SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22
149 This work is licensed under Creative Commons Attribution 4.0 International License.
Review of Prevention Schemes for Modification Attack in Vehicular Ad
hoc Networks
Mahmood A. Al-shareeda1
, Mohammed Anbar2
, Selvakumar Manickam3
and Iznan H. Hasbullah4
1
Student, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
2
Senior Lecturer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
3
Associate Professor, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
4
Research Officer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA
2
Corresponding Author: anbar@nav6.usm.my
ABSTRACT
Vehicular Ad-hoc Network (VANET) technology is
the basis of Intelligent Transportation System (ITS)
connectivity that enables the delivery of useful information to
and fro between vehicles in vehicle-to-vehicle communication
mode; or between vehicle and infrastructure in vehicle-to-
infrastructure mode for safety and comfort. However, due to
the openness of the wireless medium used by VANET, the
technology is vulnerable to security threats in both
communication modes. In this study, the essential
background of VANET from architectural point of view and
communication types are discussed. Then, the overview of
modification attack in VANET is presented. In addition, this
paper thoroughly reviews the existing prevention schemes for
modification attack in VANET. This review paper reveals
that there is still a need for a better and more efficient
preventive scheme to address the modification attack in
VANET.
Keywords— Vehicular Ad hoc Networks (VANETs),
Security, Modification Attacks, Authentication and
Attacks
I. INTRODUCTION
Nowadays, vehicles have become an
indispensable part of our life that is being utilized by many
for the transportation of goods and people with the rapid
development of manufacturing channels and the proceed of
person culture [1]–[3]. The roads, especially in urban
areas, are inundated with vehicles such as personal cars,
police cars, ambulances, trucks, and buses; and the
numbers are increasing every year, without sign of decline.
The increase has led to multiple issues, such as increased
road accidents, traffic management difficulties and traffic
congestion during rush hour. Researchers turned their
focus on vehicular networks and intelligent transport
systems (ITS) to address these issues [4]–[7].
No vehicular network technologies garnered as
much attention as Vehicle Ad hoc Network (VANET).
VANET is the technology that forms the backbone of
Intelligent Transportation System (ITS) connectivity that
enables the delivery of useful information to and fro
vehicles for safety and comfort. has been designed to
equip every vehicle with an on-board unit (OBU) and to
deploy road-side units (RSUs) along the road and at road
intersects. VANETs has two modes of communication:
vehicles-to-vehicles (V2V) communication and vehicle-to-
infrastructure (V2I) communication modes, as shown in
Figure 1. Despite of many benefits of VANETs in ITS
application, there are also challenges in implementing
VANET, such as protection of traffic-related messages,
and high computational and communicational costs. As a
result, any proposal for new security schemes for VANET
should address all these challenges [8]–[10].
Figure 1: The architecture of VANETs
Security is important first of all because nodes in
VANETs can be transmitted via a wireless media. The
attacker may control channels of communication for easy
capture, deletion, playback, or alteration of messages
transmitted by traffic or even other vehicle impersonation.
For instance, false traffic messages can be sent by an
attacker to mislead vehicles and RSU for incorrect
decisions causing traffic jams and accidents. The recipient
must thus authenticate the source of the message received
and verify their integrity before accepting it [11].
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22
150 This work is licensed under Creative Commons Attribution 4.0 International License.
VANET authentication needs to work hand in
hand with the privacy of vehicles [12]. Without privacy, an
attacker could intercept and analyze the messages to learn
the vehicle’s true identity or its travel route. Identity-
anonymity is, therefore, necessary to ensure that each
vehicle is protected and un-linkable. However, the TA
should be given the privilege to identify the identity of
malicious vehicle that transmits false message in order to
revoke its registration.
VANET uses Dedicated short-range
communication (DSRC) protocol for wireless
communication. The 5.9-GHz DSRC protocol stipulates
