Documente Academic
Documente Profesional
Documente Cultură
Priyadarshini Nayak
Subhashree Behera
Bharati Mishra
bmbharati@gmail.com
priya0306nayak@gmail.com
priya0306nayak@gmail.com
Debasish Jena
International Institute of Information
Technology Bhubaneswar
Bhubaneswar, Odisha, India
debasish@iiit-bh.ac.in
Ghassan Samara et al. [30] described, Vehicular Adhoc Networks
(VANETs) can be defined as a form of Mobile Adhoc Network
(MANETs), to provide communications among nearby vehicles
and between vehicles and nearby fixed equipments. VANET is a
technology that uses moving vehicles as nodes in a network to
create a mobile network.
ABSTRACT
Vehicular Adhoc Networks these days are attracting much
attention as they are expected to greatly influence and improve
road safety as well as driving conditions. But along with all the
benefits that it offers, there is more chance of giving way to
frequent and severe malicious attacks. Due to this reason much
attention is being given to the security and privacy issues in
VANETs. A lot of research work of being performed to improve
the standards of this network. In this paper we present an
overview on some of the important research works proposed on
the security in VANETs. In this paper we review recent advances
on some of the security proposals for VANETs proposed by
researchers.
C.2.0 [Computer-Communication Networks]: General- Security
and protection.
General Terms
Security, Performance.
Keywords
Vehicular networks, security, privacy preservation, vehicular
communication.
1. INTRODUCTION
With the day to day development in the wireless communication
networks and the involvement of Internet as a significant part of
our lives, a new hope of a Wi-Fi environment like a Wi-Fi city
with Wi-Fi road conditions is emerging rapidly. This has led to
the development of a new type of network, called the Vehicular
Adhoc Network (VANET).
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.
ICCCS11, February 1214, 2011, Rourkela, Odisha, India.
Copyright 2011 ACM 978-1-4503-0464-1/11/02$10.00.
2. COMPONENTS OF VEHICULAR
ADHOC NETWORKS
A vehicular adhoc network basically consists of three network
entities or components [25] and they are: Road Side Unit (RSU),
Vehicles (Users) and Trusted Authority (TA). Each of the
components is explained in the following subsections.
590
3. APPLICATIONS OF VANETs
Using VANET as the backbone a number of applications can be
developed. As per C.-T. Li et al. [16] VANET applications can be
categorized as safety applications, convenience oriented
applications and commercial applications. All these applications
are described in the following subsections.
591
592
593
R. Lu et al. [23] proposed a novel and efficient one-way Hashchain based Certificate Management scheme, named NEHCM in
2009. This can be applied in public key based authentication
scheme. In this paper each vehicle is equipped with a large set of
short time certificates to protect the privacy of the driver. But it is
very difficult to know the linkability among the certificates if the
seeds are not known. NEHCM decreases the risk of Sibel attack in
vehicular communication.
A. Wasef et al. [24] have proposed a new scheme which
complements the Public Key Infrastructure to Secure Vehicular
Ad-hoc Network in 2010. In this article first it has been argued
that Public Key Infrastructure is the most viable mechanism for
securing VANET but later some limitations of PKI has also been
identified by them. PKI cannot provide some security
requirements such as location privacy, efficient authentication and
distributed and fair revocation. Later they have introduced some
complementary security mechanism with PKI such that PKI can
meet the aforementioned security requirements. The latest
proposed mechanism mitigates the Denial of Service attack in
VANET.
6. CONCLUSION
In this paper we have studied the major developments done so far
for achieving security in VANETs. We have reviewed a few
similar works on VANETs with respect to different security
assumptions. In order to achieve anonymity, researchers have
used schemes like blind signature, pseudonym updates, group
signature, etc. For achieving message authentication, we found
authors have used non-interactive identity based cryptography,
one-way hash chain, elliptic curve digital signature algorithms
like schemes.
7. REFERENCES
[1] Hartenstein, H. and Laberteaux, K.P., A Tutorial Survey on
Vehicular Adhoc Networks, IEEE Communications
Magazine, pp 164-171, June 2008.
[2] B. McMillin, J. Sirois, R. Mahoney, and F. Budd, FaultTolerant and Secure Intelligent Vehicle Highway System
Software a Safety Prototype, in IEEE International
Conference on Intelligent Vehicles, 1998.
[3] M. E. Zarki, S. Mehrotra, G. Tsudik, and N.
Venkatasubramanian, Security issues in a future vehicular
network, in EuroWireless, 2002.
[4] J. Luo and J.-P. Hubaux, A Survey of Inter-Vehicle
Communication, EPFL Technical Report IC/2004/24,
March 2004.
[5] S. Eichler, F. Dotzer, C. Schwingenschlogl, J. Fabra, and J.
Eberspacher, Secure Routing in a Vehicular Ad Hoc
Network, IEEE VTC 2004 Fall, Los Angeles, USA,
September 26-29, 2004.
594
[26] Y.-C. Wei, Y.-M. Chen and H.-L. Shan, RSSI-Based User
Centric Anonymization for Location Privacy in Vehicular
Networks, Security in Emerging Wireless Communication
and Networking Systems, Lecture Notes of the Institute for
Computer Sciences, Social Informatics and
Telecommunications Engineering 42, pp.39-51, 2010.
[27] X. Liang, R. Lu, X. Lin, and X. Shen, "PPC: Privacypreserving Chatting in Vehicular Peer-to-peer Networks",
Proc. VTC2010-Fall, Ottawa, Canada, September 6-9, 2010.
[28] R. Lu, X. Lin, and X. Shen, "SPRING: A Social-based
Privacy-preserving Packet Forwarding Protocol for
Vehicular Delay Tolerant Networks", Proc. IEEE
INFOCOM'10, San Diego, California, USA, March 14 - 19,
2010.
[16] C.-T. Li, M.-S. Hwang, and Y.-P. Chu, A Secure and
Efficient Communication Scheme with Authenticated Key
Establishment and Privacy Preserving for Vehicular Ad Hoc
Networks. Computer Communications, Volume 31, Issue
12, 30 July 2008, Pages 2803-2814.
595