Survey on VANET security challenges and possible cryptographic solutions

被引:380
|
作者
Mejri, Mohamed Nidhal [1 ]
Ben-Othman, Jalel [1 ]
Hamdi, Mohamed [2 ]
机构
[1] Univ Paris 13, Sorbone Paris Cite, L2TI, Paris, France
[2] Univ Carthage, SupCom, Carthage, Tunisia
关键词
Vehicular Ad hoc Networks (VANETs); IEEE; 802.11p; Security; Cryptography; Attacks; HOC; INFORMATION;
D O I
10.1016/j.vehcom.2014.05.001
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the near future, it is expected that vehicles which increasingly become an intelligent systems will be equipped with radio communications interfaces. Thus, vehicular networks can be formed and they are commonly known as VANETs (Vehicular Ad hoc NETworks), a use case of mobile ad hoc networks where cars are the mobile nodes. As VANETs exhibit several unique features such as the high mobility of nodes, short connection times, etc. conventional security mechanisms are not always effective. Consequently, a wide variety of research contributions have been recently presented to cope with the intrinsic characteristics of vehicular communication. This paper provides a summary of the recent state of the art of VANETs, it presents the communication architecture of VANETs and outlines the privacy and security challenges that need to be overcome to make such networks safety usable in practice. It identifies all existing security problems in VANETs and classifies them from a cryptographic point of view. It regroups, studies and compares also the various cryptographic schemes that have been separately suggested for VANETs, evaluates the efficiency of proposed solutions and explores some future trends that will shape the research in cryptographic protocols for intelligent transportation systems. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:53 / 66
页数:14
相关论文
共 50 条
  • [41] Security of Vehicular Ad-Hoc Networks (VANET): A survey
    Afzal, Zehra
    Kumar, Manoj
    THIRD NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2019), 2020, 1427
  • [42] Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey
    Sumra, Irshad Ahmed
    Hasbullah, Halabi Bin
    AbManan, Jamalul-Lail Bin
    Advances in Intelligent Systems and Computing, 2015, 306 : 51 - 61
  • [43] Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities
    Zhang, Lei
    Xiong, Hu
    Huang, Qiong
    Li, Jiguo
    Choo, Kim-Kwang Raymond
    Li, Jiangtao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 567 - 587
  • [44] A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
    Kim, Nam Yong
    Rathore, Shailendra
    Ryu, Jung Hyun
    Park, Jin Ho
    Park, Jong Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1361 - 1384
  • [45] Cyber security challenges and solutions for V2X communications: A survey
    Alnasser, Aljawharah
    Sun, Hongjian
    Jian, Jing
    COMPUTER NETWORKS, 2019, 151 : 52 - 67
  • [46] State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions
    Shahzad, Farrukh
    5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 357 - 362
  • [47] Vehicular Ad Hoc Network (VANET): A Survey, Challenges, and Applications
    Rasheed, Asim
    Gillani, Saira
    Ajmal, Sana
    Qayyum, Amir
    VEHICULAR AD-HOC NETWORKS FOR SMART CITIES, 2017, 548 : 39 - 51
  • [48] Satellite-based communications security: A survey of threats, solutions, and research challenges
    Tedeschi, Pietro
    Sciancalepore, Savio
    Di Pietro, Roberto
    COMPUTER NETWORKS, 2022, 216
  • [49] Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
    Sobb, Theresa
    Turnbull, Benjamin
    Moustafa, Nour
    ELECTRONICS, 2020, 9 (11) : 1 - 31
  • [50] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
    Attar, Alireza
    Tang, Helen
    Vasilakos, Athanasios V.
    Yu, F. Richard
    Leung, Victor C. M.
    PROCEEDINGS OF THE IEEE, 2012, 100 (12) : 3172 - 3186