Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey of attacks and detection mechanisms on intelligent transportation systems
Sakiz F., Sen S. Ad Hoc Networks61  33-50,2017.Type:Article
Date Reviewed: Feb 14 2018

A vehicle ad hoc network (VANET) is a mobile ad-hoc network (MANET) consisting of vehicles and roadside units (RSUs). VANETs are a key technology for future smart car services such as accident alerting, regional traffic information sharing, autonomous driving, and so on. A notable characteristic of VANET applications is that the information is usually generated by vehicles and delivered through cooperative vehicles. These characteristics can cause security issues such as deception in vehicle sensors and packets. This paper provides a holistic view of existing security issues and solutions in VANETs.

The first security issue in this paper is the Sybil attack, which is an identity deceit. The identity includes the current location. Since vehicles in a VANET use the location information in a VANET application message, a Sybil attack can cause a traffic jam in a specified location intentionally. To detect a Sybil attack, several solutions such as trajectory tracing or reputation-based trust mechanisms have been proposed to estimate the real location. However, these approaches can cause privacy issues, for example, vehicle drivers’ information can be exposed to anonymous users. Moreover, security issues such as denial-of-service attacks, blackhole attacks, wormhole attacks, bogus information attacks, and so on are presented with existing solutions. Many solutions use a public-key approach for authentication. The approach can have limitations of a delay in response time and a lack of a global certificate authority. Thus, many solutions rely on an honest majority assumption of trust, which can be also vulnerable to a large-volume attack. Consequently, attack detection in a VANET is a complex and challenging topic.

This paper enumerates the security solutions in section 3. A reader would find that some solutions are similar and others are not. Since the distinctive features of each solution are summarized in the discussion section, section 3 would be more accessible if the reader started with the discussion section first. In addition, since each subsection in section 3 describes each attack type again, readers can skip section 2.

Reviewer:  Seon Yeong Han Review #: CR145854 (1805-0224)
Bookmark and Share
 
Wireless Communication (C.2.1 ... )
 
 
Human Safety (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Wireless Communication": Date
Mobile power management for wireless communication networks
Rulnick J., Bambos N. Wireless Networks 3(1): 3-14, 1997. Type: Article
Aug 1 1998
New call blocking versus handoff blocking in cellular networks
Sidi M., Starobinski D. Wireless Networks 3(1): 15-27, 1997. Type: Article
Sep 1 1998
The wireless Net
Fowler D. netWorker: The Craft of Network Computing 1(2): 24-34, 1997. Type: Article
Sep 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy