This document summarizes a survey of security attacks and solutions in vehicular ad hoc networks (VANETs). It discusses several types of attacks that can occur in VANETs, including Sybil attacks, wormhole attacks, and spoofing attacks. It also reviews related work on VANET security and categorizes existing attacks. The document outlines security requirements for VANETs such as confidentiality, integrity, availability, privacy, and non-repudiation. It provides examples of how different attacks can be carried out and potential solutions to counter each type of attack.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has been developed and some possible solutions to overcome the attacks have been discussed.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes
In Vehicular Communication, the security system against the attacker is very important. Sybil attacks have been regarded as a serious security threat to ad hoc networks and sensor networks. It is an attack in which an original identity of the vehicle is corrupted or theft by an attacker to creates multiple fake identities. Detecting such type of attacker and the original vehicle is a challenging task in VANET. This survey paper briefly presents various Sybil attack detection mechanism in VANET.
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
Road accident and traffic congestion are global issues faced by many countries around the world. Road accident led to fatalities and injuries, while traffic congestion led to inconvenient driving and fuel energy wastage. Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestion.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
Review of authentication techniques for wireless networks & maneteSAT Journals
Abstract Mobile ad hoc network (MANET) is the most popular area of research nowadays due to its tremendous applications (military battlefield, commercial sectors, disaster areas, collaborative work etc). MANET is self organized network where all nodes are mobile in nature and may act as router as well as host because of its autonomous nature. In such a versatile environment, security of the network becomes a major issue. However, due to dynamic topology of the network and mobility of the nodes, it is very hard to achieve security goals such as confidentiality, authentication, integrity, non repudiation and availability. Among all these security goals, authentication is probably the most complex and important issue in MANET. Before communication, we should know to whom exactly we are talking, and then there is a question of protecting the data by means of cryptography. Authentication deals with identity of sender/receiver which is very important and required aspect for MANET where there is no central administration present in the network. In the present work, the issues related to the authentication in MANET, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET Key Words: MANET, Authentication, Traditional Wireless Network (TWN), Threshold Cryptography, Certificate Authority.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
A review on various security attacks in vehicular ad hoc networksjournalBEEI
Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
Vehicular ad-hoc networks (VANETs) technology has come out as an important research field over the last few years. VANETs are the likely an influencing approach to provide safety of driver and other applications for the traffic conditions as well as passengers. Being dynamic in nature, it establishes the network, according to the situation and need of the users and provides reliable communication among the vehicles. Due to its great benefits, it is highly vulnerable to various attacks and security in VANET should be taken into consideration. This paper presented the security attacks between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Many research works have been done to improve the performance and security of this network. The main aim of this paper is the security using hashing and techniques to calculate the trust in VANETs.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
VANET SECURITY AND PRIVACY – AN OVERVIEWIJNSA Journal
Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise
many challenges where the security and privacy concerns are the most critical ones. In this paper, we
provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a
brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper.
Besides that, a classification of the various VANET attacks based on the communication system
layersisprovided in this paper. In addition, the different types of VANET adversaries and attackers
arepresented here.In general, this paper aims to provide a good piece of information about VANET
security and privacy, in order to be used as a tool to help researchers in this field in developing secure
privacy-preserving approaches for VANET.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
Compared to wired networks, Ad hoc networks are more vulnerable to security attacks
due to the lack of trusted centralized authority, lack of trust relationships between nodes. This paper
focuses on Sybil attack and its detection. A malicious node can generate and control a large number
of logical identities on a single device. This gives the illusion to network as these are different
legitimate nodes. An algorithm is proposed using position verification to detect the Sybil attack. The
algorithm is implemented in Network Simulator and the throughput, and packet delivery ratio with
and without Sybil attack.
Review of authentication techniques for wireless networks & maneteSAT Journals
Abstract Mobile ad hoc network (MANET) is the most popular area of research nowadays due to its tremendous applications (military battlefield, commercial sectors, disaster areas, collaborative work etc). MANET is self organized network where all nodes are mobile in nature and may act as router as well as host because of its autonomous nature. In such a versatile environment, security of the network becomes a major issue. However, due to dynamic topology of the network and mobility of the nodes, it is very hard to achieve security goals such as confidentiality, authentication, integrity, non repudiation and availability. Among all these security goals, authentication is probably the most complex and important issue in MANET. Before communication, we should know to whom exactly we are talking, and then there is a question of protecting the data by means of cryptography. Authentication deals with identity of sender/receiver which is very important and required aspect for MANET where there is no central administration present in the network. In the present work, the issues related to the authentication in MANET, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET Key Words: MANET, Authentication, Traditional Wireless Network (TWN), Threshold Cryptography, Certificate Authority.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
In this Slide, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology.
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
in this slide, it will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attacker‟s behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the
effect of these attacks on other components of network.
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
MALICIOUS NODE DETECTION THROUGH AODV IN VANET ijasuc
VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of
various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing
protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one
of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing
protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to
communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious
attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will
affect the performance of the entire network as it consumes more bandwidth and drops packets which in
turn reduce the performance of AODV routing protocol and vanet.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Network infrastructures have played important part in most daily communications for business industries,
social networking, government sectors and etc. Despites the advantages that came from such
functionalities, security threats have become a daily struggle. One major security threat is hacking.
Consequently, security experts and researchers have suggested possible security solutions such as
Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and
Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason
behind that, there is a few researches that examine the behavior of hackers. This paper formally and
practically examines in details the behavior of hackers and their targeted environments. Moreover, this
paper formally examines the properties of one essential pre-hacking step called scanning and highlights its
importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in
most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason behind that, there is a few researches that examine the behavior of hackers. This paper formally and practically examines in details the behavior of hackers and their targeted environments. Moreover, this paper formally examines the properties of one essential pre-hacking step called scanning and highlights its importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...IJNSA Journal
Openness of wireless communication medium and flexibility in dealing with wireless communication protocols and their vulnerabilities create a problem of poor security. Due to deficiencies in the security mechanisms of the first line of defense such as firewall and encryption, there are growing interests in detecting wireless attacks through a second line of defense in the form of Wireless Intrusion Detection System (WIDS). WIDS monitors the radio spectrum and system activities and detects attacks leaked from the first line of defense. Selecting a reliable WIDS system depends significantly on its functionality and performance evaluation. Comprehensive and credible evaluation of WIDSs necessitates taking into
account all possible attacks. While this is operationally impossible, it is necessary to select representative
attack test cases that are extracted mainly from a comprehensive classification of wireless attacks. Dealing with this challenge, this paper proposes a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator. This proposed taxonomy includes all relevant necessary and sufficient dimensions for wireless attacks classification and it helps in generating and extracting the representative attack test cases.
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...IJNSA Journal
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
Confidentiality, Integrity and Availability (CIA)
are major components of security goals. The increasing research interest, potential
applications and security problem in VANET lead to the needs to review the
attacks on security goals. In this paper, the aim is to present the survey of attacks on security goals and describe in details the nature of attacks and the behaviour of attackers through different scenarios in the network.
