Hamdi, 2021

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/352787389

Integrity and Authentications for service security in vehicular ad hoc


networks (VANETs): A Review

Conference Paper · June 2021


DOI: 10.1109/HORA52670.2021.9461327

CITATIONS READS

14 135

3 authors, including:

Mustafa Maad Hamdi Ahmed Shamil Mustafa


University of Anbar Al-Maarif University
91 PUBLICATIONS 941 CITATIONS 50 PUBLICATIONS 431 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Mustafa Maad Hamdi on 28 June 2021.

The user has requested enhancement of the downloaded file.


Integrity and Authentications for service security in
vehicular ad hoc networks (VANETs): A Review
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) | 978-1-6654-4058-5/20/$31.00 ©2021 IEEE | DOI: 10.1109/H O RA52670.2021.9461327

lst Mustafa Maad Hamdi 2nd Yuser Anas Yussen 3rdAhmed Shamil Mustafa
Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
Techniques,Al-Maarif University Techniques,Al-Maarif University Techniques,Al-Maarif University
College, Al-Anbar,Iraq. College, Al-Anbar,Iraq. College, Al-Anbar,Iraq.
meng.mustafa@yahoo.com yuseranas99@gmail.com ahmedshamil90@gmail.com

Abstract— A main type of Mobile Ad hoc Networks comes to open, safe communication, communication, and
(MANET) and essential infrastructure to provide a wide range reputation management systems. This affects the trust of the
of safety applications to passengers in vehicles (VANET) are portable system in collaboration and arrangement. They are
established. VANETs are more popular today as they connect to genuinely defenseless to attacks by the fluctuating
a variety of invisible services. VANET protection is crucial as its
performance of the brand, which can lead to life-threatening
potential use must not endanger the safety and privacy of its
users. The safety of these VANETs is essential to safe and conditions as seen in figure 1.
efficient safety systems and facilities and uncertainty continues
and research in this field continues to grow rapidly. We will
explain the characteristics and problems of VANETs in this
paper. Also, all threats and attacks that affect integrity and
authentication in VANETs will be defined. Description of
researchers' work was consequently addressed as the table with
the problems of the suggested method and objective.

Keywords—VANETs, V2V, Integrity, Authentication, RSU.

I. In t r o d u c t io n

The ad hoc network of vehicles (VANETS) has


increasingly called attention to both academic and industrial
considerations. It is a crucial element of the intelligent
transport system aimed at improving driving safety through
vehicle communication and roadside infrastructure
communication^, 2]. With the help of the roadside and web,
this VANETS Base improves the early access of traffic
accident data for end-users. VANETs can be used to provide
reliable indications of prevention systems in the early stage
of a potential transport incident as a monitoring and early
warning framework. In the past few decades, emerging Fig. 1. Vehicular ad hoc network (VANETS).
developments have developed into the intelligent
Transportation System (ITS) and been data-driven ITS as In this article, we discuss the challenges of VANET
massive quantities of data are gathered from a wide range of privacy and security threats. We discuss the architecture,
sources. VANET s are processes that are self-organized and privacy, and security problems in the performance of
decentralized[3]. VANET's and cloud computing. The number of private
VANET provides Dedicated short-range communication vehicles on the road has also increased with an increase in
through the IEEE 802.11p protocol of 5.9 GHz band (DSRC). trade and increased progress[7]. The probability of accidents
In addition, VANET provides another scenario for and road accidents has been increased. The ad-hoc vehicle
networking such as V2V and V2I communications for local networks (VANETs) have shown promise to reduce road
and remote environments. VANET also has a different accidents and deaths by allowing vehicles to be
communications scenario. Wherever VANET s have been one communicated. Furthermore, VANETs allow road users to
of the most exciting and growing mobile ad hoc network sub- control and track rapid rush and relief vehicles. However,
sets (MANETs). These include autonomous devices, design, routing, communication, and safety problems face
roadside systems, and onboard units (OBUs) that are these networks[8]. The use of wireless networks has opened
connected by unreliable wireless media[4]. They are also these networks to various types of security attacks. The
available on the Internet. Besides the lack of infrastructure, possibility that a malicious vehicle or RSU has several
the equipment manufacturers travel at different speeds[5, 6]. identities is an important weakness in such a network. The
The delay is the establishment and effective transfer of secure attack is called an attack by Sybil[9, 10]. VANETs allow for
end-to-end communications ways. VANETs thus faced a malicious vehicle to send inaccurate traffic signals, a
different systems issues and security challenges when it forward collision, a closed lane, etc. This can cause the driver

