Skip to main content

2020 | OriginalPaper | Buchkapitel

10. Security Issues in Vehicular Ad Hoc Networks for Evolution Towards Internet of Vehicles

verfasst von : Atanu Mondal, Sulata Mitra

Erschienen in: Connected Vehicles in the Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter elaborates on the security issues of vehicular communication as a need for future evolution of Vehicular Ad Hoc NETworks (VANET) towards the Internet of Vehicles (IoV). The communication between connected vehicles is a potential issue of concern with respect to road safety, detecting traffic accidents, etc. in vehicular Ad Hoc network. In the Internet of Vehicles paradigm, each vehicle is equipped with a powerful multi-sensor platform, communication technologies, computation units, IP-based connectivity to the Internet and to other vehicles for enabling communication between connected vehicles as well as between vehicles and roads. Such communication must be protected from unauthorized message injection and message alteration. Hence a robust security solution for such networks must facilitate authentication verification of vehicles and integrity verification of the disseminated messages. In the first part of this chapter, a lightweight scheme for identification, authentication, and tracking of vehicles in hierarchical vehicular Ad Hoc network is elaborated. In the second part, a low overhead digital watermark-based vehicle revocation scheme to identify and revoke attackers of disseminated message is discussed. The combination of these two schemes ensures secure inter vehicle communication in vehicular Ad Hoc networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mondal A, Mitra S (2012) Identification, authentication and tracking algorithm for vehicles using VIN in centralized VANET. In: International conference of communication, network and computing (CNC), proceedings. LNICST, vol 108. Springer, Berlin, pp 115–120. ISBN no. 978-3-642-35614-8 Mondal A, Mitra S (2012) Identification, authentication and tracking algorithm for vehicles using VIN in centralized VANET. In: International conference of communication, network and computing (CNC), proceedings. LNICST, vol 108. Springer, Berlin, pp 115–120. ISBN no. 978-3-642-35614-8
2.
Zurück zum Zitat Mitra S, Mondal A (2012) Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. In: International conference on advances in computing, communications and informatics (ICACCI), proceedings. ACM digital library, pp 279–286. ISBN no. 978-1-4503-1196-0 Mitra S, Mondal A (2012) Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. In: International conference on advances in computing, communications and informatics (ICACCI), proceedings. ACM digital library, pp 279–286. ISBN no. 978-1-4503-1196-0
3.
Zurück zum Zitat Mondal A, Mitra S (2018) Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks. Int J Comput Electr Eng 69:479–496. Elsevier Mondal A, Mitra S (2018) Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks. Int J Comput Electr Eng 69:479–496. Elsevier
4.
Zurück zum Zitat Mondal A, Mitra S (2019) LoWVR: low overhead watermark based vehicle revocation scheme in VANET. Int J Sens Wirel Commun Control 9(1):2019 Mondal A, Mitra S (2019) LoWVR: low overhead watermark based vehicle revocation scheme in VANET. Int J Sens Wirel Commun Control 9(1):2019
5.
Zurück zum Zitat Fan CI, Sun WZ, Huang SW, Juang WS Huang JJ (2014) Strongly privacy preserving communication protocol for VANETs. In: 9th Asia joint conference on information security, pp 119–26 Fan CI, Sun WZ, Huang SW, Juang WS Huang JJ (2014) Strongly privacy preserving communication protocol for VANETs. In: 9th Asia joint conference on information security, pp 119–26
6.
Zurück zum Zitat Moses SJ, Angelin PAC (2013) Enhancing the privacy through pseudonymous authentication and conditional communication in VANETs. J Eng Sci 2(7):45–49 Moses SJ, Angelin PAC (2013) Enhancing the privacy through pseudonymous authentication and conditional communication in VANETs. J Eng Sci 2(7):45–49
7.
Zurück zum Zitat Liu Y, Wang L, Chen H (2014) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710CrossRef Liu Y, Wang L, Chen H (2014) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710CrossRef
8.
Zurück zum Zitat Fulewar VV, Dorle S (2014) A scheme for authentication with multiple levels of anonymity in vehicular communication. J ResComput CommunTechnol 3(4):550–555 Fulewar VV, Dorle S (2014) A scheme for authentication with multiple levels of anonymity in vehicular communication. J ResComput CommunTechnol 3(4):550–555
9.