that each VANET-enabled vehicle must send a message to
other vehicles every 100 to 300 ms [13][14]. This could
lead to extremely high computation costs for all vehicles to
check and verify all these messages [15][16].
These factors (security, privacy and efficiency)
form the justification for the need to further improve the
computational and communicational efficiency alongside
the assurance of safety and privacy of traffic-related
messages by proposing an efficient preventive scheme for
modification attack in VANET.
The rest of the paper is structured as follows. An
architecture of VANETs is presented in Section II,
followed by a brief review of the modification attacks in
Section III. Several existing works in the literature are
reviewed in Section IV. Lastly, Section V concludes this
paper.
II. THE ARCHITECTURE OF VANETS
VANET Components
1- Trusted Authority (TA)
TA is a trustworthy entity equipped with high
computational and communicational capabilities. The TA
is responsible for initializing and providing the other
entities in VANET with system parameters. The
registration of RSUs and OBUs also falls under the
responsibility of the TA for the entire VANET ecosystem.
2- Road-Side Units (RSUs)
The RSUs can be found installed along the
roadside as part of the vehicle-to-TA infrastructure. It
communicates via wired and wireless technology with the
TA and vehicles, respectively. It is also responsible to
monitor the traffic for suspicious vehicle behavior and to
provide the TA with the vehicle’s identity.
3- On-Board Units (OBUs)
Every vehicle that is equipped with an OBU plays
an important role in the transmission of information to
other vehicles by nearby RSU using DSRC protocol.
B. VANET Communications
VANETs has two modes of communication:
vehicles-to-vehicles (V2V) communication and vehicle-to-
infrastructure (V2I) communication modes. These wireless
communication modes use DSRC protocol.
1- Vehicle-To-Vehicle (V2V) Communication
V2V communication uses multi-hop transmission
to propagate messages to other vehicles through several
hops. In V2V communication, the vehicle performs
message exchanges only with other vehicles. The vehicle
uses this information to avoid accident and traffic
disruption. For example, when a traffic jam happens, the
vehicle broadcasts the situation so that other vehicles
approaching the site could make changes to their travel
route to avoid the congestion. DSRC protocol stipulates
that each VANET-enabled vehicle must send a message to
other vehicles every 100 to 300 ms [13]. In a scenario that
have 100 vehicles within the range of RSU using such a
protocol means that between 333 to 1,000 messages are
transmitted every second and must be verified by the
receiver [14].
2- Vehicle-To-Infrastructure (V2I) Communication
V2I communication uses single-hop transmission
where a broadcast message is transmitted from a fixed
structure on the side of the road. In V2I communication,
the vehicle performs message exchange with other vehicles
or nearby RSU by using DSRC protocol which helps to
process, receive and broadcast message during travel. The
RSU provides internet access for driver and passenger and
forward the message to TA for further use.
III. OVERVIEW OF MODIFICATION
ATTACK
The open nature of the wireless communication
medium used by VANETs exposes the information
exchanged to various types of attacks, such as modification
attack. It is common for attackers to alter or modify the
intercepted message in V2V and V2I communication. The
attackers could deliberately send false information to
VANETs to create confusion for vehicles which could lead
to severe safety consequences. The presence of
modification attack in VANET could result in high
computational and communicational costs due to the
frequent updates of bogus traffic-related message. The
receiver must always check and verify all the messages
received from other vehicle to avoid falling victim to
modification attack.
IV. LITERTURE SURVEY
A number of studies have been conducted by
researchers to address security attacks in VANET. This
section presents a critical review on several related works
on security schemes to withstand modification attack in
VANET.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22
151 This work is licensed under Creative Commons Attribution 4.0 International License.
In 2017, Zhong et al. [17] proposed a security and
privacy scheme that uses the list of revocation when it is
indicated by the list of registration to minimize the think
time available to the adversary. The main aim of the
proposed scheme is to reduce the disclosed time of the
