANET

Authors Info & Claims
Published:18 May 2020Publication History

ABSTRACT

Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.

References

  1. ERRITALI. Mohammed, «Contribution à la sécurisation des réseaux ad hoc véhiculaires », p. 1--137, 10-octobre-2013.Google ScholarGoogle Scholar
  2. K. Tanuja, T M. Sushma, M. Bharathi, et K H. Arun, «A Survey on VANET Technologies». Vol 121 - n° 18, july 2015 p 9 International Journal of Computer Applications.Google ScholarGoogle Scholar
  3. R. G. Engoulou, M. Bellaïche, S. Pierre, et A. Quintero, « VANET security surveys », Comput. Commun., vol. 44, p. 1--13, mai 2014, doi: 10.1016/j.comcom.2014.02.020.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Xiao, W. Zhuang, S. Zhou, et C. Chen, Learning-based VANET Communication and Security Techniques. Cham: Springer International Publishing, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Chen, R. K. Guha, T. J. Kwon, J. Lee, et Y.-Y. Hsu, « A survey and challenges in routing and data dissemination in vehicular ad hoc networks », Wirel. Commun. Mob. Comput., vol. 11, no 7, p. 787--795, juill. 2011, doi: 10.1002/wcm.862.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. S. Anwer et C. Guy, « A Survey of VANET Technologies », p. 11, 2014.Google ScholarGoogle Scholar
  7. O. Oyman, J. Foerster, Y. Tcha, et S. Lee, « Toward enhanced mobile video services over WiMAX and LTE [WiMAX/LTE Update] », IEEE Commun. Mag., vol. 48, n° 8, p. 68--76, août 2010, doi: 10.1109/MCOM.2010.5534589.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. V. Gritsuk et al., « Information Model of V2I System of the Vehicle Technical Condition Remote Monitoring and Control in Operation Conditions », présenté à WCX World Congress Experience, 2018, p. 2018-01-0024, doi: 10.4271/2018-01-0024.Google ScholarGoogle Scholar
  9. P. Tyagi et D. Dembla, « A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs) », Int. J. Comput. Appl., vol. 91, no 7, p. 22--29, avr. 2014, doi: 10.5120/15893-5040.Google ScholarGoogle Scholar
  10. M. Raya et J.-P. Hubaux, « The Security of Vehicular Ad Hoc Networks », p. 11.Google ScholarGoogle Scholar
  11. M. N. Mejri, J. Ben-Othman, et M. Hamdi, « Survey on VANET security challenges and possible cryptographic solutions », Veh. Commun., vol. 1, no 2, p. 53--66, avr. 2014, doi: 10.1016/j.vehcom.2014.05.001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Rahbari et M. A. Jabreil Jamali, « Efficient Detection of Sybil attack Based on Cryptography in Vanet », Int. J. Netw. Secur. Its Appl., vol. 3, no 6, p. 185--195, nov. 2011, doi: 10.5121/ijnsa.2011.3614.Google ScholarGoogle Scholar
  13. A. Rawat, S. Sharma, et R. Sushil, « VANET: Security Attacks and Its Possible Solutions », vol. 3, no 1, p. 4, 2012.Google ScholarGoogle Scholar
  14. R. Mishra, A. Singh, et R. Kumar, « VANET security: Issues, challenges and solutions », in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 2016, p. 1050--1055, doi: 10.1109/ICEEOT.2016.7754846.Google ScholarGoogle ScholarCross RefCross Ref
  15. « A Survey on VANET Technologies », Int. J. Comput. Appl., vol. 121, p. 9.Google ScholarGoogle Scholar
  16. P. Golle, D. Greene, et J. Staddon, « Detecting and correcting malicious data in VANETs », in Proceedings of the first ACM workshop on Vehicular ad hoc networks - VANET '04, Philadelphia, PA, USA, 2004, p. 29, doi: 10.1145/1023875.1023881.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Ghosh, A. Varghese, A. A. Kherani, et A. Gupta, « Distributed Misbehavior Detection in VANETs », in 2009 IEEE Wireless Communications and Networking Conference, Budapest, Hungary, 2009, p. 1--6, doi: 10.1109/WCNC.2009.4917675.Google ScholarGoogle Scholar
  18. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, et J. Hubaux, « Eviction of Misbehaving and Faulty Nodes in Vehicular Networks », IEEE J. Sel. Areas Commun., vol. 25, no 8, p. 1557--1568, oct. 2007, doi: 10.1109/JSAC.2007.071006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. K. Schmidt, T. Leinmueller, E. Schoch, A. Held, et G. Schaefer, « Vehicle Behavior Analysis to Enhance Security in VANETs », p. 8.Google ScholarGoogle Scholar
  20. C.-H. Kim et I.-H. Bae, « A Misbehavior-Based Reputation Management System for VANETs », in Embedded and Multimedia Computing Technology and Service, vol. 181, J. J. Park, Y.-S. Jeong, S. O. Park, et H.-C. Chen, Éd. Dordrecht: Springer Netherlands, 2012, p. 441--450.Google ScholarGoogle Scholar
  21. A. Daeinabi et A. G. Rahbar, « Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks », Multimed. Tools Appl., vol. 66, no 2, p. 325--338, sept. 2013, doi: 10.1007/s11042-011-0789-y.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. O. A. Wahab, H. Otrok, et A. Mourad, « A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles », Comput. Commun., vol. 41, p. 43--54, mars 2014, doi: 10.1016/j.comcom.2013.12.005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Coussement, B. Amar Bensaber, et I. Biskri, « Decision support protocol for intrusion detection in VANETs », in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications - DIVANet '13, Barcelona, Spain, 2013, p. 31--38, doi: 10.1145/2512921.2512928.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Sun, K. Wu, et U. W. Pooch, « Alert Aggregation in Mobile Ad Hoc Networks », p. 10.Google ScholarGoogle Scholar
  25. J. Sen, « An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks », in 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks, Liverpool, United Kingdom, 2010, p. 202--207, doi: 10.1109/CICSyN.2010.51.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey of Intrusion Detection Algorithm in VANET

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & Security
        March 2020
        528 pages
        ISBN:9781450376341
        DOI:10.1145/3386723

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 May 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)13
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader