Review Vehicular Ad hoc Networks Security Challenges and Future Technology

Networks Security Challenges and Future Technology

Authors

  • Haifaa Ahmed Hassan University of Mosul, College of Engineering, Iraq
  • Sahar Wahab khadim Ministry of Education, Karkh Second Directorate of Education, Iraq.

DOI:

https://doi.org/10.31185/wjcm.50

Keywords:

VANET, V2V, V2I, OBU, RSU

Abstract

Vehicular Ad hok Networks (VANET) is an emerging technology with both a bright future and significant concerns, particularly in terms of security. This study focuses on three-part VANET security frameworks. The first gives a thorough review of the needs, difficulties, and characteristics of VANET security. In order to create a secure VANET architecture with effective party communication, certain needs should be taken into account. We provide information on current security designs as well as widely used security standard protocols. The second concentrates on a brand-new categorization of the various assaults described in the VANET literature and the remedies that go with them. The third compares a few of these options using established security standards for VANET. Then, in order to assist researchers for future usage, we call attention to many outstanding topics and technological obstacles linked to VANET security

References

G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil, “Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions,” Communications Surveys & Tutorials, IEEE, no. 4, pp. 584–616, 2011.

R. S. Raw, M. Kumar, and N. Singh, “Security Challenges, issues and their solutions for VANET,” International Journal of Network Security & Its Applications (IJNSA), vol. 5, 2013.

. M. Azees, L. Deborah, and P. Vijayakumar, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, 2016.

R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys,” Computer Communications, vol. 44, pp. 1–13, 2014.

. H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, “VANet security challenges and solutions: a survey,” Vehicular Communications, vol. 7, pp. 7–20, 2017.

S. Zeadally, R. Hunt, Y. S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217–241, 2012.

M. Azeez, L. Deborah, and P. Vijayakumar, “Comprehensive survey on security services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, 2016.

Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular network security, trust, and privacy,” IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760–776, 2019.

S. Sharma and A. Kaul, “A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud,” Vehicular Communications, vol. 12, pp. 138–164, 2018.

A. Boualouache, S. M. Senouci, and S. Moussaoui, “A survey on pseudonym changing strategies for vehicular ad-hoc networks,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 770–790, 2018.

A. Ali Hassan, and F. Li, Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey, Vehicular Communications, vol. 16, pp. 4561, 2019.

X. Liang, T. Yan, J. Lee, and G. Wang, “A distributed intersection management protocol for safety, efficiency, and driver’s comfort,” IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1924–1935, 2018.

J. Gauge and Mittag, “Feasibility of virtual traffic lights in non-line-of-sight environments,” in Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications-VANET’12, pp. 103–105, 2012.

“Draft guide for wireless access in vehicular environment (WAVE) architecture,” 2012. http://ieeexplore.ieee.org/servlet/opac punumber-6320593.

O and A. Hassen, “Big Data Based Machine Learning and Predictive Analytics using Apache Mahout and Storm,” International Refereed Journal of Reviews and Research, vol. 5, 2017.

M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, “Distributed misbehavior detection in VANETs,” in Proceedings of the IIEEE Wireless Communications and Networking Conference (WCNC), 2009.

O. A. H. K. Ibrahim and Hassen, “Preventive Approach against HULK Attacks in Network Environment,” International Journal of Computing and Business Research (IJCBR), vol. 7, no. 3, pp. 1–11, 2020.

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent vehicular (5GenCIV) framework: when Benz meets Marconi,” IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017.

N. Hayder, “An Effective Implementation of Face Recognition Using Deep Convolutional Network,” Journal of Southwest Jiaotong University, vol. 54, no. 5, 2019.

A. A. Abdulhussein, O. A. B. Informatics, and Hassen, “A Pragmatic Review and Analytics of Gait Recognition Techniques in Biometric Domain of Research,” International Journal of Computing and Business Research (IJCBR), vol. 10, pp. 2020–2020

Downloads

Published

2022-09-30

Issue

Section

Computer

How to Cite

[1]
H. Ahmed Hassan and Sahar Wahab khadim, “Review Vehicular Ad hoc Networks Security Challenges and Future Technology: Networks Security Challenges and Future Technology”, WJCMS, vol. 1, no. 3, pp. 1–9, Sep. 2022, doi: 10.31185/wjcm.50.