Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3584202.3584309acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article
Open access

A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures

Published: 09 May 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Vehicular Ad hoc Networks (VANETs), a subcategory of Mobile ad hoc networks (MANETs), is a promising approach that is now evolving, gaining attention and momentum. VANET consists of highly mobile nodes and roadside infrastructure to communicate essential information across a network, such as collisions, traffic congestion, and vehicular destinations. Due to its frequent vehicle movement, time-critical response and hybrid architecture, it comes with a plethora of network security and privacy issues ranging from the potential of malicious attacks to the availability of essential information across the network and its overall integrity. There is much research devoted to enabling secure communication in VANETs for the best Intelligent Transport System (ITS) experience. In this paper, we address and discuss the characteristics and security issues including the existing VANETs attacks and preventive approaches to each security attack emphasising the main features and the major drawbacks. The review of these different countermeasures shows their strengths and weaknesses and how they can be implemented independently or in a hybrid model best suited to the situation.

    References

    [1]
    GOVUK, "Safe Use of Automated Lane Keeping System (ALKS) Summary of Responses and Next Steps," 2021. [Online]. Available: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/980742/safe-use-of-automated-lane-keeping-system-alks-summary-of-responses-and-next-steps.pdf
    [2]
    S. Popoola, B. Adebisi, R. Ande, M. Hammoudeh, K. Anoh, and A. Atayero, "SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks," Sensors, vol. 21, p. 2985, 04/26 2021.
    [3]
    Kaspersky, "DDoS attacks in Q1 2018," 2018. [Online]. Available: https://securelist.com/ddos-report-in-q1-2018/85373/
    [4]
    M. Hammoudeh, A. Kurz, and E. Gaura, "MuMHR: Multi-path, Multi-hop Hierarchical Routing," in 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), 14-20 Oct. 2007 2007, pp. 140-145.
    [5]
    P. Kaur, D. Kaur, and R. Mahajan, "Wormhole Attack Detection Technique in Mobile Ad Hoc Networks," Wireless Personal Communications, vol. 97, no. 2, pp. 2939-2950, 2017/11/01 2017.
    [6]
    C. Guleria and H. K. Verma, "Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network," in 2018 4th International Conference on Computing Communication and Automation (ICCCA), 14-15 Dec. 2018 2018, pp. 1-4.
    [7]
    M. Shabbir, M. A. Khan, U. S. Khan, and N. A. Saqib, "Detection and Prevention of Distributed Denial of Service Attacks in VANETs," in 2016 International Conference on Computational Science and Computational Intelligence (CSCI), 15-17 Dec. 2016 2016, pp. 970-974.
    [8]
    Y. Gao, H. Wu, B. Song, Y. Jin, X. Luo, and X. Zeng, "A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network," IEEE Access, vol. 7, pp. 154560-154571, 2019.
    [9]
    R. Kolandaisamy ., "A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-13, 05/20 2018.
    [10]
    M. S. Potnis, S. K. Sathe, P. G. Tugaonkar, G. L. Kulkarni, and S. S. Deshpande, "Hybrid Intrusion Detection System for Detecting DDoS Attacks on Web Applications Using Machine Learning," in ICT Analysis and Applications, Singapore, S. Fong, N. Dey, and A. Joshi, Eds., 2022// 2022: Springer Nature Singapore, pp. 797-805.
    [11]
    N. C. S. N. Iyenger and G. Ganapathy, "Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment," Cybernetics and Information Technologies, vol. 15, 07/03 2015.
    [12]
    O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. E. Dlodlo, "Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing," EURASIP Journal on Wireless Communications and Networking, vol. 2016, 05/10 2016.
    [13]
    R. Kolandaisamy, R. M. Noor, M. R. Z'aba, I. Ahmedy, and I. Kolandaisamy, "Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks," The Journal of Supercomputing, vol. 76, no. 8, pp. 5948-5970, 2020/08/01 2020.
    [14]
    K. Adhikary, S. Bhushan, S. Kumar, and K. Dutta, "Hybrid Algorithm to Detect DDoS Attacks in VANETs," Wireless Personal Communications, vol. 114, no. 4, pp. 3613-3634, 2020/10/01 2020.
