3. Introduction
VANET is a kind of mobile network (MANETs) that allows communication
with or without infrastructure installed at the edges of the roads
VANETs establish communication among vehicles (V2V) and roadside
infrastructure (V2I)
The coalescence of network and conveyance becomes inevitably
ineluctable, which brings much accomodation to people
Security in VANET is an immensely colossal challenge because there are
variants of attacks that imperil communications of moving conveyances
Main security quandaries can occur during the transmission of information
Different types of attacks can violate and interrupt the connection and there
are flaws or anomalies typical of the communication system
Security protocols, formalization of standards and different analysis of
attacks, have been proposed to improve VANET security, but the field is
still large to explore
3
4. Challenges in Existing Method
Mobility of vehicle is high, and it may receive many
messages simultaneously, validating the identity of
vehicle and message should be done in a less time.
Previous authentication scheme validated the
messages efficiently but it’s computational and
memory overhead is high.
4
5. Focuses on improvement of security-privacy
preservation of data exchanged for connected cars.
5
Preserve Privacy
7. References
1. M.J. Kang , J.W. Kang , Intrusion detection system using deep neural network for in-vehicle network security, PLoS ONE 11 (6) (2016)
1–17 .
2. H. Sedjelmaci , S.M. Senouci , M.A. Abu-Rgheff. , An efficient and lightweight intrusion detection mechanism for service-oriented
vehicular networks, IEEE In- ternet Things J. 6 (1) (2014) 570–577 .
3. H.I. Ahmed , N.A. Elfeshawy , S.F. Elzoghdy , et al. , A neural network-based learn- ing algorithm for intrusion detection systems,
Wireless Person. Commun. 97 (2) (2017) 3097–3112 .
4. Nishu Gupta , Ravikanti Manaswini , Bongaram Saikrishna and Francisco Silva ,and Ariel Teles , “Authentication-Based Secure Data
Dissemination Protocol and Framework for 5G-Enabled VANET”, FutureInternet, MDPI.
5. Malik, A.; Pandey, B. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets.
Int. J. Netw. Secur. 2018, 20, 601–608. doi:10.6633/IJNS.201807_ 20(4).01.
6. Liu, J.; Li, Q.; Cao, H.; Sun, R.; Du, X.; Guizani, M. MDBV: Monitoring Data Batch Verification for Survivability of Internet of
Vehicles. IEEE Access 2018, 6, 50974–50983.
7. Tan, H.; Ma, M.; Labiod, H.; Boudguiga, A.; Zhang, J.; Chong, P.H.J. A Secure and Authenticated Key Management Protocol (SA-
KMP) for Vehicular Networks. IEEE Trans. Veh. Technol. 2016, 65, 9570–9584. doi:10.1109/TVT.2016.2621354.
8. Vijayakumar, P.; Azees, M.; Kannan, A.; Jegatha Deborah, L. Dual Authentication and Key Management Techniques for Secure Data
Transmission in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2016, 17, 1015–1028. doi:10.1109/TITS.2015.2492981.
9. Wang, F.; Xu, Y.; Zhang, H.; Zhang, Y.; Zhu, L. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for
VANET. IEEE Trans. Veh. Technol. 2016, 65, 896–911. doi:10.1109/TVT.2015.2402166.
10. K. Rabieh, M. M. E. A. Mahmoud, and M. Younis, ‘‘Privacy-preserving route reporting schemes for traffic management systems,’’ IEEE
Trans. Veh. Technol., vol. 66, no. 3, pp. 2703–2713, Mar. 2017.
11. R. Kolandaisamy et al., ‘‘A multivariant stream analysis approach to detect and mitigate DDoS attacks in vehicular ad hoc networks,’’
Wireless Commun. Mobile Comput., vol. 2018, May 2018, Art. no. 2874509.
12. D. Tian et al., ‘‘A microbial inspired routing protocol for VANETs,’’ IEEE J. Internet Things, vol. 5, no. 4, pp. 2293–2303, Aug. 2018.
7