Review Vehicular Ad hoc Networks Security Challenges and Future Technology: Networks Security Challenges and Future Technology

Review Vehicular Ad hoc Networks Security Challenges and Future Technology

Networks Security Challenges and Future Technology

Authors

  • Haifaa Ahmed Hassan Hasan
  • Sahar Wahab khadim Wahab khadim Ministry of Education, Karkh Second Directorate of Education, Iraq.

DOI:

https://doi.org/10.31185/wjcm.50

Keywords:

VANET, V2V, V2I, OBU, RSU

Abstract

Vehicular Ad hok Networks (VANET) is an emerging technology with both a bright future and significant concerns, particularly in terms of security. This study focuses on three-part VANET security frameworks. The first gives a thorough review of the needs, difficulties, and characteristics of VANET security. In order to create a secure VANET architecture with effective party communication, certain needs should be taken into account. We provide information on current security designs as well as widely used security standard protocols. The second concentrates on a brand-new categorization of the various assaults described in the VANET literature and the remedies that go with them. The third compares a few of these options using established security standards for VANET. Then, in order to assist researchers for future usage, we call attention to many outstanding topics and technological obstacles linked to VANET security

References

G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, T. Weil, “Vehicu-lar Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions”, published in Communications Surveys & Tutorials, IEEE (Volume:13 , Issue: 4 ), pages 584-616, July 2011.

R.S. Raw, M. Kumar, N. Singh, “Security Challenges, issues and their solutions for VANET”, published in International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013..

22.M. Azees, L. Jegatha Deborah, and P. Vijayakumar, “Comprehensive survey on se-curity services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, 2016..

11.R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security sur-veys,” Computer Communications, vol. 44, pp. 1–13, 2014..

4.H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, “VANet security challenges and solutions: a survey,” Vehicular Communications, vol. 7, pp. 7–20, 2017..

13.S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc net-works (VANETS): status, results, and challenges,” Telecommunication Systems, vol. 50, no. 4, pp. 217–241, 2012.

M. Azeez, L. Jegatha Deborah, and P. Vijayakumar, “Comprehensive survey on securi-ty services in vehicular ad-hoc networks,” IET Intelligent Transport Systems, vol. 10, no. 6, pp. 379–388, 2016.View at: Publisher Site | Google Scholar

Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular network security, trust, and privacy,” IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760–776, 2019.

S. Sharma and A. Kaul, “A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud,” Vehicular Communi-cations, vol. 12, pp. 138–164, 2018.

A. Boualouache, S.-M. Senouci, and S. Moussaoui, “A survey on pseudonym changing strategies for vehicular ad-hoc networks,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 770–790, 2018.

Ali, A. Hassan, and F. Li, “Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey,” Vehicular Communications, vol. 16, pp. 45–61, 2019.

X. Liang, T. Yan, J. Lee, and G. Wang, “A distributed intersection management proto-col for safety, efficiency, and driver’s comfort,” IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1924–1935, 2018. 28. T. Neudecker, N. An, T.

Gauge, and J. Mittag, “Feasibility of virtual traffic lights in non-line-of-sight environ-ments,” in Proceedings of the Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications—VANET’12, pp. 103–105, Lake District, UK, June 2012.View at: Publisher Site | Google Scholar

Draft guide for wireless access in vehicular environment (WAVE) architecture 2012, http://ieeexplore.ieee.org/servlet/opac?punumber-6320593.

O, A. Hassen, "Big Data Based Machine Learning and Predictive Analytics using Apache Mahout and Storm", International Refereed Journal of Reviews and Research, Volume 5 Issue 5 Sep. 2017.

M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, “Distributed misbehavior detec-tion in VANETs,” in Proceedings of the IIEEE Wireless Communications and Network-ing Conference (WCNC), Budapest, Hungary, April 2009.

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent ve-hicular (5GenCIV) framework: when Benz meets Marconi,” IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017.View at: Publisher Site | Google Scholar.

Hussain k. Ibrahim O. A. Hassen, "Preventive Approach against HULK Attacks in Net-work Environment", International Journal of Computing and Business Research (IJCBR), VOL, 7, NO, 3, PP.1-11, 2020.

N, Hayder, et al. "An Effective Implementation of Face Recognition Using Deep Con-volutional Network." Journal of Southwest Jiaotong University 54.5 (2019.

Al-Saedi, K.H.K., Implementation Patterns of AquaSim for Simulation of Underwater Acoustic Wireless Sensor Networks. Wasit Journal of Computer and Mathematics Science, 2021: p. 84-92.

Verma, H., Internet of Robotics Things (IoRT) Based Integration of Robotic Applications for Advanced Research. Wasit Journal of Computer and Mathematics Science, 2021: p. 9-16.

Kh-Madhloom, J., Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 21-33.

Al-ogaili, H. and A.M. Shadhar, the Finger Vein Recognition Using Deep Learning Technique. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 1-11.

Zubain, N.A. and A. Al-Hachami, Certain Types of Function Via Alpha-Open Sets. Wasit Journal of Pure sciences, 2022. 1(2): p. 96-101.

Taresh, M.R. and A. Al-Hachami, On normal space: OR, Og. Wasit Journal of Pure sciences, 2022. 1(2): p. 61-70.

Roa'a M. Al_airaji., et al., Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN. International Journal of Interactive Mobile Technologies, 2022. 16(8).

Salim Haider, H.T.Hazim., Secure Chaos of 5G Wireless Communication System Based on IOT Applications. International Journal of Online and Biomedical Engineering(iJOE), 2022. 18(12): p. 89-102.

Alaidi, A.H.M., et al., Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 2022. 16(10).

H. Alrikabi, H.T.H., Enhanced Data Security of Communication System using Combined Encryption and Steganography. International Journal of Interactive Mobile Technologies, 2021. 15(16): p. 144-157.

Abdulhussein, Ansam A., Baghdad Informatics, and O. A. Hassen. "A Pragmatic Review and Analytics of Gait Recognition Techniques in Biometric Domain of Research." International Journal of Computing and Business Research (IJCBR), vol, 10, issue, 3. Pp.19, 2020

Article submitted 25

Downloads

Published

2022-10-06

How to Cite

Ahmed Hassan, H., & Wahab khadim, S. W. khadim. (2022). Review Vehicular Ad hoc Networks Security Challenges and Future Technology: Networks Security Challenges and Future Technology. Wasit Journal of Computer and Mathematics Sciences, 1(3), 1–14. https://doi.org/10.31185/wjcm.50

Issue

Section

Computer
Loading...