revocation list. Each vehicle sends message-signature in
{T5, m, σm} format to other vehicles and nearby RSUs,
where T5 timestamp, m traffic-related message and σm
signature of message. The attacker cannot modify the
message-signature {T5 , m, σm} to {T5, m∗, σm∗}.
In the same year, many conditional privacy-
preserving authentication schemes utilizing bilinear pairing
or ideal tamper-proof devices have been proposed. Wu et
al. [18] introduced an efficient location-based conditional
privacy-preserving authentication scheme. This scheme is
based on location for VANET. Each vehicle sends
message-signature in {mi, PIDvi, Ti, Tvi, hki, Ri, σi} format
to other vehicles and nearby RSUs, where mi traffic-
related message, PIDvi pseudo-identity, Ti current
timestamp, hki hash message, Ri public key and σi
signature of message. For the modification attack to be
successful, the adversary has to forge a signature σi∗ that
will be used by the receiver to authenticate itself and
validate the message-signature. However, the authors
showed that under random oracle model, the adversary
cannot generate a legitimate signature with non-negligible
probability.
In 2018, Li et al. [19] proposed an efficient,
provably secure, and anonymous conditional privacy
preserving authentication (EPA-CPPA) approach for V2V
and V2I communication. In their scheme, the batch
verification supports verification of a large number of
messages with improved efficiency. Each vehicle sends
message-signature in {Mi, PIDi.l, PKi,l, Ri, Ti, Sigi} format
to other vehicles and nearby RSUs, where Mi traffic-
related message, PIDi.l the pseudo-identity, PKi,l public
key, Ri parameter, Ti current timestamp and Sigi signature
of message. After eavesdropping on VANET connection,
the modification attack has the ability to modify the
content of Mi. To protect the integrity of the message, a
signature of a vehicle on Mi is created. Since only the
particular vehicle knows its private key, no modification
attack is able to create legitimate message-signature.
Besides, the vehicle periodically changes its private key.
Therefore, this approach is secure from message
modification attack.
In 2019, Alazzawi et al. [20] introduced a robust
pseudo-identity-based scheme utilizing a pseudonym
instead of an original identity. Each vehicle sends
message-signature in the format {T, TSK, PIDV, w, σm} to
other vehicles and nearby RSUs, where T current
timestamp, TSK timestamp of signature, which was
obtained from RSU, PIDV the pseudo-identity, w to reduce
the computation cost of verifier side and σm signature of
message. In their scheme, the message-signature includes
the signature σm, which guarantees the safety of the
message from modification attack. During the signature
verification process, the vehicle does not accept the
message. Therefore, this approach is secure against
message modification attacks.
In the same year and the same authors, Alazzawi
et al. [21] proposed security and privacy schemes based on
a pseudonym root. In this scheme, each node stores just
one of the main (pseudonym root) to hide its original
identity. Thus, the node does not require thousands of
pseudonyms within their certificates, therefore removing
the large storage requirement for the TA and OBU. This
scheme utilizes a cuckoo filter to store the personal
information of vehicles within the range of RSU. Each
vehicle sends a message-signature in {T, msg, σmsg} format
to other vehicles and nearby RSUs, where T current
timestamp, msg message traffic-related and σmsg signature
of message. The σmsg embedded in each message-signature
prevents modification of msg by attackers. This is because
of pseudonym Ps of vehicle and private key s of the system
that are embedded in each σmsg. Therefore, this scheme is
not vulnerable to the modification attack.
V. CONCLUSION
VANETs is gaining significant attention in recent
year due to the interest and advancement in smart city and
its related technology such as ITS. VANETs provide not
only safety application but also support broad range of
infotainment applications for drivers and passengers.
However, the wireless communication medium used by
VANETs is susceptible to security threats due to its open
nature. Modification attack is one of the threats facing
VANETs where an adversary could change and modify the
information contained in the traffic-related message on
driving environment which cause disruption of the system.
This paper provides an overview of modification attack on
VANET. In addition, this paper thoroughly reviews
existing prevention schemes for modification attack in
