ABSTRACT
Wireless communication technologies have known a huge evolution and they have greatly affected our daily lives. This enhancement has not only influenced the development of mobile communication, but also the development of vehicular communication. VANET is one of the new technologies that mark the development of transport. This new development faces enormous challenges, particularly in terms of network security. In order to solve this problem, some research has been carried out, particularly in terms of detection. In our paper, we will describe the architecture of VANET, and then present the different security problems that the technology faces. Finally, we will study different intrusion detection algorithms to improve the security of VANET networks.
- ERRITALI. Mohammed, «Contribution à la sécurisation des réseaux ad hoc véhiculaires », p. 1--137, 10-octobre-2013.Google Scholar
- K. Tanuja, T M. Sushma, M. Bharathi, et K H. Arun, «A Survey on VANET Technologies». Vol 121 - n° 18, july 2015 p 9 International Journal of Computer Applications.Google Scholar
- R. G. Engoulou, M. Bellaïche, S. Pierre, et A. Quintero, « VANET security surveys », Comput. Commun., vol. 44, p. 1--13, mai 2014, doi: 10.1016/j.comcom.2014.02.020.Google ScholarCross Ref
- L. Xiao, W. Zhuang, S. Zhou, et C. Chen, Learning-based VANET Communication and Security Techniques. Cham: Springer International Publishing, 2019.Google ScholarCross Ref
- W. Chen, R. K. Guha, T. J. Kwon, J. Lee, et Y.-Y. Hsu, « A survey and challenges in routing and data dissemination in vehicular ad hoc networks », Wirel. Commun. Mob. Comput., vol. 11, no 7, p. 787--795, juill. 2011, doi: 10.1002/wcm.862.Google ScholarDigital Library
- M. S. Anwer et C. Guy, « A Survey of VANET Technologies », p. 11, 2014.Google Scholar
- O. Oyman, J. Foerster, Y. Tcha, et S. Lee, « Toward enhanced mobile video services over WiMAX and LTE [WiMAX/LTE Update] », IEEE Commun. Mag., vol. 48, n° 8, p. 68--76, août 2010, doi: 10.1109/MCOM.2010.5534589.Google ScholarDigital Library
- I. V. Gritsuk et al., « Information Model of V2I System of the Vehicle Technical Condition Remote Monitoring and Control in Operation Conditions », présenté à WCX World Congress Experience, 2018, p. 2018-01-0024, doi: 10.4271/2018-01-0024.Google Scholar
- P. Tyagi et D. Dembla, « A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs) », Int. J. Comput. Appl., vol. 91, no 7, p. 22--29, avr. 2014, doi: 10.5120/15893-5040.Google Scholar
- M. Raya et J.-P. Hubaux, « The Security of Vehicular Ad Hoc Networks », p. 11.Google Scholar
- M. N. Mejri, J. Ben-Othman, et M. Hamdi, « Survey on VANET security challenges and possible cryptographic solutions », Veh. Commun., vol. 1, no 2, p. 53--66, avr. 2014, doi: 10.1016/j.vehcom.2014.05.001.Google ScholarDigital Library
- M. Rahbari et M. A. Jabreil Jamali, « Efficient Detection of Sybil attack Based on Cryptography in Vanet », Int. J. Netw. Secur. Its Appl., vol. 3, no 6, p. 185--195, nov. 2011, doi: 10.5121/ijnsa.2011.3614.Google Scholar
- A. Rawat, S. Sharma, et R. Sushil, « VANET: Security Attacks and Its Possible Solutions », vol. 3, no 1, p. 4, 2012.Google Scholar
- R. Mishra, A. Singh, et R. Kumar, « VANET security: Issues, challenges and solutions », in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 2016, p. 1050--1055, doi: 10.1109/ICEEOT.2016.7754846.Google ScholarCross Ref
- « A Survey on VANET Technologies », Int. J. Comput. Appl., vol. 121, p. 9.Google Scholar
- P. Golle, D. Greene, et J. Staddon, « Detecting and correcting malicious data in VANETs », in Proceedings of the first ACM workshop on Vehicular ad hoc networks - VANET '04, Philadelphia, PA, USA, 2004, p. 29, doi: 10.1145/1023875.1023881.Google ScholarDigital Library
- M. Ghosh, A. Varghese, A. A. Kherani, et A. Gupta, « Distributed Misbehavior Detection in VANETs », in 2009 IEEE Wireless Communications and Networking Conference, Budapest, Hungary, 2009, p. 1--6, doi: 10.1109/WCNC.2009.4917675.Google Scholar
- M. Raya, P. Papadimitratos, I. Aad, D. Jungels, et J. Hubaux, « Eviction of Misbehaving and Faulty Nodes in Vehicular Networks », IEEE J. Sel. Areas Commun., vol. 25, no 8, p. 1557--1568, oct. 2007, doi: 10.1109/JSAC.2007.071006.Google ScholarDigital Library
- R. K. Schmidt, T. Leinmueller, E. Schoch, A. Held, et G. Schaefer, « Vehicle Behavior Analysis to Enhance Security in VANETs », p. 8.Google Scholar
- C.-H. Kim et I.-H. Bae, « A Misbehavior-Based Reputation Management System for VANETs », in Embedded and Multimedia Computing Technology and Service, vol. 181, J. J. Park, Y.-S. Jeong, S. O. Park, et H.-C. Chen, Éd. Dordrecht: Springer Netherlands, 2012, p. 441--450.Google Scholar
- A. Daeinabi et A. G. Rahbar, « Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks », Multimed. Tools Appl., vol. 66, no 2, p. 325--338, sept. 2013, doi: 10.1007/s11042-011-0789-y.Google ScholarDigital Library
- O. A. Wahab, H. Otrok, et A. Mourad, « A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles », Comput. Commun., vol. 41, p. 43--54, mars 2014, doi: 10.1016/j.comcom.2013.12.005.Google ScholarDigital Library
- R. Coussement, B. Amar Bensaber, et I. Biskri, « Decision support protocol for intrusion detection in VANETs », in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications - DIVANet '13, Barcelona, Spain, 2013, p. 31--38, doi: 10.1145/2512921.2512928.Google ScholarDigital Library
- B. Sun, K. Wu, et U. W. Pooch, « Alert Aggregation in Mobile Ad Hoc Networks », p. 10.Google Scholar
- J. Sen, « An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks », in 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks, Liverpool, United Kingdom, 2010, p. 202--207, doi: 10.1109/CICSyN.2010.51.Google ScholarDigital Library
Index Terms
- A Survey of Intrusion Detection Algorithm in VANET
Recommendations
Synthetic datasets generation for intrusion detection in VANET
SIN '18: Proceedings of the 11th International Conference on Security of Information and NetworksInter-car network -- a VANET (vehicular adhoc network) -- enables wireless communication between vehicles (V2V) and vehicle-to-infrastructure (V2X). The main goal of VANET is to render safety and convenience on the road. VANET differs from traditional ...
Survey: Routing Protocols in Vehicular Ad Hoc Networks
AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication TechnologiesVehicular Ad-hoc Networks (VANET) is wireless ad-hoc network including a set of vehicle nodes. It is a subclass of Mobile Ad-hoc Network (MANET). The high velocity of nodes constitutes the main difference between VANET and MANET. This distinguished ...
Intrusion Detection Algorithm for MANET
Mobile ad hoc networks MANET present the opportunity to connect transient nodes to the internet without having central control. This very design supports new nodes to join and leave the network based on their proximity to the MANET. Concurrently, it ...
Comments