Application of Attack Graphs in Intrusion Detection Systems: An ImplementationCSCJournals
Internet attacks are continuously increasing in the last years, in terms of scale and complexity, challenging the existing defense solutions with new complications and making them almost ineffective against multi-stage attacks, in particular the intrusion detection systems which fail to identify such complex attacks. Attack graph is a modeling technique used to visualize the different steps an attacker might select to achieve his end game, based on existing vulnerabilities and weaknesses in the system. This paper studies the application of attack graphs in intrusion detection and prevention systems (IDS/IPS) in order to better identify complex attacks based on predefined models, configurations, and alerts. As a “proof of concept”, a tool is developed which interfaces with the well-known SNORT [1] intrusion detection system and matches the alerts with an attack graph generated using the NESSUS [2] vulnerability scanner (maintained up-to-date using the National Vulnerability Database (NVD) [3]) and the MULVAL [4] attack graph generation library. The tool allows to keep track with the attacker activities along the different stages of the attack graph.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Similar to Security attacks and solutions in vehicular ad hoc networks a survey (20)
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Security attacks and solutions in vehicular ad hoc networks a survey
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
DOI : 10.5121/ijans.2014.4201 1
SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR
AD HOC NETWORKS: A SURVEY
Vinh Hoa LA, Ana CAVALLI
Department of Software and Networks
Telecom SudParis, 9 rue Charles Fourier 91011 EVRY, France.
ABSTRACT
Vehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for
researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency
and other added services. However, VANETs are themselves vulnerable against attacks that can directly
lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This
paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as
well as updating new attacks and categorizing them into different classes.
KEYWORDS
Vehicular Ad hoc Networks (VANETs), Security, Privacy, VANETs Attacks.
1. INTRODUCTION
In the last few years, accompanying the massive deployment of wireless technologies and the
growing number of wireless products on motorized vehicles including remote keyless entry
devices, personal digital assistants (PDAs), laptops, and mobile telephones, automotive industries
have opened a wide variety of possibilities for both drivers and their passengers. Vehicular Ad
hoc Networks (VANETs) have attracted a lot of attention in research community because of their
varied value added services, namely vehicle safety, automated toll payment, traffic management,
enhanced navigation, location-based service for finding the closest fuel station, travel lodge or
restaurant and simply access to the Internet [1], [5].
Fig. 1. Hierarchy of wireless ad hoc networks
However, many forms of attacks against VANETs have emerged recently and alarmed the
unsettling situation of these networks’ security. Being an implementation of Mobile Ad hoc
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
2
NETworks (MANETs) (Fig. 1), VANETs inherit all the discovered and undiscovered security
and privacy vulnerabilities related to MANETs. Furthermore, VANETs have a number of
distinctive properties [5] that could be also vulnerabilities for attackers to exploit. Those
properties include the particular nature of communication in VANETs. Connections in a VANET
in particular and in any Wireless Ad hoc Network in general are based on node-to-node
communications: every node is able to act as either a host inquiring data or a router forwarding
data. There are two types of nodes: (i) RoadSide Units (RSUs) standing for fixed nodes
provisioned along the route and (ii) OnBoard Unit (OBU) referring to mobile nodes (i.e.,
vehicles) equipped with some sort of radio interface that enables connecting to other nodes in
wireless manner. Fig. 2 depicts a general view of VANETs structure. It is worth mentioning that
the speed of mobile nodes- vehicles in VANETs may be much higher than in MANETs. This
reason makes VANETs very dynamic in nature. A number of nodes can communicate once as a
group but can then rapidly change their own structure caused by leaving of a member or joining
of another node. Therefore, it is expected that nodes are continuously “keeping in touch” with
other nodes in the group to maintain the survival of the network. This aspect of VANETs seems
to be very vulnerable and attacks can be unconsciously or intentionally performed to damage a
part of or the total network. As mentioned above, VANETs provide many added applications that
are safety, entertainment, or infotainment oriented. Attacks to VANETs may lead to catastrophic
consequences such as the losses of lives in the case of traffic accident, losses of time (e.g.,
tampering traffic jam made by attacks) or financial losses (i.e., in payment services).
Fig. 2. A basic structure of VANETs [5]
The researches on VANETs security were triggered in the middle of 2000s and genuinely
bloomed since 2007. In order to provide a thorough survey covering a big number of
publications related to VANETs attacks, we searched for and collected papers approaching this
topic from 2007 to 2013 that had made a significant contribution to the improvement of
VANETs security. Fig. 3 indicated the numbers of publications each year that we found by
searching on five main technical publishers, including IEEE explore, ACM Portal, Springer
Online Library, Wiley Inter Science, and Elsevier Online Library, with either “VANETs
security” “VANETs attacks” “VANETs vulnerabilities” keywords in title or abstract.
There has been many research works on the VANETs security in general and VANETs attacks
in particular, especially the last three years from 2011 to 2013. However, there is a few survey
works in the literature on VANETs attacks. In the existing surveys [2], [3], [6], some of attacks
were not enough illustrated in detail and some were missed. Our paper aims to introduce more
concisely the possible attacks, their mechanisms and influences as well as their corresponding
solutions to thwart those attacks. We characterize the attacks (e.g., type of attacker, security
aspects that are damaged) for a further classification. For each attack, we try to perform a
concise scenario to better identify this attack. We equally point out the properties that can be
collected to detect the attacks. These properties could be the input for an intrusion detector that
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
3
we consider as future work of our research. Our purpose in this study is to not only depict a
detailed list containing up-to-date attacks but also a global view of security threats in VANETs,
in order to provide a useful starting point for researchers interested in the subject and to help
VANETs designers to develop and deploy secure VANETs infrastructures.
Fig. 3. VANETs security publications from 2007 to 2013
The rest of this paper is organized as follows: Section 2 presents some related works that are
similar to our study. Section 3 is devoted to the VANETs security requirements. Section 4
contains the VANETs attacks and their corresponding solutions as well as examples. Section 5
summarizes the attacks that were mentioned in previous section, characterizes, and classifies
them. Finally, we discuss about our study, conclude, and propose the future work in section 6.
2. RELATED WORK
In 2010, J.T. Isaac, S. Zeadally, and J.S. Camara published a paper on “Security attacks and
solutions for vehicular ad hoc networks” [6]. They discussed some of the major security attacks
that have been reported on VANETs before and in 2010. They presented also the corresponding
security solutions that have been proposed to prevent those security attacks and vulnerabilities.
The main security areas that they focused on include anonymity, key management, privacy,
reputation, and location. Anonymity is a critical issue in VANETs concerning the physical
identity of mobile nodes (i.e., vehicles) that should be kept secret in unauthorized components’
point of view. Key management deals with problems on generating, distributing, and storing keys.
For ad hoc networks, there are three main approaches for key management reported by literature,
namely key exchange, key agreement, and key management infrastructure. Privacy refers to the
ability of the drivers to protect sensitive information about them against unauthorized observers.
Reputation of a member is usually evaluated by a particular one in answering the question “How
much is this member trustable?” in a specific setting or domain of interest. Certainly, trustworthy
behavior will be trusted and encouraged by reputation systems. In VANETs, the defense against
compromised nodes, and malicious ones can be assured by applying such kinds of systems.
Location refers to vehicle position in VANETs that can be considered as one of the most valuable
pieces of information in geographic routing. It is often readily available through positioning
services such as global positioning system (GPS).
In 2012, in the paper “Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs)” [3],
Mohammed Saeed Al-kahtani identified different security attacks, classified them, compared their
defending mechanism in VANETs and suggested some future possibilities in this area. The author
categorized three types of attacker as follows:
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
4
Insider vs. Outsider
If the attacker is a member node who can communicate with other members of the network, it
will be known as an Insider and able to attack in various ways. Whereas, an outsider, who is not
authenticated to directly communicate with other members of the network, have a limited
capacity to perform an attack (i.e., have less variety of attacks).
Malicious vs. Rational
A malicious attacker uses various methods to damage the member nodes and the network without
looking for its personal benefit. On the contrary, a rational attacker expects its own benefit from
the attacks. Thus, these attacks are more predictable and follow some patterns.
Active vs. Passive
An active attacker can generate new packets to damage the network whereas a passive attacker
only eavesdrop the wireless channel but cannot generate new packets (i.e., less harmful).
In fact, there is another attribute to characterize an attacker, which is presented in [8]:
Local vs. Extended
An attacker is considered as local if it is limited in scope, even if it possesses several entities (e.g.,
vehicles or base stations). Otherwise, an extended attacker broadens its scope by controlling
several entities that are scattered across the network. This distinction is especially important in
wormhole attacks that we will describe later.
In 2013, Irshad Ahmed Sumra proposed five different classes of attacks [2] and every class is
expected to provide better perspectives for the VANETs security (Table 1). This paper attempted
to propose a classification and an identification of different attacks in VANETs.
Table 1: Proposed classification of attacks in [2]
Monitoring Attacks
Social Attacks
Timing Attacks
Application Attacks
Network Attacks
In first class- Network Attacks, attackers can directly affect other vehicles and infrastructure.
These attacks are on the high level of danger because these affect the whole network. Whilst, in
Application Attacks class, the objectives of attackers are applications that provide added service
in VANETs. The attacker is mainly interested in changing contents used in applications and
abusing it for their own benefits. The third class- Timing Attacks- is a type of attacks in which
attackers’ main objective is to add some time slot in original message, for example, to create
delays in order to block this message come to the receiver before the expiration of its lifetime. All
unmoral messages, which trigger bad emotions of other drivers, are classified into the class Social
Attacks. Finally, attacks in which monitoring and tracking activities are performed are laying in
the class Monitoring Attacks.
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
5
The related works above alert an alarming situation of VANETs security. In the next sections, we
aim to emphasize security requirements in VANETs, then introduce more concisely the possible
attacks, their corresponding countermeasures and propose another classification of these attacks.
3. VANETS SECURITY REQUIREMENTS
In this section, we present the main security requirements for VANETs [11], [12], [27], [37].
Three properties regarding security that cannot be ignored are confidentiality, integrity, and
availability. In terms of VANETs security, these three properties stand for some more specific
meaning.
Confidentiality
In VANETs, the definition of confidentiality refers to “confidential communication” [11]. In a
group, none except group members are able to decrypt the messages that are broadcasted to every
member of group; and none (even other members) except a dedicated receiver member is capable
to decrypt the message devoted to it.
Integrity
It ensures that data or messages delivered among nodes are not altered by attackers. This concept
in VANETs often combines with the concept “authentication” to guarantee that: A node should
be able to verify that a message is indeed sent and signed by another node without being modified
by anyone. In order to gain this property, Data Verification is also required: Once the sender
vehicle is authenticated, the receiving vehicle performs data verifications to check whether the
message contains the correct or corrupted data.
Availability
The network should be available even if it is under an attack without affecting its performance.
This concept of VANETs is not different from itself in other kinds of networks but not easy to
ensure because of the mobility in high speed of vehicles.
Besides three main security requirements above, the following security aspects should be also
satisfied in VANETs:
Privacy
The profile or a driver’s personal information must be maintained against unauthorized access.
We consider the following two cases:
- Communications between vehicles and RSUs: Privacy means that an eavesdropper is impossible
to decide whether two different messages come from the same vehicle.
- Communications between vehicles: Privacy means that determining whether two different valid
messages coming from the same vehicle is intensely burdensome for everyone except a legitimate
component (e.g., tracing manager [12]).
Identity privacy preserving is similar to the concept of “Anonymity”. That means identifying the
physical identity of a message’s originator should be computationally expensive.
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
6
Traceability and revocability
Although a vehicles real identity should be hidden from other vehicles, there should be still a
component (e.g., Trace Manager) that has the ability to obtain vehicles' real identities and to
revoke them from future usage.
Non-repudiation
Drivers must be reliably identified in case of accidents. A sender should have mandatory
responsibility in transmitting the messages for the investigation that will determine the correct
sequence and content of messages exchanged before the accident [8].
Real-time constraints
Since vehicles are able to randomly move in and quickly move out to a group of a VANET for a
short duration, real-time constraints should be maintained.
Low Overhead
All messages in VANETs are time critical. Thus, “low overhead” is essential to retain the
usefulness and validity of messages.
4. ATTACKS AND COUNTERMESURES IN VANETS
In this paper, only the attacks perpetrated against VANETs communication are taken into
consideration. Physical problems (e.g., hardware tampering) are out of the scope of our research.
4.1. Sybil Attack
The Sybil attack is a well-known hurtful attack that was firstly described and formalized by
Douceur [13] in the context of peer-to-peer networks. To perform this kind of attack, a vehicle
declares to be several vehicles either at the same time or in succession. This attack is very
dangerous since a vehicle can claim to be in different positions at the same time, thereby creating
chaos and huge security risks in the network. The Sybil attack damages network topologies and
connections as well as network bandwidth consumption. In Fig. 4, an attacker A transmits
multiple messages with different identities to the other vehicles. Thus, other vehicles realize that
there is currently a heavy traffic.
Fig. 4. Sybil attack
Traditionally in ad hoc networks, there are three types of defenses against Sybil attacks
introduced, namely registration, position verification, and radio resource testing [16].
Registration itself is not enough to prevent Sybil attacks, because a malicious node has possibility
to register with multiple identities by non-technical means such as stealing. Moreover, a strict
registration may lead to serious privacy troubles. In position verification [26], the position of
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
7
nodes will be verified. The goal is to make certain that each physical node refers to one and only
one identity. Radio resource testing [13], [14] is based on the assumption that all physical entities
are limited in resources. The work done in [13] uses computational puzzles to test computational
resources of each node. The general idea bases on the maximum capacity that an entity can solve
multiple puzzles simultaneously. If an attacker impersonates different entities at the same time, it
will have too many puzzles. It will be impossible to resolve and will be detected. However, this
technique is not appropriate for VANETs since an attacker node can be equipped with more
computational resources than an ordinary node. Thus, to eliminate this problem, the work done in
[14] proposed another approach relying on the assumption that “any physical device has only one
radio” and “a radio is incapable of simultaneously sending or receiving on more than one
channel”. As a concrete example, in order to verify that none of the neighbors is Sybil identity, a
node can assign each of its n neighbors a different channel on that it broadcasts some messages.
Then it selects randomly a channel to listen. If its neighbor is legitimate, it will be able to get the
response from the corresponding channel. Otherwise, that must be a Sybil node. The detection
rate arises if this test is repeatedly processed.