VANET. This review paper shows that there is still a need
for an efficient preventive scheme to prevent modification
attack on VANET.
ACKNOWLEDGEMENT
This work is partially supported by National
Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia
and External Grant by UMobile Sdn Bhd (Grant no:
304/PNAV/650958/U154).
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-3 (June 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22
152 This work is licensed under Creative Commons Attribution 4.0 International License.
REFERENCES
[1] M. Al Shareeda, A. Khalil, & W. Fahs. (2019).
Realistic heterogeneous genetic-based RSU placement
solution for V2I networks. Int. Arab J. Inf. Technol., 16(3),
540–547.
[2] B. H. Khudayer, M. Anbar, S. M. Hanshi, & T.-C.
Wan. (2020). Efficient route discovery and link failure
detection mechanisms for source routing protocol in
mobile ad-hoc networks. IEEE Access, 8, 24019–24032.
[3] M. Alzubaidi, M. Anbar, Y.-W. Chong, & S. Al-
Sarawi. (2018). Hybrid monitoring technique for detecting
abnormal behaviour in RPL-based network. J. Commun.,
13(5).
[4] M. Al Shareeda, A. Khalil, & W. Fahs. (2018).
Towards the optimization of road side unit placement
using genetic algorithm. In: International Arab Conference
on Information Technology (ACIT), pp. 1–5.
[5] A. K. Al-Ani, M. Anbar, A. Al-Ani, & D. R. Ibrahim.
(2020). Match-prevention technique against denial-of-
service attack on address resolution and duplicate address
detection processes in IPv6 link-local network. IEEE
Access, 8, 27122–27138.
[6] M. Al-Shalabi, M. Anbar, & T.-C. Wan. (2018).
Proposed mechanism based on genetic algorithm to find
the optimal multi-hop path in wireless sensor networks. In:
International Conference of Reliable Information and
Communication Technology, pp. 510–522.
[7] M. A. Al-Shalabi, M. Anbar, & A. Obeidat. (2019).
Alternating sensing process to prolong the lifetime of
wireless sensor networks. J. Theor. Appl. Inf.
Technol.(JATIT), 97(7), 2132–2141.
[8] Z. Lu, G. Qu, & Z. Liu. (2018). A survey on recent
advances in vehicular network security, trust, and privacy.
IEEE Trans. Intell. Transp. Syst., 20(2), 760–776.
[9] D. Manivannan, S. S. Moni, & S. Zeadally. (2020).
Secure authentication and privacy-preserving techniques in
vehicular Ad-hoc NETworks (VANETs). Veh. Commun.,
pp. 100247.
[10] H. Peng, L. Liang, X. Shen, & G. Y. Li. (2018).
Vehicular communications: A network layer perspective.
IEEE Trans. Veh. Technol., 68(2), 1064–1078.
[11] M. Wazid, A. K. Das, R. Hussain, G. Succi, & J. J. P.
C. Rodrigues. (2019). Authentication in cloud-driven IoT-
based big data environment: Survey and outlook. J. Syst.
Archit., 97, 185–196.
[12] F. Qu, Z. Wu, F.-Y. Wang, & W. Cho. (2015) A
security and privacy review of VANETs. IEEE Trans.
Intell. Transp. Syst., 16(6), 2985–2996.
[13] V. K. V. Karthikeyan. (2016). An investigation of the
factors leading drivers to overlook privacy issues in the
vehicular infotainment system in India. University of
Sheffield.
[14] X. Yang et al. (2019). A lightweight authentication
scheme for vehicular ad hoc networks based on MSR. Veh.
Commun., 15, 16–27.
[15] C. Zhang, R. Lu, X. Lin, P.-H. Ho, & X. Shen.
(2008). An efficient identity-based batch verification
scheme for vehicular sensor networks. In: IEEE
INFOCOM 2008-The 27th Conference on Computer
Communications, pp. 246–250.
[16] C. Zhang, X. Lin, R. Lu, & P.-H. Ho. (2008). RAISE:
An efficient RSU-aided message authentication scheme in
vehicular communication networks. In: IEEE International
Conference on Communications, pp. 1451–1457.
[17] H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017).
Conditional privacy-preserving authentication using
registration list in vehicular ad hoc networks. IEEE Access,
6, 2241–2250.
[18] L. Wu, J. Fan, Y. Xie, J. Wang, & Q. Liu. (2017).
Efficient location-based conditional privacy-preserving
authentication scheme for vehicle ad hoc networks. Int. J.
Distrib. Sens. Networks, 13(3), 1550147717700899.
[19] J. Li et al. (2018). EPA-CPPA: An efficient,
provably-secure and anonymous conditional privacy-
preserving authentication scheme for vehicular ad hoc
networks. Veh. Commun., 13, 104–113.
[20] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen.
(2019). Efficient conditional anonymity with message
integrity and authentication in a vehicular ad-hoc network.
IEEE Access, 7, 71424–71435.
[21] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen.
(2019). Robust conditional privacy-preserving
authentication based on pseudonym root with cuckoo filter
in vehicular ad hoc networks. KSII Trans. Internet Inf.
Syst., 13(12), 6121–6144.