978-1-6654-4058-5/21/$31.00 ©2021 IEEE

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
to take another route leaving him vulnerable to an accident. B. Real-Time System
The objective of this paper considering the importance of Developing a real-time system is a difficult challenge because
V2V and V2I to explain VANET issues and explained safety it is difficult to deliver an alert message before the deadline
issues like authentication and integrity were discussed[4]. For in an increasingly mobile world.
each case, a literature survey, and a comparison with previous
studies, as presented in T able 1. Security services were also C. Security and Trust
discussed as a possible capability attack. Security issues are often not addressed specifically in travel
applications, especially the comforts of a traveler, which is
The rest of the paper as follows: The definition of why cooperative leadership exists amongst all [15, 16]. If
VANET is explained in section 1. Describing the security and confidence are not offered, the customers will
characteristics of VANETs in section 2. In Section 3, not accept the warning systems. Trust and trustworthy
VANETs present the most challenges. Section 4, which applications are one of the most critical problems for
explains all kinds of authentication and integrity in VANETs. protection within VANET. The integration of protection
Section 5 shows the conclusion and future work. maps in VANET applications can therefore postpone the
message's arrival[17].
D. Mobility
II. CHARACTERISTICS OF VANETS
VANET vehicles are highly dynamic, so they can freely
A. Highly Dynamic Topology travel during their movement and connect with other vehicles
Due to the very design of vehicles, it is especially demanding that can never be approached before. Vehicles remain
to describe a specific configuration for a VANET s network. connected for quite a long time, and as they travel down the
the nodes are in constant movement, and communication road which makes it difficult to secure VANET each vehicle
between v2i and v2v will take place within a very short time. will lose connection[18].
this makes it difficult to define the configuration of these
networks [11].
IV. Se c u r it y a n d Pr iv a c y
B. Variable channels in time and frequency
Although most VANETS security issues are identical to
The communications may be more heavily degrading in time MANETs, VANETSs make privacy challenges more
or frequency, due to the speed of vehicles, the environment challenging. Due to the optimization, frequent change in
in which they circulate, and the possible barriers to the topology, high mobility, and various implementations, safety
wireless signal (buildings, trees, etc..). than other mobile issues are more complicated. Furthermore, there is a balance
networks. between driver/vehicle privacy authentication and non-
C. Autonomy repudiation. lists certain VANETS-related security issues.
Smart onboard applications may monitor a large volume of
It refers to the right of each Network Node to access the
data and personal information about the movement of a
medium, to transmit, route, and, where necessary, to receive
vehicle after VANETS is installed. Theft or misuse can lead
packets without centralized control. The OBU and the RSU
to serious problems with privacy and general security. Before
are also independently involved in these tasks.
a large-scale implementation of VANETS, these problems
D. Unlimited power supply must be addressed. Different attacks and threats vulnerable to
The power use nodes have no limitations as the battery VANETs. Security attacks must be classified because
supplies enough for OBU and/or AU operation [12]. VANETs involve children and parents cannot open
themselves to risks. Authentication and integrity are the main
E. High computational capacity classifications of these attacks[19]. The VANET security
Node OBUs can handle high network traffic flows with low service is seen in Figure 2. Now we illustrate the various
(video streaming) or low data rates with high priority, possible attacks to authentication and integrity.
depending on the application (security applications). They
monitor the routing and connection to the RSU, so that the
devices need the computational power, especially in critical
applications, to perform these tasks simultaneously and
without very high latencies [13].