However, the three aforementioned types of defenses are designed for indoor applications and
they all rely on fixed base stations or specific hardware. They need an adaptation to be suitable
for the highly mobile context of vehicular networks. The paper [16] proposed another solution
rely on detection and localization of Sybil Nodes in VANETs. The motivation is to estimate a
nodes position by analyzing its signal strength distribution between transmitted and received
signals and then verify whether the estimated position is consistent with the claimed position. If
they are too far from each other, this considered node is suspected as a Sybil attacker. The
weakness of this approach is the fact that it is mostly based on several assumptions, which are not
always realistic in practical VANETs.
In [36], the authors try to deal with the Sybil attack by public key cryptography. A Public Key
Infrastructure for VANETs (VPKI) is proposed. The authors illustrate a complete solution to
enhance communication security by addressing the key distribution and key revocation. The Sybil
attack is always detected very early since each vehicle is authenticated correspondingly with its
public key. Nonetheless, like any other cryptography-based approaches, the deployment of VPKI
is a heavy and uncertain issue that must be tested to assess the possible utilization in reality.
Timestamp series [24] is another approach that relies on the prevention of Sybil attack and the
protection of drivers’ privacy. This approach works well for an initial development stage of
VANETs with the availability of the RSU infrastructure. The main idea is the fact that two
vehicles rarely pass through a few different RSUs far apart from each other at the same time. The
RSU issues digital timestamps to each vehicle that passes through it. A traffic message sent out
by any vehicle, thus, contains several timestamps corresponding to the previous passed RSUs.
Therefore, if multiple traffic messages consist of very similar series of timestamps, they might be
suspected as Sybil messages original from a single vehicle. This approach is economic since it
does not use computational expensive public key infrastructure (PKI) or Internet accessible
RSUs. Fig. 5 illustrates the working scenario of timestamp series approach.
Fig. 5. Illustration of the timestamp series approach [24]
In [10], RobSAD (Robust method of Sybil Attack Detection) is proposed to detect Sybil attacks in
the initial deployment stage of VANETs. The idea is based on the differences between the normal
8. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
8
and abnormal motion trajectories of legitimate vehicles and malicious vehicles respectively.
Under normal conditions, people drive vehicles at their own chosen speed, selected path, and
keep a reasonable safe distance from other vehicles. Therefore, physical nodes will have different
motion trajectories and they can move separately. In contrast, Sybil nodes normally have the
same motion trajectories all the time. The similarity of Sybil nodes motion trajectories is
unrealistic and unacceptable in real world. RobSAD supposes that in VANETs, authorized
infrastructures (i.e., RSUs) can provide vehicles digital signatures along with timestamp on-
demand or periodically. Helped by RSUs, each node can record these signatures and use them to
draw signature vectors of neighbors. Then it compares and measures the differences from the
neighboring nodes signature vectors to detect Sybil nodes independently. Thus, this is a very
effective, unique, and robust approach with higher detection rate and lower system requirements.
This is because each node does not require collaborating with neighboring nodes but can detect
attacks independently by comparing digital signatures. This approach uses infrastructure only to
broadcast the digital signatures along with timestamp to other vehicular nodes.
The work done in [15] assesses the role of some assumptions on Sybil attack detection’s success
rate. In order to measure such a success rate, they evaluate the number of nodes that could be
cheated from the sender’s points of view and receiver’s one. From the sender’s point of view,
they evaluate the impact of transmission power tuning. From the receiver’s point of view, they
characterize the impact of bi-directional antenna over omnidirectional antenna. To remain
general, this assessment uniquely counts on reception signal strength and direction. Instead of
using a propagation model to determine the precise location of a given node, they take into
account a free space propagation model to compute the distance between transmitters and
receivers. Their main purpose is to estimate the effects of assumptions and antennas in detecting
Sybil attackers. Results demonstrate that Sybil attacks can be easily detected using bi-directional
antennas in receiver’s side. Thus, the usage of multiple antennas is significant in VANETs.
4.2. Bogus Information and Bush telegraph
The attacker performing Bogus Information attack can be outsider (intruder) or insider
(legitimate user). The idea is to transmit incorrect or bogus information in the network for
personal advantage. For instance, an attacker may transmit a message announcing “Heavy traffic
conditions” to the others in order to make its movement easier on the road.
Fig. 6. Bogus information attack [8]
Fig. 6 demonstrates an example of bogus information attack, colluding attackers (A and C)
disseminate false information to affect the decisions of other vehicles (D) and thus clear the way
of attacker E.
9. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
9
Bush telegraph is a developed form of the bogus information attack. The difference in this case is
that the attacker possesses multiple entities spread over several wireless hops. It is worth
mentioning that after receiving a packet, a hop checks the error. If the error is small enough to be
considered within tolerance margins, this error could be tolerated and ignored. Abusing this
vulnerability, a bush telegraph attacker appends incremental errors to the data at each hop. At
each hop, the error is probably small enough to be tolerated and hence accepted by the neighbor.
After passing several hops, the overall accumulation of these errors eventually yields to bogus
information.
ECDSA (Elliptic Curve Digital Signature Algorithm) [17] is named as one of the solutions for
this kind of attacks. It is a message authentication scheme that uses hashing technique to keep
messages more secured and provides strong authentication for the destination vehicles. Each
vehicle consists of private key and public key. The public key is available to all vehicles in
VANETs. Both the source and destination nodes are obligated to agree upon the elliptic curve
domain parameters. ECDSA is actually a variant of DSA (Digital Signature Algorithm). The
source vehicle hashes the message, encrypts it by using a secured hash algorithm and private key,
and sends the message to the destination vehicle. At the destination, the message is decrypted
using the public key, which is the hash of the message. This scheme is more secured on message
authentications since hashing is a strong technique. Changes in messages will also change in the
hash message, which makes it unique.
4.3. Impersonation Attack and Masquerade
In an ad hoc network, a node is free to move in and out. In VANETs, a host is uniquely identified
by IP and MAC address. These measurements are not enough to authenticate senders. The
attacker uses MAC and IP spoofing in order to get identity of other nodes and hide into the
network. If there is no authentication process in order to make the network secure from malicious
nodes, a malicious vehicle can send message on behalf of other vehicles to gain its own benefits
or create chaos, traffic jam or accidents and hide itself [38]. It is achieved by using masquerade
identity and messages fabrication, alteration and replay. For example, a malicious node may
impersonate an ambulance to request others for priority lane or demand nearby RSUs to change
traffic lights to green. Thus, the message from an OBU has to be integrity-checked and
authenticated before it can be relied on. Furthermore, privacy is recently another important issue.
A driver has the right to prevent the disclosure of its driving routes that someone can reach by
tracing messages sent by its OBU. Therefore, an anonymous communications protocol is needed.
While being anonymous, a vehicles real identity should be able to be revealed by a trusted party
when necessary. For instance, the driver must be incapable to escape by using an anonymous
identity after sending out fake messages and causing an accident. That is the reason why this kind
of privacy is called conditional privacy. The work done in [19], [20] proposes a scheme, called
SPECS (Secure and Privacy Enhancing Communications Schemes), to ensure the security and
privacy issues of V2V (Vehicle-To-Vehicle) communications and detect the impersonation
attacks. This approach is based on the idea of IBV (Identity-Based Batch Verification) Scheme
[21], which suffers from impersonation attack and cannot fulfill privacy requirements. To protect
the identity of each vehicle it uses pseudo-identity and a shared secret key mi between a vehicle
and RSU. The security scheme [3], [20] works as follows:
To authenticate a vehicle with a nearby RSU, the scheme uses Public Key Infrastructure (PKI)
and assumes that there is a trusted authority (TA) constantly online and trusted. A secure fixed
network is dedicated for communications between RSUs and TA. To avoid bottleneck, redundant
TAs with identical functionalities and databases are installed. It is worth noting that TA is the
only authorized component knowing the real identity of vehicles.
10. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
10
Fig. 7. Initial handshaking [20]
Fig. 7 illustrates an initial handshaking that is executed when a vehicle meets a new RSU. The
vehicle authentication with the TA is performed via RSU. Then TA passes verification
information to RSU. RSU then generates a shared secret key mi with the vehicle. If this is the first
time that the vehicle authenticates itself with the TA, TA will also pass its master key s and a
shared secret mi to the vehicle, via RSU of course. This only needs to be done once in the whole
journey. For security reasons, s is not preloaded into any vehicle’s hardware. Each time the
vehicle passes a new RSU, a new shared-secret key is generated. To generate the signature,
vehicle uses the shared secret key and hash function with the signing key. As mi is only known by
the vehicle, RSU and TA, attackers or other vehicles cannot generate the valid signing key to sign
the message. RSU always verify the vehicle’s signature even if the vehicle uses pseudo identity to
sign the message. Invalid signatures can be detected using a batch verification process by RSU. In
IBV (Identity-Based Batch Verification), if any invalid signature is found using the batch
verification process the whole batch is dropped. However, SPECS does not drop the whole batch;
it uses binary search, divides the batch in two halves, and checks the invalidity on each half. If an
attacker is found, it notifies other vehicles and repeats the process until the search reaches a
predefined level or all signatures are validated. After verifying the signature, the RSU broadcasts
the message to all vehicles without the hash value, which is stored into positive and negative
bloom filters. Any vehicle that wants to know the validity of a received message will create the
hash value and compare with the bloom filters hash value. A message is valid if the hash value of
this message is found in the positive bloom filter. Otherwise, the message is considered as
invalid.
4.4. Timing Attack
Safety applications are one of the most important and promising advantages of VANETs.
However, they are time critical applications and require data transmissions from one vehicle to
another vehicle at the right time. In timing attacks [41], when malicious vehicles receive a
message, they do not forward it as normal but add some timeslots to the original message to
create delay. Thus, neighboring vehicles of the attackers receive the message after they actually
require or after the moment when they should receive that message.
Fig. 8. Timing attack
In Fig. 8, there was an accident between two cars A and B. Malicious car D was announced about
this accident but it delayed to transmit the message to the others by adding some timeslots to the
11. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
11
original message. F should receive this message soon to change the lane but because of the delay,
it only received the message about accident when it has already reached the accident position
(F’). There are also some other scenarios that are presented in [41] including both attacks to V2V
communications and V2I communications.
In order to avoid timing attacks, data integrity verification is required to eliminate any
timeslots that can be added to packets. TPM (Trusted Platform Module) [28] is one of the
major security approaches to maintain the integrity of message by using the strong cryptographic
functioning modules. Together with two protocols, namely Privacy Certification Authority (PCA)
and Direct Anonymous Attestation (DAA), TPM has proved its two main advantages: (1) -Secure
piece of hardware with cryptographic capabilities and (2) - Abilities to protect and store data in
shielded location. TPM plays the role as a powerful solution for evenly other attacks that violate
data integrity. However, like any other cryptographic solution, TPM can negatively affect to the
performance of network.
4.5. Global Positioning System (GPS) Spoofing, Hidden vehicle and Tunnel Attack
In VANETs, a location table with the geographic locations and vehicles identities is a critical
element that is maintained due to GPS satellite. Using the GPS satellite simulator to generate
signals, that are stronger than those generated by the actual satellite system are, an attacker can
produce false readings in the GPS to deceive vehicles to think that they are in a different location.
Hidden vehicle is another concrete example of cheating with positioning information [8]. As Fig.
9 illustrates, the vehicle B deceives the vehicle A to believe that it is better placed (at B’) for
forwarding the warning message, but then keep silence about the accident.
Fig. 9. Hidden vehicle attack [8]
Fig. 10. Tunnel attack [8]
12. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
12
Another attack concerning position information is Tunnel Attacks [8]. Because of the temporary
disappearance of GPS signals in tunnels, an attacker is possible to inject false positioning
information once the vehicle leaves the tunnel and before it receives an authentic position update,
as Fig. 10 illustrates. This phenomenon happens with either a physical tunnel or an area jammed
by the attacker, that leads to the same effects.
In order to deal with problems from these kinds of attacks, one idea emerging is the work
depicted in [16] that was earlier presented as a solution for Sybil attack. However, the ability of
this approach’s adaptation in VANETs is still a problematic issue.
4.6. Illusion Attack
In illusion attacks, the adversary deceives purposefully the sensors on his car to produce wrong
sensor readings and thus incorrect traffic information. In consequence, the corresponding system
reaction is invoked and then incorrect traffic warning messages are broadcasted to neighbors.
Thus, illusion condition is successfully created. In general, drivers’ behaviors will depend on the
traffic warning messages they have received. Caused by illusions, vehicles received the wrong
traffic information will most likely change their driving behaviors, correspondingly. Hence,
the attacker can cause accident, traffic jam and decrease the performance by invisibly
manipulating network topology of the network.
Traditional message authentication and message integrity verification cannot totally defend
against illusion attacks because the adversary directly manipulates and confuses the sensors on a
vehicle to report false information. Plausibility Validation Network (PVN) [23] is a security
model to secure VANETs against illusion attacks. PVN processes by collecting raw sensors’ data
and verifying whether the collected data are plausible or not. Two types of inputs are taken into
account: incoming data from antennas and data collected by sensors. An input data header will
categorize the data. PVN has a rule database and data-checking module, which helps to check the
validity of input data and take necessary action accordingly. A message is considered trustworthy
if it passes all verifications. Otherwise, it is declared as an invalid message and dropped
automatically. PVN has possibility of cooperation with various types of cryptography methods
and defend against further attacks.
4.7. ID Disclosure
In this attack, a node in the network discloses the identity of neighbors, tracks the current location
of a target node, and uses this data for a range of purposes (e.g., this is actually the way some car
rental companies track their own cars). One of the most famous scenarios of ID Disclosure is as
follow: A global observer sends a “virus” to some neighbors of the target node. Whenever
attacked by the virus, these neighbors periodically report the ID and the locations of the target
node. This attack violates the requirement concerning not only the authentication but also the
privacy.
In [42], authors propose a holistic protocol for secure data transmission and detecting
misbehaviors sent by the authorized users. In their proposed work, the vehicle should register
with nearby Road Side Unit (RSU). In Registration phase, the user presents the user name and
password to the RSU, then the RSU provides Registration ID to the user, which consists of
license number and the vehicle registration number. Then RSU authenticates the vehicle by
verifying the provided certificate. If the authentication is failed, the data/node will be blocked.
This type of protocol is holistic protocol concerning the whole rather than the individual parts. It
aim to provide authentication, integrity, availability, confidentiality, and non-repudiation
13. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
13
properties for VANETs, thus, detect and prevent misbehaviors (e.g., virus).The main advantages
in holistic protocol for secure data transmission in VANET are the less time consumption and the
security assured for both outsider and insider attacks.