More Related Content

What's hot

Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083Maksuda Mou
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksjournalBEEI
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
 
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Dr. Amarjeet Singh
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Study on LTE support for V2X services
Study on LTE support for V2X servicesStudy on LTE support for V2X services
Study on LTE support for V2X servicesYi-Hsueh Tsai
 
VANET BASED SECURED ACCIDENT PREVENTION SYSTEM
VANET BASED SECURED ACCIDENT PREVENTION SYSTEMVANET BASED SECURED ACCIDENT PREVENTION SYSTEM
VANET BASED SECURED ACCIDENT PREVENTION SYSTEMIAEME Publication
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityShambhu Ram
 
IRJET- Challenges Faced by Routing Protocols Over Vanets
IRJET-  	  Challenges Faced by Routing Protocols Over VanetsIRJET-  	  Challenges Faced by Routing Protocols Over Vanets
IRJET- Challenges Faced by Routing Protocols Over VanetsIRJET Journal
 

What's hot (20)

Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
1102060,1102073,1102083
1102060,1102073,11020831102060,1102073,1102083
1102060,1102073,1102083
 
A review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networksA review on various security attacks in vehicular ad hoc networks
A review on various security attacks in vehicular ad hoc networks
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANETTechnical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
 
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular...
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
IoT Connected Car Insights from Patents
IoT Connected Car Insights from PatentsIoT Connected Car Insights from Patents
IoT Connected Car Insights from Patents
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
F0332838
F0332838F0332838
F0332838
 
Sub1565
Sub1565Sub1565
Sub1565
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based PrivacySecurity in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
 
MS_Thesis_AOB
MS_Thesis_AOBMS_Thesis_AOB
MS_Thesis_AOB
 
Study on LTE support for V2X services
Study on LTE support for V2X servicesStudy on LTE support for V2X services
Study on LTE support for V2X services
 
VANET BASED SECURED ACCIDENT PREVENTION SYSTEM
VANET BASED SECURED ACCIDENT PREVENTION SYSTEMVANET BASED SECURED ACCIDENT PREVENTION SYSTEM
VANET BASED SECURED ACCIDENT PREVENTION SYSTEM
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurity
 
IRJET- Challenges Faced by Routing Protocols Over Vanets
IRJET-  	  Challenges Faced by Routing Protocols Over VanetsIRJET-  	  Challenges Faced by Routing Protocols Over Vanets
IRJET- Challenges Faced by Routing Protocols Over Vanets
 
Sustainability 07-02028
Sustainability 07-02028Sustainability 07-02028
Sustainability 07-02028
 

Similar to Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks

Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communicationathirayanpericse
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnetIJCNCJournal
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-finASMA HADELI
 
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETA Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation designProf Ansari
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetIAEME Publication
 

Similar to Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks (20)

Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Vehicular adhoc network for communication
Vehicular adhoc network for communicationVehicular adhoc network for communication
Vehicular adhoc network for communication
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
Internet for vanet network communications fleetnet
Internet for vanet network communications  fleetnetInternet for vanet network communications  fleetnet
Internet for vanet network communications fleetnet
 
Vehicular network-project-fin
Vehicular network-project-finVehicular network-project-fin
Vehicular network-project-fin
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANETA Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANET
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
Aodv routing protocol implementation design
Aodv routing protocol implementation designAodv routing protocol implementation design
Aodv routing protocol implementation design
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
 
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanetWay to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
 