III. Ch a l l e n g e o f VANET s
A. Data Distribute over the Mesh Nodes
We can conclude that, for data to be disseminated in high
quality, multiple units must be connected side by side
opposite each other on the lane, forming or establishing a
network of connectivity and distribution of the data more
cooperatively to all the various vehicles [14].
Fig.2. VANET security services.

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
A. Integrity in VANETs • Replay Attack: The goal of the attacker is to
Data integrity is one of the most critical security fraudulently duplicate or interrupt transmission by
objectives of the vehicle network and should be preserved providing valid data and inserting invariant beacon
when transmitting V2V or vehicles to the roadside messages received afterward on the VANETs,
(V2R)[20]. As it is from sender to receiver, the message which can create difficulties in identifying vehicles
cannot be changed. If the origin is an actual network user but by the transport authority in the case of an
the quality of the message has been modified, the validity of emergency[22].
the original user must not be verified. Accuracy and integrity
of the data must be guaranteed. These attacks aim to affect • Message Tampering Attack: The attack usually
the validity and utility of a message. Examples such as occurs as the name of the attack as the attacker
message control, illusion attacks, and timer attacks are modifies or changes recent message data [23]. For
examples of this type. The attackers modify V2V or V2I example, if the route is interrupted, the attacker
messages in message modification. In an attack by deception, changes the data to clarify the path that will affect
the attackers modify the vehicle's sensors such that they send the user in changing his paths.
incorrect messages on the network and intentionally delete
the messages during time attacks such that critical messages • illusion Attack: This attack obtained antenna data
cannot be sent. Data accuracy and reliability represent what and malicious information from sensor data
is known as data confidence globally. The information generators that use the existing road condition to
involved should not be changed, and should they be accurate, generate an impression for vehicles involved to
fresh (current)[21]. It is important because wrong or generate traffic warning messages[24]. Caption
corrupted data could lead to a possible accident, bottlenecks, attack may be caused by road collisions and
and other traffic-security problems. Therefore, in all VANET congestion and by the usage of unnecessary
communications, data confidence must be established. In bandwidth the efficiency of the VANET device is
transmitting safety and security applications of the vehicle minimized.
network, messages are of great importance. The amongst
certain all possible attacks concerning integrity. B. Authentication in VANETs
• Message Alteration Attack: Malicious Attackers Authentication attacks and data security attacks: certain
modify the message and send false messages to attack types occur when non-authenticated vehicles enter
other people. Attackers modify the security or non- network messages or monitor private vehicle-related
security messages received from the others or the information [25]. Examples such as Sybil attacks,
RUS and then transmit this alter to other network impersonation attacks, location monitoring, and identity
users [13]. The example in which attacker X starts revealing attacks include such attacks. When the attacker is
the security message attack. Attacker X gets an error Sybil, they take multiple identities and delivers false
message Break down Vehicle A's warning. messages to legitimate users. The attacker pretends to be one
Therefore, the attacker updates the message content of the authenticated vehicles in impersonation attacks and
and delivers this message Road to vehicle B is Clear. sends messages. The attacker creates vehicle profiles in
private attacks, including location monitoring attacks, by
• Message Fabrication Attack: Attackers transmit tracking a vehicle's route, and by identifying attacks, the
false data on a network in a message fabrication attacker obtains the identity of the owner and driver and can
attack [13]. Such attacks are being conducted by access his details. The availability of interactive elements in
greedy drivers. The greedy drivers create messages a vehicle network includes the security of legitimate internal
using broadcast methods and begin an attack by and/or external nodes that can handle the network by using
transmitting them to the network. There are two false identities, manufacturing, changing, or replaying
possible modes of the production of legitimate messages as well as revealing scared GPS signals,
communications. Incorrect information is to avoid unauthorized information being introduced by the
transmitted to other vehicles or an RSU concerning attacker into the vehicle network. There are some threats as
the ID, speed, and position of an attacker. The following:
attacker would also be presented as an emergency
vehicle so that the attacker will drive faster. • Masquerading: The masquerading of attacks is
simple in VANET since only an attacker must be
connected to the network as an onboard device.
• Incorrect Data Injecting Attack: Attacker X
Various attacks may be carried out by the attacker
monitors communication in the original message
by presenting themselves as a certificate authority of
(blue lines) from vehicle C to Vehicle D by inserting
the network. These attacks involve the development
alternate information.
of black holes or fake messages.
• Masquerading Attack: The attacker uses registered
• Replay Attack: In a replay attack, the attacker re-
user IDs and passwords in the VANET system and
introduces a message that was previously sent,
is trying to transmit false messages that appear to be
which compromises the location table of a node by
coming from the authorized node.
replaying beacons. To ensure security, an exact time
source must be established to retain an archive of
messages received previously in addition to

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
previous messages because this type of attack does
not occur in VANET working within a wave frame.