    [15]
    M. Hammoudeh and R. Newman, "Information extraction from sensor networks using the Watershed transform algorithm," Information Fusion, vol. 22, pp. 39-49, 2015/03/01/ 2015.
    [16]
    Y. Yao, "Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI," IEEE Transactions on Mobile Computing, vol. 18, no. 2, pp. 362-375, 2019.
    [17]
    K. Rabeh, M. Mahmoud, M. Azer, and M. Allam, "A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks: Security in Event reporting scheme," Security and Communication Networks, vol. 8, 03/01 2015.
    [18]
    Y. Yao, B. Xiao, G. Yang, Y. Hu, L. Wang, and X. Zhou, "Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI," IEEE Journal on Selected Areas in Communications, vol. 37, no. 11, pp. 2588-2602, 2019.
    [19]
    C. H. O. O. Quevedo, A. M. B. C. Quevedo, G. A. Campos, R. L. Gomes, J. Celestino, and A. Serhrouchni, "An Intelligent Mechanism for Sybil Attacks Detection in VANETs," in ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 7-11 June 2020 2020, pp. 1-6.
    [20]
    M. Khalil and M. A. Azer, "Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks," in 2018 Wireless Days (WD), 3-5 April 2018 2018, pp. 184-186.
    [21]
    S. S. Chhatwal and M. Sharma, "Detection of impersonation attack in VANETs using BUCK Filter and VANET Content Fragile Watermarking (VCFW)," in 2015 International Conference on Computer Communication and Informatics (ICCCI), 8-10 Jan. 2015 2015, pp. 1-5.
    [22]
    J. Tobin, C. Thorpe, and L. Murphy, "An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks," in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 4-7 June 2017 2017, pp. 1-7.
    [23]
    M. Hammoudeh, R. Newman, C. Dennett, S. Mount, and O. Aldabbas, "Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-ModalWireless Sensor Networks," Sensors (Basel, Switzerland), vol. 15, pp. 22970-3003, 09/18 2015.
    [24]
    O. Aldabbas, A. Abuarqoub, M. Hammoudeh, U. Raza, and A. Bounceur, "Unmanned Ground Vehicle for Data Collection in Wireless Sensor Networks: Mobility-aware Sink Selection," The Open Automation and Control Systems Journal, vol. 8, pp. 35-46, 07/15 2016.
    [25]
    Z. Abdulkader, A. Abdullah, M. T. Abdullah, and Z. A. Zukarnain, "LI-AODV: Lifetime improving AODV routing for detecting and removing black-hole attack from VANET," Journal of Theoretical and Applied Information Technology, vol. 95, pp. 196-209, 01/01 2017.
    [26]
    S. Ali, P. Nand, and S. Tiwari, "Secure message broadcasting in VANET over Wormhole attack by using cryptographic technique," in 2017 International Conference on Computing, Communication and Automation (ICCCA), 5-6 May 2017 2017, pp. 520-523.
    [27]
    V. Krundyshev, M. Kalinin, and P. Zegzhda, "Artificial swarm algorithm for VANET protection against routing attacks," in 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 15-18 May 2018 2018, pp. 795-800.
    [28]
    K. M. A. Alheeti, A. Gruebler, and K. D. McDonald-Maier, "On the detection of grey hole and rushing attacks in self-driving vehicular networks," in 2015 7th Computer Science and Electronic Engineering Conference (CEEC), 24-25 Sept. 2015 2015, pp. 231-236.

    Cited By

    View all
    • (2024)Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning SolutionsSensors10.3390/s2402036824:2(368)Online publication date: 8-Jan-2024

    Index Terms

    1. A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            ICFNDS '22: Proceedings of the 6th International Conference on Future Networks & Distributed Systems
            December 2022
            734 pages
            ISBN:9781450399050
            DOI:10.1145/3584202
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 09 May 2023

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. Attacks
            2. Countermeasures
            3. Privacy
            4. VANETs, Security

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Conference

            ICFNDS '22

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)334
            • Downloads (Last 6 weeks)33
            Reflects downloads up to 27 Jul 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning SolutionsSensors10.3390/s2402036824:2(368)Online publication date: 8-Jan-2024

            View Options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media