A Review of Security Threats, Solutions and Trust Management in VANETs
##plugins.themes.academic_pro.article.main##
Abstract
The real time implementation of Vehicular Ad-Hoc Network (VANET) applications is challenging unless their security and privacy requirements are strongly addressed. Thus many researchers’ attention is directed towards providing security solutions that mitigate threats to VANET environments. In this paper we give readers an overview of the VANET environment, Intelligent Transport System (ITS) communication configurations and wireless access standards used in VANETs. We have described a general VANET model, the VANET Communication Evaluation Model (VCEM) with two of its communication environments Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) in the context of security, privacy and trust. The roles and relationships of several participating entities in these communication environments along with a few important communication patterns, critical to VANETs are also discussed. The typical security requirements for VANETs are discussed and the categorization of several security threats to these requirements is made. A description on the relevance of these threats for VANETs with illustrations is also made. We have discussed the general working of two types of security schemes, one based on Public Key Infrastructure (PKI) and the other on ID-based cryptosystems. We have outlined the features of various PKI based security schemes and their drawbacks in general. We have focused on several ID based cryptosystems and briefly outlined their merits and demerits with a comparison on performance. In this paper, we have also discussed an important VANET issue, trust among peers. Various types of trust management models in VANETs and the related research efforts have been summarized. The significant properties of an efficient trust management model are discussed and a comparative study of few of the existing trust management schemes is made. Finally the challenges in developing secured VANET applications are presented.
##plugins.themes.academic_pro.article.details##
How to Cite
B G Premasudha, V Ravi Ram, J Miller, & R Suma. (2016). A Review of Security Threats, Solutions and Trust Management in VANETs. International Journal of Next-Generation Computing, 7(1), 39–57. https://doi.org/10.47164/ijngc.v7i1.103
References
- Al-Qutayri, M., Yeun, C., and Al-Hawi, F. 2010. Security and privacy of intelligent vanets. Computational Intelligence and Modern Heuristics.
- Chen, C., Zhang, J., Cohen, R., and Ho, P. H. 2010. A trust-based message propagation and evaluation framework in vanets. In Proceedings of International Conference on Information Technology Convergence and Services.
- Chen, Q., Jiang, D., and Delgrossi, L. 2009. Ieee 1609.4 dsrc multi-channel operations and its implications on vehicle safety communications. In Proceedings of IEEE Vehicular Networking Conference (VNC). pp.1–8.
- Dotzer, F., Fischer, L., and Magiera, P. 2005. Vars: A vehicle ad-hoc network reputation system. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
- Dressler, F., Kargl, F., Ott, J., Tonguz, O., and Wischhof, L. 2001. Reaserch challenges in intervehicular communication: Lessons of the 2010 dagstuhl seminar. IEEE Communications Magazine. Eichler, S. 2007. A security architecture concept for vehicular network nodes. ICICS.
- Fuentes, J. M. D., Gonzalez, A. I., and Ribagorda, A. 2010. Overview of security issues in vehicular ad-hoc networks. Handbook of Research on Mobility and Computing.
- Fussler, H., Schnaufer, S., Transier, M., , and Effelsberg, W. 2007. Vehicular ad-hoc networks: From vision to reality and back. IEEE Wireless on Demand Network Systems and Services.
- Gerlach, M. 2007. Trust for vehicular applications. In Proceedings of International Symposium on Autonomous Decentralized Systems.
- Golle, P., Greene, D., and Staddon, J. 2004. Detecting and correcting malicious data in vanets. VANET.
- Harsch, C., Festag, A., and Papadimitratos, P. 2007. Secure position-based routing for vanets. In Proceedings of IEEE 66th Vehicular Technology Conference. pp.26–30.
- Jinyuan, S., Chi, Z., and Yuguang, F. 2007. An id-based framework achieving privacy and non-repudiation. In Proceedings of IEEE Vehicular Ad Hoc Networks, Military Communications Conference. pp.1–7.
- Kamat, P., Baliga, A., and Trappe, W. 2006. An identity-based security framework for vanets. VANET06 .
- Leinmuller, T., Schoch, E., and Kargl, F. 2006. Securing vehicular ad hoc networksposition verification approaches for vehicular ad hoc networks. IEEE Wireless Communications Magazine.
- Li, C. T., Hwang, M. S., and Chu, Y. P. 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31, 12.
- Lin, X., Lu, R., Zhang, C., Zhu, H., and Ho, P. H. 2008. Security in vehicular ad hoc networks. IEEE Communication Magazine 46, 4.
- Mass, Y. and Shehory, O. 2001. Distributed trust in open multi-agent systems. Trust in Cyber-societies Springer-Verlag.
- Minhas, U. F., Zhang, J., Tran, T., and Cohen, R. 2010. Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5, 1.
- Patwardhan, A., Joshi, A., Finin, T., and Yesha, Y. 2006. A data intensive reputation management scheme for vehicular ad hoc networks. In Proceedings of 3rd Annual International Conference on Mobile and Ubiquitous Systems. pp.1–8.
- Plobl, K., Nowey, T., and Mletzko, C. 2006. Towards a security architecture for vehicular ad hoc networks. ARES.
- Ram, V. R. and Premasudha, B. G. 2014. Investigating considerative factors for robust vanet application development. The Mediterranean Journal of Computers and Networks 10, 3.
- Raya, M. and Hubaux, J. P. 2005. The security of vehicular ad hoc networks. 3rd ACM workshop on Security of ad hoc and sensor networks.
- Raya, M. and Hubaux, P. 2007. Securing vehicular ad hoc networks. Journal of Computer Security 15.
- Raya, M., Papadimitratos, P., Gligor, V., and Hubaux, J. P. 2007. On data-centric trust establishment in ephemeral ad hoc networks. LCA-REPORT-2007-003 .
- Raya, M., Papadimitratos, P., and Hubaux, J. P. 2006. Securing vehicular communications. IEEE Wireless Communications Vol.13, No.5.
- Sabahi, F. 2011. The security of vehicular adhoc networks. In Proceedings of Third International Conference on Computational Intelligence, Communication Systems and Networks.