Zurück zum Zitat Dolev S, Krzywiecki L, Panwar N, Segal M (2014) Dynamic attribute based vehicle authentication. In: IEEE international symposium on network computing and applications, pp 1–8 Dolev S, Krzywiecki L, Panwar N, Segal M (2014) Dynamic attribute based vehicle authentication. In: IEEE international symposium on network computing and applications, pp 1–8
10.
Zurück zum Zitat Ashritha M, Sridhar CS (2015) RSU based efficient vehicle authentication mechanism for VANETs. In: IEEE international conference on intelligent systems and control, pp 1–5 Ashritha M, Sridhar CS (2015) RSU based efficient vehicle authentication mechanism for VANETs. In: IEEE international conference on intelligent systems and control, pp 1–5
11.
Zurück zum Zitat Lee KH, Kim SK (2015) Authentication scheme based on biometric key for VANET information system in M2 M application service. Appl Math Inf Sci 9:645–651 Lee KH, Kim SK (2015) Authentication scheme based on biometric key for VANET information system in M2 M application service. Appl Math Inf Sci 9:645–651
12.
Zurück zum Zitat Bharat M, Sree KS, Kumar TM (2014) Authentication solution for security attacks in VANETs. Int J Adv Res Comput Commun Eng 3(8):7661–7664 Bharat M, Sree KS, Kumar TM (2014) Authentication solution for security attacks in VANETs. Int J Adv Res Comput Commun Eng 3(8):7661–7664
13.
Zurück zum Zitat Caballero-Gil P, Fernandez FM, Caballero-Gil C (2014) Tree-based revocation for certificate less authentication in vehicular ad hoc network. Int J Comput Commun 2:14–21CrossRef Caballero-Gil P, Fernandez FM, Caballero-Gil C (2014) Tree-based revocation for certificate less authentication in vehicular ad hoc network. Int J Comput Commun 2:14–21CrossRef
14.
Zurück zum Zitat Abdulhussain SH (2013) Enhanced management of certificate caching and revocation lists in VANET. Int J Comput Appl 83(12) Abdulhussain SH (2013) Enhanced management of certificate caching and revocation lists in VANET. Int J Comput Appl 83(12)
15.
Zurück zum Zitat Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. IEEE SAE Stand Wirel Access Veh Environ (WAVE) 99(7):1162–1182CrossRef Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. IEEE SAE Stand Wirel Access Veh Environ (WAVE) 99(7):1162–1182CrossRef
16.
Zurück zum Zitat Hess KM, Orthmann CH, Cho HL (2013) Criminal investigation, 11 edn. Cengage Learning. ISBN: 978-1-285-86261-3, 2013 Hess KM, Orthmann CH, Cho HL (2013) Criminal investigation, 11 edn. Cengage Learning. ISBN: 978-1-285-86261-3, 2013
17.
Zurück zum Zitat Xiao Y, Li J, Pan Y (2005) Security and routing in wireless networks. In: Wireless network mobile computing. Nova science publishers, New York; E-Publishing Inc Xiao Y, Li J, Pan Y (2005) Security and routing in wireless networks. In: Wireless network mobile computing. Nova science publishers, New York; E-Publishing Inc
18.
Zurück zum Zitat Kahate A. Cryptography and network security, 3rd edn. McGrill education (India) Pvt. Ltd, India. 013 Kahate A. Cryptography and network security, 3rd edn. McGrill education (India) Pvt. Ltd, India. 013
21.
Zurück zum Zitat Mondal A, Mitra S (2016) TDHA: a timestamp defined hash algorithm for message authentication in VANET. In: International conference on computational modeling and security (CMS), proceedings. Elsevier (Proc Comput Sci J), pp 182–189. ISSN: 1877-0509 Mondal A, Mitra S (2016) TDHA: a timestamp defined hash algorithm for message authentication in VANET. In: International conference on computational modeling and security (CMS), proceedings. Elsevier (Proc Comput Sci J), pp 182–189. ISSN: 1877-0509
22.
Zurück zum Zitat Chaurasia BK, Verma S (2011) Infrastructure based authentication in VANETs. J Multimed Ubiquitous Eng 6(2) Chaurasia BK, Verma S (2011) Infrastructure based authentication in VANETs. J Multimed Ubiquitous Eng 6(2)
23.
Zurück zum Zitat Kim SH, Lee IY (2014) A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int J Secur Appl 8(2):9–24CrossRef Kim SH, Lee IY (2014) A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int J Secur Appl 8(2):9–24CrossRef
24.
Zurück zum Zitat Hassnawi LA, Ahmad RB, Salih MH, Warip MNM,Elshaikh M (2014) Measurement study on packet size and packet effects over vehicular ad hoc network performance. J Theoret Appl Inf Technol 70(3):475–481 Hassnawi LA, Ahmad RB, Salih MH, Warip MNM,Elshaikh M (2014) Measurement study on packet size and packet effects over vehicular ad hoc network performance. J Theoret Appl Inf Technol 70(3):475–481
Metadaten
Titel
Security Issues in Vehicular Ad Hoc Networks for Evolution Towards Internet of Vehicles
verfasst von
Atanu Mondal
Sulata Mitra
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-36167-9_10