• GPS Spoofing: The GPS satellite determines the


geographical location and identification of the
vehicle within the network. By providing a false
reading, an attacker can trick the vehicles in a
network into believing they are in various places.
The use of the GPS satellite simulator will provide
stronger signals than the current generated by the
attacking satellite.

• Tunneling: This is a type of attack where an attacker


uses the temporary loss of positioning information
as the vehicle reaches a tunnel and the attacker may
have inserted incorrect information into the vehicles
positioning information before the vehicle regains
positioning.

• Position Faking: Accurate and authentic reports of


a vehicle's placing should be guaranteed. The
vehicle's location information is only given by the
vehicle and it should not be possible to impersonate.
An attacker will penetrate the information about the
location, thereby generating additional identifiers
that could prevent a vehicle from receiving details
of critical security, in an event that the vehicle
communication device is unsecured.

• Message Tampering: The communication


exchanged between V2V or V21 may be modified
to disprove requests for transfer applications by
threatening the authenticity of an attacker.

• Message Suppression/Fabrication/Alteration: An
attacker may either physically disable or change the
application to prevent the application from receiving
or sending beacons.

• Key and/or Certificate Replication: The duplication


of the vehicle identification in many other vehicles
inside the network can be used with a 1n attacker
scheme. The attacker's principal goal is to confuse
authorities and to avoid car detection in hit-and-run
incidents.
Table1: A compilation of recent publications on integrity and
authentication VANETs.

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
Proposed Scheme
Authentication

Objective
Integrity
Authors

Method
Issues
Even from the RSU, the real identity A new pseudo-identity system of The cost-effectiveness and
x x if it compromised. integrity and authentication for sufficiency of VANET work.
[26]
contingent privacy in a VANET.

The safety requirements such as A cluster-based VANET trust-based Provides lower overhead and delay
[27] - x message anonymity, integrity, and authentication system is proposed. for high security.
authentication need to be satisfied.

It is not possible to authenticate an An efficient ID-CPPA (ID-CPPA) Reduces the overhead of the RSU so
extensive range of messages signature scheme based on a bilinear that many messages can be
[28] x x generated from multiple vehicles map for Vehicle-To-Infrastructure authenticated.
efficiently by a roadside unit (RSU). (V2I) connectivity.

How to ensure communication NERA Scheme is proposed, and Reduce safety threats during
security and privacy in VANETs. Elliptical Curve Cryptosystem (ECC) pseudonyms and the process of
[29] x is proposed to enhance the RSU private key generation.
authentication scheme.

challenges of being rapidly Secure Vehicle Communications Independence of key control,


embedded into vehicles and not DAPPA Protocol. robustness, and fast message
[30] x dependent on ideal tamper-proof delivery, without the perfect TPD,
systems (TPDs). required.

The challenges raised by VANETs EST-Net, a new vehicle ad-hoc REST-Net provides high rates of
for integrity and authenticity. network intrusion detection system detection, adaptive driver disruption
(VANETs). warning speeds, and a false message
[31] x x
renouncing principle until the
attacker is detected.

There is no difference between the Authentication with Multiple Levels It can offer several anonymity levels
requirements for anonymity of of Anonymity (AMLA). to different VANET vehicles and the
various vehicles under the current identity-based signature function
security protocols in VANETs and maintains the protocol overhead low.
[32] x x
the anonymity levels offered by
these protocols are the same for all
network vehicles.

