A Comprehensive Survey on Vehicular Communication Security
DOI:
https://doi.org/10.13052/jcsm2245-1439.1359Keywords:
Vehicular networking, V2X technologies, Security threats, Intrusion detection, Misbehaviour detectionAbstract
Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabilities.
This study provides a comprehensive overview of challenges in existing vehicular communications, with a specific focus on security attacks categorised by their impact on MAC, routing, and cross-layer levels. To ensure secure vehicular communication, we analyse existing solutions for both single and cross-layer attacks, evaluating their strengths and limitations from a security standpoint. Additionally, we innovate by addressing vulnerabilities across MAC, routing, and cross-layer interactions, offering practical insights and a unique approach to mitigating their combined impact. Our findings suggest that enhancements are needed for MAC layer security in TDMA protocols, and that routing protocols must be designed with better security features to manage high overheads and real-time requirements.
Downloads
References
Van der Heijden R. W. et al. “Survey on misbehavior detection in cooperative intelligent transportation systems.” IEEE Communications Surveys & Tutorials 21, 779–811, 2018.
Sharma, Sparsh, and Ajay Kaul. “A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud.” Vehicular communications 12, 138–164, 2018.
Lu, Zhaojun, Gang Qu, and Zhenglin Liu. “A survey on recent advances in vehicular network security, trust, and privacy.” IEEE Trans. on Intelligent Transportation Systems 20, 760–776, 2018.
Tong W., et al. “Artificial intelligence for vehicle-to-everything: A survey.” IEEE Access, 10823–10843, 2019.
Kelarestaghi K. B., et al. “Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures” arXiv preprint, 2019.
Hussain R., Jooyoung L., Sherali Z. “Trust in VANET: A survey of current solutions and future research opportunities.” IEEE Trans. on Intelligent Transportation Systems, 2020.
Lamssaggad A., Nabil B., Abdelhakim H., Mounira M. “A survey on the current security landscape of intelligent transportation systems.” IEEE Access, 2021.
Karabulut M. A., Shah AFM S., Haci I., Al-Sakib K. P., Atiquzzaman M. “Inspecting VANET with Various Critical Aspects–A Systematic Review.” Ad Hoc Networks, 2023.
Li Z., Weidong F., Chunsheng Z., Zhiwei G., Wuxiong Z. “AI-enabled Trust in Distributed Networks.” IEEE Access, 2023.
Sangwan A., Anju S., Rishi P. S. “A classification of misbehavior detection schemes for VANETs: a survey.” Wireless Personal Comm. 129, 285–322, 2023.
Ismail, Tayssir, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, and Leila Azouz Saidane. “Impact analysis of greedy behavior attacks in vehicular ad hoc networks.” In 2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN), pp. 1–6. IEEE, 2021.
Mejri, M. N., Ben-Othman, J. “Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks.”, IEEE Global Comm. Conf., 2014.
Mejri, M. N., Ben-Othman, J. “GDVAN: a new greedy behavior attack detection algorithm for VANETs.”, IEEE Trans. on Mobile Computing, 759–771, 2016.
Al-Terri D. et al. “Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs.” Computer Communications 104, 108–118, 2017.
Abuzainab N., Erpek T., Davaslioglu K., Sagduyu Y.E., Shi Y., Mackey S.J., Yener A. QoS and jamming-aware wireless networking using deep reinforcement learning. IEEE Military Communications Conf. (MILCOM), 610–615, 2019.
Almomani I., Mohanned A., Dimitrios K., Aala A., Leandros M. “An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.” IEEE Access, 2022.
Guleria C., Harsh K. V. “Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network.” 4th Int. Conf. on Computing Communication and Automation (ICCCA), 2018.
Valentini E. P., Rodolfo I. M., Adil A. “An attacks detection mechanism for intelligent transport system.” IEEE Int. Conf. on Big Data, 2453–2461, 2020.
Valentini E. P., Geraldo P. R. F., Robson E. D. G., Caetano M. R., Lourenço A. P., Rodolfo I. M. “A Novel Mechanism for Misbehaviour Detection in Vehicular Networks.” IEEE Access, 2023.
