scholarly journals A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)

Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3589 ◽  
Author(s):  
Sheikh ◽  
Liang ◽  
Wang

Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems. VANET has drawn significant attention from the wireless communication research community and has become one of the most prominent research fields in intelligent transportation system (ITS) because of the potential to provide road safety and precautionary measures for the drivers and passengers. In this survey, we discussed the basic overview of the VANET from the architecture, communication methods, standards, characteristics, and VANET security services. Second, we presented the threats and attacks and the recent state-of-the-art methods of the VANET security services. Then, we comprehensively reviewed the authentication schemes that can protect vehicular networks from malicious nodes and fake messages. Third, we discussed the latest simulation tools and the performance of the authentication schemes in terms of simulation tools, which was followed by the VANET applications. Lastly, we identified the open research challenges and gave future research directions. In sum, this survey fills the gap of existing surveys and summarizes the latest research development. All the security attacks in VANETs and their related countermeasures are discussed with respect to ensuring secure communication. The authentication schemes and comprehensive applications were introduced and analyzed in detail. In addition, open research challenges and future research directions were issued.

2010 ◽  
Vol 4 (10) ◽  
pp. 1137-1152 ◽  
Author(s):  
Marshall Riley ◽  
Kemal Akkaya ◽  
Kenny Fong

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4253
Author(s):  
Xiaoqiang Sun ◽  
F. Richard Yu ◽  
Peng Zhang ◽  
Weixin Xie ◽  
Xiang Peng

In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly. Because homomorphic encryption supports computations of the ciphertext, it can completely solve this problem. In this paper, we provide a comprehensive survey of secure computation based on homomorphic encryption in VANETs. We first describe the related definitions and the current state of homomorphic encryption. Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. Then, we describe the state of the art of secure basic operations, data aggregation, data query and other data computation in VANETs. Finally, several challenges and open issues are discussed for future research.


2021 ◽  
Vol 10 (5) ◽  
pp. 2627-2635
Author(s):  
Mustafa Maad Hamdi ◽  
Lukman Audah ◽  
Mohammed Salah Abood ◽  
Sami Abduljabbar Rashid ◽  
Ahmed Shamil Mustafa ◽  
...  

Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.


Author(s):  
Varun G. Menon

Opportunistic routing uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network. This, in turn improves the delivery rate and reliability of data transmission in the network. Compared to all previous classes of protocols, opportunistic routing offers numerous advantages which is exploited by the latest applications for efficient communication and resource sharing in dynamic ad hoc networks. The objective of this research work is to review and classify all the major opportunistic routing protocols proposed for dynamic ad hoc networks. Further the issues and challenges with each of these existing protocol is discussed and future research directions are put forward.


Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 9
Author(s):  
Ali H. Wheeb ◽  
Rosdiadee Nordin ◽  
Asma’ Abu Samah ◽  
Mohammed H. Alsharif ◽  
Muhammad Asghar Khan

Telecommunications among unmanned aerial vehicles (UAVs) have emerged recently due to rapid improvements in wireless technology, low-cost equipment, advancement in networking communication techniques, and demand from various industries that seek to leverage aerial data to improve their business and operations. As such, UAVs have started to become extremely prevalent for a variety of civilian, commercial, and military uses over the past few years. UAVs form a flying ad hoc network (FANET) as they communicate and collaborate wirelessly. FANETs may be utilized to quickly complete complex operations. FANETs are frequently deployed in three dimensions, with a mobility model determined by the work they are to do, and hence differ between vehicular ad hoc networks (VANETs) and mobile ad hoc networks (MANETs) in terms of features and attributes. Furthermore, different flight constraints and the high dynamic topology of FANETs make the design of routing protocols difficult. This paper presents a comprehensive review covering the UAV network, the several communication links, the routing protocols, the mobility models, the important research issues, and simulation software dedicated to FANETs. A topology-based routing protocol specialized to FANETs is discussed in-depth, with detailed categorization, descriptions, and qualitatively compared analyses. In addition, the paper demonstrates open research topics and future challenge issues that need to be resolved by the researchers, before UAVs communications are expected to become a reality and practical in the industry.


2019 ◽  
Vol 2019 ◽  
pp. 1-23 ◽  
Author(s):  
Muhammad Sameer Sheikh ◽  
Jun Liang

Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide safety and precautionary measures to the drivers and passengers, respectively. VANETs are quite different from the mobile ad hoc networks (MANETs) in terms of characteristics, challenges, system architecture, and their application. In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges. Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. Thirdly, we cover the mobility and network simulators, as well as other simulation tools, followed by the performance of authentication schemes. Finally, we discuss the comfort and safety applications of VANETs. In sum, this paper comprehensively covers the entire VANET system and its applications by filling the gaps of existing surveys and incorporating the latest trends in VANETs.


Author(s):  
Kevin C. Lee ◽  
Uichin Lee ◽  
Mario Gerla

The chapter provides a survey of routing protocols in vehicular ad hoc networks. The routing protocols fall into two major categories of topology-based and position-based routing. The chapter discusses the advantages and disadvantages of these routing protocols, explores the motivation behind their design and trace the evolution of these routing protocols. Finally, it concludes the chapter by pointing out some open issues and possible direction of future research related to VANET routing.


Sign in / Sign up

Export Citation Format

Share Document