VANET
VANETVANET
VANET
 

More from Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in IndiaDr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryDr. Amarjeet Singh
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemDr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22 149 This work is licensed under Creative Commons Attribution 4.0 International License. Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks Mahmood A. Al-shareeda1 , Mohammed Anbar2 , Selvakumar Manickam3 and Iznan H. Hasbullah4 1 Student, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA 2 Senior Lecturer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA 3 Associate Professor, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA 4 Research Officer, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), 11800, Penang, MALAYSIA 2 Corresponding Author: anbar@nav6.usm.my ABSTRACT Vehicular Ad-hoc Network (VANET) technology is the basis of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro between vehicles in vehicle-to-vehicle communication mode; or between vehicle and infrastructure in vehicle-to- infrastructure mode for safety and comfort. However, due to the openness of the wireless medium used by VANET, the technology is vulnerable to security threats in both communication modes. In this study, the essential background of VANET from architectural point of view and communication types are discussed. Then, the overview of modification attack in VANET is presented. In addition, this paper thoroughly reviews the existing prevention schemes for modification attack in VANET. This review paper reveals that there is still a need for a better and more efficient preventive scheme to address the modification attack in VANET. Keywords— Vehicular Ad hoc Networks (VANETs), Security, Modification Attacks, Authentication and Attacks I. INTRODUCTION Nowadays, vehicles have become an indispensable part of our life that is being utilized by many for the transportation of goods and people with the rapid development of manufacturing channels and the proceed of person culture [1]–[3]. The roads, especially in urban areas, are inundated with vehicles such as personal cars, police cars, ambulances, trucks, and buses; and the numbers are increasing every year, without sign of decline. The increase has led to multiple issues, such as increased road accidents, traffic management difficulties and traffic congestion during rush hour. Researchers turned their focus on vehicular networks and intelligent transport systems (ITS) to address these issues [4]–[7]. No vehicular network technologies garnered as much attention as Vehicle Ad hoc Network (VANET). VANET is the technology that forms the backbone of Intelligent Transportation System (ITS) connectivity that enables the delivery of useful information to and fro vehicles for safety and comfort. has been designed to equip every vehicle with an on-board unit (OBU) and to deploy road-side units (RSUs) along the road and at road intersects. VANETs has two modes of communication: vehicles-to-vehicles (V2V) communication and vehicle-to- infrastructure (V2I) communication modes, as shown in Figure 1. Despite of many benefits of VANETs in ITS application, there are also challenges in implementing VANET, such as protection of traffic-related messages, and high computational and communicational costs. As a result, any proposal for new security schemes for VANET should address all these challenges [8]–[10]. Figure 1: The architecture of VANETs Security is important first of all because nodes in VANETs can be transmitted via a wireless media. The attacker may control channels of communication for easy capture, deletion, playback, or alteration of messages transmitted by traffic or even other vehicle impersonation. For instance, false traffic messages can be sent by an attacker to mislead vehicles and RSU for incorrect decisions causing traffic jams and accidents. The recipient must thus authenticate the source of the message received and verify their integrity before accepting it [11].
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22 150 This work is licensed under Creative Commons Attribution 4.0 International License. VANET authentication needs to work hand in hand with the privacy of vehicles [12]. Without privacy, an attacker could intercept and analyze the messages to learn the vehicle’s true identity or its travel route. Identity- anonymity is, therefore, necessary to ensure that each vehicle is protected and un-linkable. However, the TA should be given the privilege to identify the identity of malicious vehicle that transmits false message in order to revoke its registration. VANET uses Dedicated short-range communication (DSRC) protocol for wireless communication. The 5.9-GHz DSRC protocol stipulates that each VANET-enabled vehicle must send a message to other vehicles every 100 to 300 ms [13][14]. This could lead to extremely high computation costs for all vehicles to check and verify all these messages [15][16]. These factors (security, privacy and efficiency) form the justification for the need to further improve the computational and communicational efficiency alongside the assurance of safety and privacy of traffic-related messages by proposing an efficient preventive scheme for modification attack in VANET. The rest of the paper is structured as follows. An architecture of VANETs is presented in Section II, followed by a brief review of the modification attacks in Section III. Several existing works in the literature are reviewed in Section IV. Lastly, Section V concludes this paper. II. THE ARCHITECTURE OF VANETS VANET Components 1- Trusted Authority (TA) TA is a trustworthy entity equipped with high computational and communicational capabilities. The TA is responsible for initializing and providing the other entities in VANET with system parameters. The registration of RSUs and OBUs also falls under the responsibility of the TA for the entire VANET ecosystem. 