Mostefa F. Z., Zoulikha M. M., Claude D. “Secure Communications by Tit-for-Tat Strategy in Vehicular Networks.” Int. J. Networked Distributed Comput. 8, 214–221, 2020.
Malik A., Muhammad Z. K., Mohammad F., Faheem K., Jung-Taek S. “An efficient dynamic solution for the detection and prevention of black hole attack in vanets.” Sensors, 2022.
Lakshmi S., Anita E.M., Jenefa J. A hybrid approach against black hole attackers using dynamic threshold value and node credibility. IEEE Access, 2023.
Sarker O., Hong S., Babar M.A. Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. arXiv preprint, 2023.
Baccari S., Hadded M., Touati H., Muhlethaler P. A secure trust-aware cross-layer routing protocol for Vehicular Ad hoc Networks. Jour. of Cyber Sec. and Mobility, 2020.
Quevedo A.M.B.C, Carlos H.O.O.Q., Gomes R. L. , Camara S. F., Celestino J. “A Reputation and Security Mechanism for Heterogeneous Vehicular Networks.” IEEE Symp. on Computers and Comm. (ISCC), 1–6, 2022.
Mianji, E. M., Gabriel-Miro M., Irina T. “Trustworthy Routing in VANET: A Q-learning Approach to Protect Against Black Hole and Gray Hole Attacks.” 97th IEEE Vehicular Technology Conf. (VTC), 1–6, 2023.
Kaur G., Meenu K., Amandeep K. “VANET Cluster Based Gray Hole Attack Detection and Prevention.” SN Computer Science 5, 1, 2024.
Albouq S. S., Erik M. F. “Detection and avoidance of wormhole attacks in connected vehicles.” 6th ACM Symp. on Development and Analysis of Intelligent Vehicular Networks and Applications, 107–116, 2017.
Kanumalli S.S., Anuradha C., Murty P.S.R.C. “Isolation of wormhole attackers in IOV using WPWP packet” Revue d’Intelligence Artificielle, 9–13, 2019.
Ali S., Parma N., Shailesh T. “Impact of wormhole attack on AODV routing protocol in vehicular ad-hoc network over real map with detection and prevention approach” Int. Jour. of Vehicle Inf. and Comm. Sys. 5, 354–373,2020.
Fotohi R., Yaser E., Mohammad S. G. “A new approach for improvement security against DoS attacks in vehicular ad-hoc network.” arXiv preprint, 2020.
Tosunoglu B. A., Cemal K. “FA-AODV: flooding attacks detection based ad hoc on-demand distance vector routing protocol for VANET.” Sakarya University Jour. of Computer and Inf. Sciences 5, 304–314, 2022.
Keshari N., Dinesh S., Ashish K.M. “DoSRT: A Denial-of-Service Resistant Trust Model for VANET” Cybernetics and Inf. Technologies, 165–180, 2023.
Subba B., Santosh B., Sushanta K.”A game theory based multi layered intrusion detection framework for VANET” Future Gen. Comp. Sys. 12–28, 2018.
Baiad, R., Otrok, H., Muhaidat, S., & Bentahar, J. Cooperative cross layer detection for blackhole attack in VANET-OLSR. In Int. Wireless Communications and Mobile Computing Conf. (IWCMC), 863–868, 2014.
Baiad R. et al. “Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET” Vehicular Communications 9–17, 2016.
Shurman M. M., et al. “An Enhanced Cross-Layer Approach Based on Fuzzy-Logic for Securing Wireless Ad-Hoc Networks from Black Hole Attacks.”, 2017.
Rabiaa N., Ali C. M., Boukli H. S. “A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks.” Info. Sec. Jour.: A Global Perspective 32, 212–226, 2023.
Ansari A., Mohammed W. “Flooding attack detection and prevention in MANET based on cross layer link quality assessment.” Int. Conf. on Intelligent Computing and Control Systems (ICICCS), 612–617, 2017.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.