Vehicular Ad-hoc Networks and Associated Risks
Citation
MLA Style:P Aishwarya Naidu, Satvik Vats,Pooja Chadha, Rajeshwari K "Vehicular Ad-hoc Networks and Associated Risks" International Journal of P2P Network Trends and Technology 10.3 (2020): 18-25.
APA Style:P Aishwarya Naidu, Satvik Vats,Pooja Chadha, Rajeshwari K(2019). Vehicular Ad-hoc Networks and Associated Risks. International Journal of P2P Network Trends and Technology, 10(3),18-25.
Abstract
We are transforming into a new era of technology in which everything around us is ‘smart’, be it our home appliances, our work related gadgets or even our cities, everything is turning into an interactive and connected collection of technologically advanced devices, where each and everything is managed such that the resources are used in a sustainable way and our needs are also fulfilled. The transportation or vehicular movement of people or goods is one such necessity that has created a lot of chaos in our cities. Our travel infrastructure is not able to cope up with the expansion in the vehicular traffic on roads as it should have been. Thus, leading to a complete mismanagement of traffic which ultimately adds to the suffering of people in form of loss of life and property due to road accidents, adverse environmental impacts in form of increased emissions from vehicles in congested traffic and it also causes a complete failure of public transport systems in the cities. It is due to this failure of public transport systems that a strong need for a technologically innovative solution focused on vehicle management is needed. Vehicular ad hoc networks (VANET) is one such solution which provides us with a dedicated network interconnecting vehicle to one another and to the roads is being developed and researched across the globe to make our vehicles ‘smart’ and ready for the new ‘smart’ world that we have dreamt of. Although, VANETs are extremely useful and are the need of the hour, there are a few risks associated with them. This paper outlines the security and privacy threats associated with these networks that need to be taken care of before placing any such system in use.
References
[1] Mejri, Mohamed Nidhal, Jalel Ben-Othman, and Mohamed Hamdi. "Survey on VANET security challenges and possible cryptographic solutions." Vehicular Communications 1.2 (2014): 53-66.
[2] Ligo, Alexandre, et al. "Comparison between benefits and costs of offload of mobile Internet traffic via vehicular networks." TPRC, 2015.
[3] ITS, ITS. "standards fact sheets of IEEE." IEEE Standards 1609 (2014).
[4] Blum, Jeremy, and Azim Eskandarian. "The threat of intelligent collisions." IT professional6.1 (2004): 24-29.
[5] Ahmed, Wedad, and Mourad Elhadef. "DoS Attacks and Countermeasures in VANETs." Advanced Multimedia and Ubiquitous Engineering. Springer, Singapore, 2018. 333-341.
[6] Kalaiarasi, C., N. Sreenath, and A. Amuthan. "Location Privacy Preservation in VANET using Mix Zones–A survey." 2019 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2019.
[7] Engoulou, Richard Gilles, et al. "VANET security surveys." Computer Communications 44 (2014): 1-13.
[8] Syed, Salman Ali, and B. V. V. S. Prasad. "Merged technique to prevent SYBIL Attacks in VANETs." 2019 International Conference on Computer and Information Sciences (ICCIS). IEEE, 2019.
[9] Jeevitha R. and N. Sudha Bhuvaneswari. "Malicious node detection in VANET Session Hijacking Attack." 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE, 2019.
[10] Raya, Maxim, and Jean-Pierre Hubaux. "Securing vehicular ad hoc networks." Journal of computer security 15.1 (2007): 39-68.
[11] Naveen R, N.S.V Chaitanya, Nikhil Srinivas M. and Dr. Nandhini Vineeth. “A Survey on Detection and Prevention of SecurityAttacks in VANET.” 2019 Grenze International Journal of Engineering and Technology, Special Issue.
[12] S. Kumar and K. S. Mann, "Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs," 2019 International Conference on Automation, Computational and Technology Management (ICACTM)
[13] Golle, Philippe, Dan Greene, and Jessica Staddon. "Detecting and correcting malicious data in VANETs." Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. 2004.
[14] Bousselham, Mhidi, Nabil Benamar, and Adnane Addaim. "A New Security Mechanism for Vehicular Cloud Computing Using Fog Computing System." 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). IEEE, 2019.
[15] M. Mukherjee et al., "Security and Privacy in Fog Computing: Challenges," in IEEE Access, vol. 5, 2017.
[16] Soni, Mukesh, and Anuj Jain. "Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks." 2018 Second International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2018.
[17] S.Ranjithkumar, N. Thillaiarasu ”A Survey of Secure Routing Protocols of Mobile AdHoc Network” SSRG International Journal of Computer Science and Engineering, volume 2 issue 2 February 2015.
Keywords
Vehicular ad hoc networks, Wireless, Security, Attacks