2- Road-Side Units (RSUs) The RSUs can be found installed along the roadside as part of the vehicle-to-TA infrastructure. It communicates via wired and wireless technology with the TA and vehicles, respectively. It is also responsible to monitor the traffic for suspicious vehicle behavior and to provide the TA with the vehicle’s identity. 3- On-Board Units (OBUs) Every vehicle that is equipped with an OBU plays an important role in the transmission of information to other vehicles by nearby RSU using DSRC protocol. B. VANET Communications VANETs has two modes of communication: vehicles-to-vehicles (V2V) communication and vehicle-to- infrastructure (V2I) communication modes. These wireless communication modes use DSRC protocol. 1- Vehicle-To-Vehicle (V2V) Communication V2V communication uses multi-hop transmission to propagate messages to other vehicles through several hops. In V2V communication, the vehicle performs message exchanges only with other vehicles. The vehicle uses this information to avoid accident and traffic disruption. For example, when a traffic jam happens, the vehicle broadcasts the situation so that other vehicles approaching the site could make changes to their travel route to avoid the congestion. DSRC protocol stipulates that each VANET-enabled vehicle must send a message to other vehicles every 100 to 300 ms [13]. In a scenario that have 100 vehicles within the range of RSU using such a protocol means that between 333 to 1,000 messages are transmitted every second and must be verified by the receiver [14]. 2- Vehicle-To-Infrastructure (V2I) Communication V2I communication uses single-hop transmission where a broadcast message is transmitted from a fixed structure on the side of the road. In V2I communication, the vehicle performs message exchange with other vehicles or nearby RSU by using DSRC protocol which helps to process, receive and broadcast message during travel. The RSU provides internet access for driver and passenger and forward the message to TA for further use. III. OVERVIEW OF MODIFICATION ATTACK The open nature of the wireless communication medium used by VANETs exposes the information exchanged to various types of attacks, such as modification attack. It is common for attackers to alter or modify the intercepted message in V2V and V2I communication. The attackers could deliberately send false information to VANETs to create confusion for vehicles which could lead to severe safety consequences. The presence of modification attack in VANET could result in high computational and communicational costs due to the frequent updates of bogus traffic-related message. The receiver must always check and verify all the messages received from other vehicle to avoid falling victim to modification attack. IV. LITERTURE SURVEY A number of studies have been conducted by researchers to address security attacks in VANET. This section presents a critical review on several related works on security schemes to withstand modification attack in VANET.
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22 151 This work is licensed under Creative Commons Attribution 4.0 International License. In 2017, Zhong et al. [17] proposed a security and privacy scheme that uses the list of revocation when it is indicated by the list of registration to minimize the think time available to the adversary. The main aim of the proposed scheme is to reduce the disclosed time of the revocation list. Each vehicle sends message-signature in {T5, m, σm} format to other vehicles and nearby RSUs, where T5 timestamp, m traffic-related message and σm signature of message. The attacker cannot modify the message-signature {T5 , m, σm} to {T5, m∗, σm∗}. In the same year, many conditional privacy- preserving authentication schemes utilizing bilinear pairing or ideal tamper-proof devices have been proposed. Wu et al. [18] introduced an efficient location-based conditional privacy-preserving authentication scheme. This scheme is based on location for VANET. Each vehicle sends message-signature in {mi, PIDvi, Ti, Tvi, hki, Ri, σi} format to other vehicles and nearby RSUs, where mi traffic- related message, PIDvi pseudo-identity, Ti current timestamp, hki hash message, Ri public key and σi signature of message. For the modification attack to be successful, the adversary has to forge a signature σi∗ that will be used by the receiver to authenticate itself and validate the message-signature. However, the authors showed that under random oracle model, the adversary cannot generate a legitimate signature with non-negligible probability. In 2018, Li et al. [19] proposed an efficient, provably secure, and anonymous conditional privacy preserving authentication (EPA-CPPA) approach for V2V and V2I communication. In their scheme, the batch verification supports verification of a large number of messages with improved efficiency. Each vehicle sends message-signature in {Mi, PIDi.l, PKi,l, Ri, Ti, Sigi} format to other vehicles and nearby RSUs, where Mi traffic- related message, PIDi.l the pseudo-identity, PKi,l public key, Ri parameter, Ti current timestamp and Sigi signature of message. After eavesdropping on VANET connection, the modification attack has the ability to modify the content of Mi. To protect the integrity of the message, a signature of a vehicle on Mi is created. Since only the particular vehicle knows its private key, no modification attack is able to create legitimate message-signature. Besides, the vehicle periodically changes its private key. Therefore, this approach is secure from message modification attack. In 2019, Alazzawi et al. [20] introduced a robust pseudo-identity-based scheme utilizing a pseudonym instead of an original identity. Each vehicle sends message-signature in the format {T, TSK, PIDV, w, σm} to other vehicles and nearby RSUs, where T current timestamp, TSK timestamp of signature, which was obtained from RSU, PIDV the pseudo-identity, w to reduce the