Skip to main content

Customized Score-Based Security Threat Analysis in VANET

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 127))

Abstract

With the advancement of IoT, automated driving vehicles using VANET are the new trends of attraction. VANET is inherited from MANET and specifically used for communications between vehicles and between a vehicle and roadside infrastructures. VANET routing protocols are prone to security threats such as DoS, eavesdropping. In this paper, VANET routing protocols are analyzed to identify possible security threats, especially where and how cryptographic mechanisms could be implemented to achieve better security. A customized comparison of secured protocols is provided, followed by observations and conclusions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Rasheed A, Gillani S, Ajmal S, Qayyum A (2016) Vehicular ad hoc network (VANET): a survey, challenges, and applications. In: Vehicular ad-hoc networks for smart cities, advances in intelligent systems and computing, vol 548, pp 39–51

    Google Scholar 

  2. Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANET security challenges and solutions: a survey. Vehicular Commun 7(2017):7–20

    Article  Google Scholar 

  3. Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Commun 1(2):53–66

    Article  Google Scholar 

  4. Yi Q, Moayeri N (2008) Design of secure and application-oriented VANETs. In: VTC spring, pp 2794–2799

    Google Scholar 

  5. Thilak KD, Amuthan A (2016) DoS attack on VANET routing and possible defending solutions—a survey. In: 2016 international conference on information communication and embedded systems (ICICES). IEEE, pp 1–7

    Google Scholar 

  6. Osafune T, Lin L, Lenardi M (2006) Multi-hop vehicular broadcast (MHVB). In: 6th international conference on ITS telecommunications. IEEE, pp 757-760

    Google Scholar 

  7. Daxin T, Wang Y, Liu H, Zhang X (2012) A trusted multi-hop broadcasting protocol for vehicular ad hoc networks. In: 2012 international conference on connected vehicles and expo (ICCVE). IEEE, pp 18–22

    Google Scholar 

  8. Goel N, Sharma G, Dhyani I (2016) A study of position based VANET routing protocols. In 2016 international conference on computing, communication and automation (ICCCA). IEEE, pp 655–660

    Google Scholar 

  9. Lee KC, Hrri J, Lee U, Gerla M (2007) Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios. In: 2007 IEEE Globecom workshops. IEEE, pp 1-10

    Google Scholar 

  10. Moez J, Senouci S, Rasheed T, Ghamri-Doudane Y (2009) Towards efficient geographic routing in urban vehicular networks. IEEE Trans Veh Technol 58(9):5048–5059

    Article  Google Scholar 

  11. Ahmed A, Hafid A (2012) A new stability based clustering algorithm (SBCA) for VANETs. In: 37th annual IEEE conference on local computer networks-workshops. IEEE, pp 843-847

    Google Scholar 

  12. Ahmad A, Kadoch M (2017) Performance improvement of cluster-based routing protocol in VANET. IEEE Access 5(2017):15354–15371

    Google Scholar 

  13. Slavik M, Mahgoub I (2013) Spatial distribution and channel quality adaptive protocol for multihop wireless broadcast routing in VANET. IEEE Trans Mob Comput 12(4):722–734

    Article  Google Scholar 

  14. Tonguz OK, Wisitpongphan N, Parikh JS, Bai F, Mudalige P, Sadekar VK (2006) On the broadcast storm problem in ad hoc wireless networks. In: 2006 3rd international conference on broadband communications, networks and systems. IEEE, pp 1–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maitreyee Sinha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar Mishra, A., Kumar Tripathy, A., Sinha, M. (2021). Customized Score-Based Security Threat Analysis in VANET. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_1

Download citation

Publish with us

Policies and ethics