4.8. Denial of Service (DoS) and Distributed Denial of Service (DDos)
Denial of Service (DoS) [2], [3], [25], [34] is always one of the most serious level attacks in every
network. The scenarios to perform are very diverse. The main aim is to prevent the authentic
users to access the network services. In DoS attacks, attackers may transmit dummy messages to
jam the channel and thus, reduce the efficiency and performance of the network. A part of or the
total network is no longer available to legitimate users. Fig. 11 indicates that a malicious black
car forges a large number of fake identities and transmits a dummy message “Lane close ahead”
to a legitimate car behind it and even to an RSU to create a jam in the network.
Fig. 11. Denial of Service (DoS) attack
The Distributed DoS (DDoS) is more severe than the DoS where a number of malicious cars
attack on a legitimate car in a distributed manner from different locations and timeslots. Fig. 12
demonstrates that three malicious black cars attack on the car A from different locations and time
so that A cannot communicate with the other vehicles.
Fig. 12. Distributed Denial of Service (DDoS) Attack
One of DoS attack solutions is based on the support of OBU (OnBoard Unit) that is equipped in
vehicles. There is a processing unit that has the role to suggest to the OBU to switch channel,
technology, or to use frequency hopping technique or multiple transceiver in the case of DoS
attack [34]. The work in [34] present a distributed and robust defense against DoS attacks where a
malicious node forges a large number of fake identities, i.e., Internet Protocol (IP) addresses in
order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In
the proposed approach, these fake identities are analyzed through the medium of the consistent
existing IP address information. All the vehicles exchange frequently beacon packets to claim
their presence and be aware of the neighbors. Each node periodically keeps and updates a record
of its database by exchanging the information with the community. If a node detects in its record
that there are some similar IP addresses, these identic IP addresses are likely evidences of a DoS
attack. The authors developed a model for DoS prevention called IP-CHOCK that prove the
significant strength in locating malicious nodes without the requirement of any secret information
14. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
14
exchange or special hardware support. Simulation results depict an encouraging detection rate
that will be even enhanced whenever optimal numbers of nodes are forged by the attackers.
4.9. Black Hole Attack
A black hole [2], [3], [30], [38] is an area where the network traffic is redirected. However, either
there is no node in that area or the nodes reside in that area refuse to participate in the network. In
a black hole attack, a malicious node introduces itself for having the shortest path to the
destination node and thus, cheats the routing protocol. Instead of taking a look on routing table
firstly, this hostile node advertises rapidly that it has a fresh route for the route request. In
consequence, attacker node wins the right of replying to the route request and thus it is able to
intercept the data packet or retain it. When the forged route is successfully established, it depends
on the malicious node whether to drop or forward the packets to wherever it wants.
Fig. 13 illustrates an example where the node A wants to send data packets to node F but does not
know the route to F. Therefore, A initiates the route discovery process. As a malicious node, D
claims that it has active route to F and pretends that it must be next-node if A wants to send
packets to F. Depending on the routing protocol (e.g., Ad hoc On-demand Distance Vector
(AODV) or Optimized Link State Routing (OLSR) [38]), an attacker builds its own method to fits
in the data routes.
Gray Hole attack is known as a variation of Black Hole attack, in which the malicious node
misleads the network by agreeing to forward the packets but it sometimes drops them for a while
and then switches to its normal behavior. It is very difficult to figure out such kind of attack.
Fig. 13. Black hole attack
Existing solutions to black hole attacks [39] consider designing protocols in which there are more
than one route from the source to the destination, or conceptualizing a Real-time Intrusion
Detection system that adopts specification-based detection technique as well as processes
countermeasures to reduce the damage. However, these solutions might be suitable to MANETs
rather than VANETs, because MANETs have several mobile nodes and higher end-to-end delay
to find additional nodes or paths. Another solution is to use packet sequence numbers in a packet
header so that if any packet is lost, the destination can simply identify it from the missing packet
sequence number.
4.10. Wormhole Attack
Wormhole [2], [22] is a severe attack in VANETs and other ad hoc networks that could be
considered as a variation of Black Hole attack. In this attack, two or more malicious nodes create
a tunnel to transmit data packets from one end to the malicious node at the other end and these
15. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
15
packets are broadcasted to the network. Owing to the nature of wireless transmission, a malicious
node is capable creating a wormhole even for packets not addressed to it, simply by overhearing
them in wireless environment and then tunneling them to the colluding node at the other end of
the wormhole. The wormhole allows the attacker getting a very dominant role in comparison to
other nodes, and it can exploit this position in a variety of ways, for example, to gain
unauthorized access, disrupt routing, or perform a Denial of Service (DoS) attack, thus, threaten
the security of transmitting data packets.
Fig. 14. Wormhole attack [2]
Wormhole attacks disrupt the multicast and broadcast operations for transmitting messages in
VANETS, particularly in on-demand routing protocols such as AODV (Ad hoc On- demand
authentication and protection mechanisms for routing packets and thus, is affected by wormhole
attacks. The malicious nodes or wormholes can gain unauthorized access to perform Denial of
Service (DoS) attacks. Fig. 14 illustrates a wormhole attack where black malicious cars at two
end of the network form a tunnel to transmit confidential information.
Packet leash [22] is a well-known approach to prevent wormhole attacks. There are two types of
leashes: geographic leashes and temporal leashes. In [22], they designed an efficient
authentication protocol, called TIK, for use with temporal leashes. TIK (TESLA with Instant Key
disclosure) is an extension of the TESLA broadcast authentication protocol. The purpose of
temporal leashes is to ensure that each packet has an upper bound of distance to travel (which is
at most limited by the speed of light). All nodes are tightly synchronized with a clock and the
clock difference between any two nodes is known by all other nodes in the network. TIK protocol
is found on efficient symmetric cryptographic primitives whereby a message authentication code
is a symmetric cryptographic primitive. Accurate time synchronization between communicating
parties is essential in TIK. It also requires each node to know a public value for each sender node,
thus allows scalable key distribution. An attack is detected by calculating the differences between
the packet travel distance and allowed distance to travel. If an attacker retransmits the packet by
the wormhole, it will most likely delay it long enough so that the corresponding key has been no
longer valid because the sender has disclosed it. The receiver, thus, will reject the packet.
An efficient approach called, HEAP [40], which is an improvement of previously proposed packet
leashes method, used to detect the wormhole attacks in the AODV routing protocol of VANETs,
which is more secure and has low overhead. Instead of using local leashes, the HEAP uses
geographical leashes, which is more effective to detect malicious nodes. However, geographical
leashes limit the packets travel distance. They only authorize packets, which travel less than a
specific distance and thus, sometimes too severely prevent passing of packets that may be not
affected by wormhole but travel farther than specific value. To eliminate this problem, HEAP
assumes that although the distance passed by packets is more than the threshold, packets should
not be dropped if process of packet traveling from source to destination is correct. HEAP method
is very suitable for VANETs because it has a better performance compared to other authentication
methods. HEAP is applicable for all unicast, multicast, and broadcast applications. We can also
use HEAP as authenticator for all types of packets.
16. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
16
4.11. Malware and Spam
Malware and spam attacks, such as viruses and spam messages, can cause serious disruptions in
the normal VANETs operations. This kind of attack is normally executed by malicious insiders
rather than outsiders. For instance, an attacker sends a big amount of spam messages in the
network to consume the bandwidth and to increase the transmission latency. It is not easy to
control such kind of behavior because of the lack of necessary infrastructure and centralized
administration. Meanwhile, malwares are just like viruses that hamper the normal operation of the
network. VANET get infected normally when OnBoard Units (OBU) of vehicles and RoadSide
Units (RSUs) perform software updates. Embedded anti-malware frameworks are still a
problematic issue in VANETs research community.
4.12. Man in the Middle Attack (MiMA)
As the name suggests, in this attack, malicious vehicle listen to the communications between two
vehicles, pretends to be each of them to reply the other and inject false information between
vehicles. Fig. 15 demonstrates a Man in the Middle attack scenario, in which the malicious
vehicle C is eavesdropping the communication between vehicles B and D as well as sending
wrong information received from A to the vehicle E.
In order to deal with this kind of attacks, reasonable solutions are confidential communications
(e.g., by powerful cryptography) to avoid the fact that an attacker can eavesdrop the
communication among the others, and a secure authentication and data integrity verifications
(e.g., by hash functions) to prevent messages modifications. Several specific solutions that assure
these purposes have been presented in the previous parts.
Fig. 15. Man in the middle attack [3]
5. SUMMARY OF ATTACKS’ CHARACTERISTICS
In this section, we intend to characterize VANETs attacks by three attributes: (1) Type of
attacker, (2) Violated Security Properties, (3) Class of attacks.
17. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
17
Table 2: Summary of VANETs security attacks
5.1. Type of attacker
Inspired by [3], [8], we characterize an attacker by Membership. Motivation. Method. Scope
where:
- Membership stands for Insider ( I ) or Outsider ( O )
- Motivation for Malicious (M) or Rational (R)
- Method for Active (A) or Passive (P)
- Scope for Local (L) or Extended (E)
- A star (*) indicates that the corresponding field can take any value.
A more detailed explanation of this characteristic is presented in section 2. For example, an
attacker I.R.A.L is an insider who behaves rationally, and performs active attacks in restricted
areas.
5.2. Violated Security Properties
In section 3, we have reminded security requirements in VANETs. Caused by an attack, one or
some requirements could not be satisfied. Therefore, for each attack, we point out what
requirements are possibly not satisfied to evaluate the danger level of this attack as well as to
warn designers in designing VANETs.
5.3. Class of attacks
We inherit the classification in [2] that characterizes attacks into five classes as illustrated in
Table 1- Section 2.
18. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
18
5.4. Summary
Table 2 lists all attacks presented in section 4 with their corresponding three attributes.
6. CONCLUSION AND PERSPECTIVES
Risks caused by security attacks are one of the major security issues for the VANETs that are
constraining the deployment of the vehicular ad hoc networks. In this paper, we presented an up-
to-date collection of attacks damaging VANETs, sampled the practical scenarios, discussed the
existing solutions to deal with attacks, and characterized each attack to have a thorough look over
it. Our study is useful for VANETs researchers as a study on the state of the art and for designers
in building the architecture or framework parameters of VANETs security. From this paper, we
want to clear that: For the strong security of VANETs communication, we not only need the
secured communication frameworks but also we need powerful routing algorithms those can
facilitate the detection of malicious vehicles in networks and mitigate them.
Nowadays, in VANETs research community, many security solutions have been proposed to
overcome security challenges caused by attacks [5], [25]. These solutions can be classified into
three main approaches: Public Key Approaches, Symmetric and Hybrid Approaches and ID-
based Cryptography. All of these approaches aim to construct a strong security framework for
VANETs and thereby prevent security attacks. However, they will be carefully taken into
consideration to adapt with particular features of VANETs. For example, a powerful
cryptography is essential but it can provoke additional latencies in networks. This consequence is
not encouraged in such a dynamic in topology network like VANETs that constantly wish for
rapid communications.
In our perspectives, we intend to construct an intrusion detector for VANETs to alert the attacks
in the case performing. This work can be done by applying the system of BRO [32] or MMT tools
[33] in considering properties that is possibly collected in attacks.
REFERENCES
[1] Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, “Vehicular Ad Hoc
Networks (VANETs): Status, Results, and Challenges”, in Telecommunication Systems, Volume 50,
Issue 4, pp 217-241, 2012.
[2] Irshad Ahmed Sumra, Iftikhar Ahmad, Halabi Hasbullah, Jamalul-lail bin Ab Manan, “Classes of
attacks in VANET”, in Tenth International Conference on Wireless and Optical Communications
Networks (WOCN), pp 1 - 5, 2013.
[3] Al-kahtani, Salman bin Abdulaziz, Al Kharj, “Survey on security attacks in Vehicular Ad hoc
Networks (VANETs)”, in 6th International Conference on Signal Processing and Communication
Systems (ICSPCS), pp 1 - 9, 2012.
[4] Kadam Megha V, “Security Analysis in VANETs: A Survey”, in International Journal of Engineering
Research and Technology (IJERT), Vol. 1 Issue 8, October - 2012.
[5] Mahmoud Al-Qutayri, Chan Yeun and Faisal Al-Hawi, “Security and Privacy of Intelligent
VANETs”, in Computational Intelligence and Modern Heuristics, book edited by Al-Dahoud Ali,
2010.
[6] J.T. Isaac, S. Zeadally, and J.S. Cmara, “Security attacks and solutions for vehicular ad hoc
networks”, in IET Communications, pp. 894-903, 2009.
[7] Xiaodong Lin, Rongxing Lu, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, and Xuemin (Sherman) Shen,
“Security in Vehicular Ad Hoc Networks ”, in IEEE Communications Magazine , pp. 88-95, 2008.
[8] M. Raya, J. Pierre Hubaux, “Securing vehicular ad hoc Networks”, in Journal of Computer Security,
vol.15, January 2007, pp. 39-68.
[9] I.Ahmed Soomro, H.B.Hasbullah, J.lb.Ab Manan, “Denial of Service (DOS) Attack and Its Possible
Solutions in VANET”, in WASET, issue 65, 2010 ISSN 2070-3724.
19. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
19
[10] I.Chen Chen, Xin Wang, Weili Han, and Binyu Zang, “A Robust Detection of the Sybil Attack in
Urban VANETs ”, in Distributed Computing Systems Workshop, ICDCS Workshops ’09. 29th IEEE
International Conference, 2009, pp. 270-276, 2009.
[11] Chim Tat Wing, “Secure and Privacy-preserving Protocols for VANETs”, in PhD thesis at The
University of Hong Kong, August 2011.
[12] Lei Zhang, “Research on Security and Privacy in Vehicular Ad Hoc Networks”, in PhD thesis at
Universitat Rovira i Virgili, June 2010.
[13] J.Douceur, “The Sybil Attack”, in First International Workshop on Peer-to-Peer Systems, 2002, pp.
251-260.
[14] J.Newsome, E.Shi, D.Song and A.Perrig, “Loc & Defenses”, in International symposium on
information processing in sensor networks, 2004, pp. 259-268.
[15] Gilles Guette, Bertrand Ducourthial, “On the Sybil attack detection in VANET ”, in IEEE
International Conference on Mobile Ad hoc and Sensor Systems, 2007, pp. 1-6.
[16] Bin Xiao, Bo Yu, Chuanshan Gao, “Detection and localization of Sybil nodes in VANETs”, in
DIWANS ’06, pp. 1-8.