computation cost of verifier side and σm signature of message. In their scheme, the message-signature includes the signature σm, which guarantees the safety of the message from modification attack. During the signature verification process, the vehicle does not accept the message. Therefore, this approach is secure against message modification attacks. In the same year and the same authors, Alazzawi et al. [21] proposed security and privacy schemes based on a pseudonym root. In this scheme, each node stores just one of the main (pseudonym root) to hide its original identity. Thus, the node does not require thousands of pseudonyms within their certificates, therefore removing the large storage requirement for the TA and OBU. This scheme utilizes a cuckoo filter to store the personal information of vehicles within the range of RSU. Each vehicle sends a message-signature in {T, msg, σmsg} format to other vehicles and nearby RSUs, where T current timestamp, msg message traffic-related and σmsg signature of message. The σmsg embedded in each message-signature prevents modification of msg by attackers. This is because of pseudonym Ps of vehicle and private key s of the system that are embedded in each σmsg. Therefore, this scheme is not vulnerable to the modification attack. V. CONCLUSION VANETs is gaining significant attention in recent year due to the interest and advancement in smart city and its related technology such as ITS. VANETs provide not only safety application but also support broad range of infotainment applications for drivers and passengers. However, the wireless communication medium used by VANETs is susceptible to security threats due to its open nature. Modification attack is one of the threats facing VANETs where an adversary could change and modify the information contained in the traffic-related message on driving environment which cause disruption of the system. This paper provides an overview of modification attack on VANET. In addition, this paper thoroughly reviews existing prevention schemes for modification attack in VANET. This review paper shows that there is still a need for an efficient preventive scheme to prevent modification attack on VANET. ACKNOWLEDGEMENT This work is partially supported by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia and External Grant by UMobile Sdn Bhd (Grant no: 304/PNAV/650958/U154).
  • 4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-3 (June 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.3.22 152 This work is licensed under Creative Commons Attribution 4.0 International License. REFERENCES [1] M. Al Shareeda, A. Khalil, & W. Fahs. (2019). Realistic heterogeneous genetic-based RSU placement solution for V2I networks. Int. Arab J. Inf. Technol., 16(3), 540–547. [2] B. H. Khudayer, M. Anbar, S. M. Hanshi, & T.-C. Wan. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8, 24019–24032. [3] M. Alzubaidi, M. Anbar, Y.-W. Chong, & S. Al- Sarawi. (2018). Hybrid monitoring technique for detecting abnormal behaviour in RPL-based network. J. Commun., 13(5). [4] M. Al Shareeda, A. Khalil, & W. Fahs. (2018). Towards the optimization of road side unit placement using genetic algorithm. In: International Arab Conference on Information Technology (ACIT), pp. 1–5. [5] A. K. Al-Ani, M. Anbar, A. Al-Ani, & D. R. Ibrahim. (2020). Match-prevention technique against denial-of- service attack on address resolution and duplicate address detection processes in IPv6 link-local network. IEEE Access, 8, 27122–27138. [6] M. Al-Shalabi, M. Anbar, & T.-C. Wan. (2018). Proposed mechanism based on genetic algorithm to find the optimal multi-hop path in wireless sensor networks. In: International Conference of Reliable Information and Communication Technology, pp. 510–522. [7] M. A. Al-Shalabi, M. Anbar, & A. Obeidat. (2019). Alternating sensing process to prolong the lifetime of wireless sensor networks. J. Theor. Appl. Inf. Technol.(JATIT), 97(7), 2132–2141. [8] Z. Lu, G. Qu, & Z. Liu. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst., 20(2), 760–776. [9] D. Manivannan, S. S. Moni, & S. Zeadally. (2020). Secure authentication and privacy-preserving techniques in vehicular Ad-hoc NETworks (VANETs). Veh. Commun., pp. 100247. [10] H. Peng, L. Liang, X. Shen, & G. Y. Li. (2018). Vehicular communications: A network layer perspective. IEEE Trans. Veh. Technol., 68(2), 1064–1078. [11] M. Wazid, A. K. Das, R. Hussain, G. Succi, & J. J. P. C. Rodrigues. (2019). Authentication in cloud-driven IoT- based big data environment: Survey and outlook. J. Syst. Archit., 97, 185–196. [12] F. Qu, Z. Wu, F.-Y. Wang, & W. Cho. (2015) A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst., 16(6), 2985–2996. [13] V. K. V. Karthikeyan. (2016). An investigation of the factors leading drivers to overlook privacy issues in the vehicular infotainment system in India. University of Sheffield. [14] X. Yang et al. (2019). A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun., 15, 16–27. [15] C. Zhang, R. Lu, X. Lin, P.-H. Ho, & X. Shen. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250. [16] C. Zhang, X. Lin, R. Lu, & P.-H. Ho. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: IEEE International Conference on Communications, pp. 1451–1457. [17] H. Zhong, B. Huang, J. Cui, Y. Xu, & L. Liu. (2017). Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access, 6, 2241–2250. [18] L. Wu, J. Fan, Y. Xie, J. Wang, & Q. Liu. (2017). Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int. J. Distrib. Sens. Networks, 13(3), 1550147717700899. [19] J. Li et al. (2018). EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy- preserving authentication scheme for vehicular ad hoc networks. Veh. Commun., 13, 104–113. [20] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access, 7, 71424–71435. [21] M. A. Alazzawi, H. Lu, A. A. Yassin, & K. Chen. (2019). Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Trans. Internet Inf. Syst., 13(12), 6121–6144.