Abstract

Vehicular ad hoc network (VANET) technologies are evolving networked communications advances that incorporate mobile-based routing protocol sets for inter-vehicular exchanges of information in support of smart transportation networks. Privacy and security difficulties are primary concerns in VANET research as a result of the repeated vehicular movements, time-critical responses, and hybrid VANET architectures that differentiate these from other ad hoc networking types. Therefore, the design of secure mechanisms for authenticating and validating message transmissions between vehicles and eliminating adversarial elements from networks are of considerable importance in VANET research. This report offers a review of VANET features and security difficulties. The paper also summarizes certain chief threats to the authentication, confidentiality, and availability of secure services.

Highlights

  • IntroductionThe increase in vehicular traffic on street networks has led to rising road queues and fatalities

  • Most people these days use vehicular transports to transit between various places

  • A Vehicular ad hoc network (VANET) scheme is depicted in Fig. 1, comprising a trio of key components to include trusted authority (TA), fixed road side units (RSUs), and an on-board unit (OBU) installed in moving vehicles (Ghosh et al, 2009)

Read more

Summary

Introduction

The increase in vehicular traffic on street networks has led to rising road queues and fatalities. These can be lessened by affording proper knowledge about street conditions and the neighboring environment to the driving public via secure means. Increases in severe driving problems has led to more street accidents and increased traffic congestion To resolve these types of problems, vehicles can be equipped with networked communications for exchanging data between vehicles and among vehicles as well as road side units (RSUs). Dedicated short-range communications (DSRC) radio (Jiang and Delgrossi, 2008) is utilized for V2V and V2R communication exchanges in VANETs. The information shared in VANETs is categorized into dual categories, namely safety data and non-safety data.

Summary of VANET Schemes
VANET Schematic Model
Features of VANETs
VANET Applications
Challenges with VANETs
Timing Constraints
Network Scale
High Nodes Mobility
Volatility
Security prerequisites
Authentication
Integrity
Confidentiality
Availability
Access Control
Sybil Attacks
Node Impersonation Attacks
Malware Attack
Eavesdropping
Man-in-the-Middle Attacks
Misleading Information
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call