Abstract
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.
Highlights
Aiming at ensuring the safety and facilitating the passengers and driver, the vehicular ad hoc networks (VANETs) are getting much popularity and attention from the researchers [1,2,3]
VANETs are the networks of vehicles communication and road infrastructures to extend road safety and infotainment [4]. e wireless sensors are fitted within vehicles, accompanied with positioning devices and maps. rough On-Board Unit (OBU), the vehicles are connected with road-side units (RSUs) to share intervehicle and vehicle to RSU, the safety related and otherwise information [5, 6]. e VANETs consist of short-range communication infrastructure
An assailant intentionally generates large amount of messages in a network and creates congestion on wireless channel that might affect the performance of network [25]. e assailant may initiate jamming attack by transmitting a strong radio signal to interrupt the entire communication by declining the signal to noise ratio
Summary
Aiming at ensuring the safety and facilitating the passengers and driver, the VANETs are getting much popularity and attention from the researchers [1,2,3]. E security challenges as posed to VANETs are availability, authentication, integrity, confidentiality, nonrepudiation, pseudonymity, privacy, mobility, data and location verification, access control, and key management issues [9, 10, 15, 16]. In a message modification attack, the attacker changes the information of the vehicle integrated into a message (for example, speed, position, or direction) for its own benefit It is a potential hazard for the security of the other nodes in the network [25]. An assailant intentionally generates large amount of messages in a network and creates congestion on wireless channel that might affect the performance of network [25]. e assailant may initiate jamming attack by transmitting a strong radio signal to interrupt the entire communication by declining the signal to noise ratio
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.