[17] S. S. Manvi, M. S. Kakkasageri, D. G. Adiga, “Message Authentication in Vehicular Ad hoc
Networks: ECDSA Based Approach”, in International Conference on Future Computer and
Communication, 2009, pp. 16-20.
[18] Jinyuan Sun, Yuguang Fang, “A defense technique against misbehavior in VANETs based on
threshold authentication”, in Military Communications Conference MILCOM 2008. IEEE, 2008, pp.
1-7.
[19] Tat Wing Chim, S.M. Yiu, L.C.K. Hui and V.O.K Li, “Security and Privacy Issues for Inter-vehicle
Communications in VANETs”, in Sensor, Mesh and Ad Hoc Communications and Networks
Workshops, 2009, pp. 1-3.
[20] T.W. Chima, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li, “SPECS: Secure and privacy enhancing
communications schemes for VANETs”, in Journal of Ad Hoc Networks 9, 2011, pp. 189-203.
[21] Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, and Xuemin (Sherman) Shen, “An Efficient
Identity-Based Batch Verification Scheme for Vehicular Sensor Networks”, in IEEE INFOCOM 2008
proceedings, 2008, pp. 816-824.
[22] Y.C. Hu, A. Perrig and D.B Johnson, “Packet leashes: a defense against wormhole attacks in wireless
networks”, in INFOCOM. Twenty- Second Annual Joint Conferences of the IEEE Computer and
Communications, 2003, pp. 1976-1986.
[23] Nai-Wei Lo, Hsiao-Chien Tsa, “Illusion Attack on VANET Applications - A Message Plausibility
Problem”, in Globecom Workshops, 2007, pp. 1-8.
[24] Soyoung Park, B. Aslam, D. Turgut and C.C. Zou, “Defense against Sybil attack in vehicular ad hoc
network based on roadside unit support”, in Military Communications Conference, MILCOM, 2009,
pp. 1-7.
[25] B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks”, in Hot Topics in Networks
(HotNets-IV), 2005.
[26] T. Leinmuller, E. Schoch, F. Kargl, C. Maihofer, “Improved security in Geographic ad hoc routing
through autonomous Position Verification ”, in ULM University, 2009.
[27] I.Ahmed Soomro, H.B.Hasbullah,J.lb.Ab Manan, “User requirements model for vehicular ad hoc
network applications ”, in International Symposium on Information Technology 2010 (ITSim 2010),
2010.
[28] G. Guett, C. Bryce, “Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) ”, in IFIP 2008,
WISTP 2008, LNCS 5019, 2008, pp.106-116.
[29] Zhou L, Chao H-C, “Multimedia Traffic Security Architecture for the Internet of Things ”, in IEEE
Network 2011, 2011, pp. 29-33.
[30] Raja Mahmood RA, Khan AI, “A Survey on Detecting Black Hole Attack in AODV-based Mobile
Ad Hoc Networks ”, in International Symposium on High Capacity Optical Networks and Enabling
Technologies, 2007, pp. 18-20.
[31] GMT Abdalla, SM Senouci, “Current Trends in Vehicular Ad Hoc Networks ”, in Proceedings of
UBIROADS workshop, 2007.
[32] Vern Paxson, “Bro: A System for Detecting Network Intruders in Real- Time”, in Proceedings of the
7th USENIX Security Symthosium, San Antonio, Texas, 1998.
[33] Bachar Wehbi, Edgardo Montes de Oca, Michel Bourdelles, “Events- Based Security Monitoring
Using MMT Tool ”, in Software Testing, Verification, and Validation, 2008 International Conference,
2012, pp. 860-863.
20. International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014
20
[34] Karan Verma, Halabi Hasbullah, Ashok Kumar, “Prevention of DoS Attacks in VANET”, in Wireless
Personal Communications, November 2013, Volume 73, Issue 1, pp 95-126.
[35] Adil Mudasir Malla and Ravi Kant Sahu, “Security Attacks with an Effective Solution for DOS
Attacks in VANET”, in International Journal of Computer Applications, March 2013, Volume 66 -
Number 22.
[36] M.Raya, P. Papadimitratos, and JP. Hubaux, “Securing Vehicular Communications”, in IEEE
Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 2006, pp. 8-
15.
[37] Ram Shringar Raw, Manish Kumar, Nanhay Singh, “Security issues and solutions in Vehicular Ad
hoc Network: A review approach”, in David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA, 2013,
pp. 339347.
[38] Vimal Bibhu, Kumar Roshan, Kumar Balwant Singh, Dhirendra Kumar Singh, “Performance
Analysis of Black Hole Attack in Vanet ”, in Computer Network and Information Security, 2012, pp.
47-54.
[39] R.A. Raja Mahmood, A.I. Khan, “A Survey on Detecting Black Hole Attack in AODV-based Mobile
Ad Hoc Networks ”, in International Symposium on High Capacity Optical Networks and Enabling
Technologies, 2007, pp. 1-6.
[40] Seyed Mohammad Safi, Ali Movaghar, Misagh Mohammadizadeh, “A novel approach for avoiding
wormhole attacks in VANET”, in First Asian Himalayas International Conference on Internet, 2009,
pp. 1-6.
[41] Irshad Ahmed Sumra , Jamalul-lail Ab Manan , Halabi Hasbullah, “Timing Attack in Vehicular
Network”, in Recent Researches in Computer Science, 2011, pp. 151-155.
[42] TamilSelvan, Komathy Subramanian, Rajeswari Rajendiran, “A Holistic Protocol for Secure Data
Transmission in VANET ”, in International Journal of Advanced Research in Computer and
Communication Engineering, 2013, pp. 4840-4846.
ACKNOWLEDGEMENTS
Grateful acknowledgment is dedicated to Prof. Ana CAVALLI and doctoral student Khalifa
TOUMI who contributed valuable comments in reviewing this paper.
AUTHORS
Vinh Hoa LA is currently a PhD student at Software-Networks Department in Telecom
SudParis /Institut Mines-Telecom (France). He received an engineering degree in
Information Technology, major: Information and Communication Systems in July 2012 in
Hanoi University of Science and Technology in Vietnam. Benefiting the scholarship
“Bourse Master Île de France”, he has been in France since September 2012 for the second
year of Master program in Informatics, specialized in Networks (Réseaux) at University
Pierre and Marie Curie- Paris 6. He received the Master degree in September 2013. His research interests
include Sensor/ Mobile Ad hoc Network Security, Security Validation, Intrusion Detection, Interoperability
in Multi-Organization-Environment.
Ana Rosa Cavalli has obtained her Doctorat d'Etat es Mathematics Science and
Informatics, from the University of Paris VII, in 1984. From 1985 to 1990, she was a
researcher in the department Languages and Switch Systems, at CNET (Centre National
d'Etudes des Telecommunications), where she worked on software engineering and
formal methods. She is Full Professor at TELECOM & Management SudParis (ex
Institut National des Telecommunications) since 1990. She is the director of the Software
for Networks department. She is also responsible of the research team "Verification and
test of services and protocols" and the AVERSE team, in the CNRS research laboratory SAMOVAR. Her
research interests are on specification and verification, testing methodologies for conformance and
interoperability testing, active testing and monitoring techniques, the validation of security properties and
their application to services and protocols. She has published more than 120 papers in journals and
international conferences of high quality.