Tough to detect robust confidence MobileTrust: A trust-based hybrid Ensure intelligent and energy-
[33] x evaluation in crowdsourcing. framework for secure VANET sharing efficient security, privacy, and trust.
of resources.

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
The above table can be summarized with the researchers' "Performance evaluation of active queue
most important findings as they have devoted their articles to management algorithms in large network," in 2018
integrity and authentication, noting that [26] focus on The IEEE 4th International Symposium on
cost-effectiveness and sufficiency of VANET work. In [27] Telecommunication Technologies (ISTT), 2018, pp.
Provides lower overhead and delay for high security. In [28],[29] 1-6: IEEE.
Reduces the overhead of the RSU so that many messages can be [7] !!! INVALID CITATION !!! [6-8].
authenticated and Reduce safety threats during pseudonyms and the [8] M. S. Abood, H. Wang, H. F. Mahdi, M. M. Hamdi,
process of private key generation. Also in [30] Independence of key and A. S. Abdullah, "Review on secure data
control, robustness, and fast message delivery, without the perfect aggregation in Wireless Sensor Networks," in IOP
TPD required. [31] REST-Net provides high rates of detection, Conference Series: Materials Science and
adaptive driver disruption warning speeds, and a false message Engineering, 2021, vol. 1076, no. 1, p. 012053: IOP
renouncing principle until the attacker is detected. In [32]It can offer
Publishing.
several anonymity levels to different VANET vehicles and the
[9] H. Hasrouny, A. E. Samhat, C. Bassil, and A.
identity-based signature function maintains the protocol overhead
low. Finally, in [33] Ensure intelligent and energy efficient security, Laouiti, "VANet security challenges and solutions:
privacy, and trust. A survey," Vehicular Communications, vol. 7, pp. 7-
20, 2017.
V. Co n c l u s io n [10] M. S. Abood, M. Ismail, and R. Nordin, "A quiz
Security messages are vulnerable to attack in an management system based on P2P near-field
open access system that broadcast VANETs. VANET communication on Android platform for smart class
considerations, particularly in V2V and V2I, are protected. In environments," in 2016International Conference on
most trials, however, confidence and availability are Advances in Electrical, Electronic and Systems
practically non-existent. The essay examines significant Engineering (ICAEES), 2016, pp. 83-88: IEEE.
advances to address this gap and discusses in detail the causes [11] F. Giudici and E. Pagani, "Spatial and traffic-aware
and many threats and hazards. In this paper, we describe the routing (STAR) for vehicular systems," in
challenges and characteristics of VANETs. Also, we list and International Conference on High Performance
explain many threats that affect integrity and authentications Computing and Communications, 2005, pp. 77-86:
in VANETs. In future work, we suggest improving integrity Springer.
and authentication by including clustering and firefly [12] J. LeBrun, C.-N. Chuah, D. Ghosal, and M. Zhang,
algorithms. "Knowledge-based opportunistic forwarding in
vehicular wireless ad hoc networks," in 2005 IEEE
Re f e r e n c e s
61st Vehicular Technology Conference, 2005, vol.
4, pp. 2289-2293: IEEE.
[1] M. M. Hamdi, L. Audah, S. A. Rashid, and S. Alani, [13] I. Leontiadis and C. Mascolo, "GeOpps:
"VANET-based traffic monitoring and incident Geographical opportunistic routing for vehicular
detection system: A review," International Journal networks," in 2007 IEEE international symposium
o f Electrical & Computer Engineering (2088-8708), on a world o f wireless, mobile and multimedia
vol. 11, no. 4, 2021. networks, 2007, pp. 1-6: Ieee.
[2] A. S. Mustafa, M. M. Al-Heeti, M. M. Hamdi, and [14] M. Chitra and S. S. Sathya, "Efficient broadcasting
A. M. Shantaf, "Performance analyzing the effect of mechanisms for data dissemination in vehicular ad
network size on routing protocols in MANETs," in hoc networks," International Journal o f Mobile
2020 International Congress on Human-Computer Network Communications & Telematics (IJMNCT),
Interaction, Optimization and Robotic Applications vol. 3, no. 3, pp. 47-63, 2013.
(HORA), 2020, pp. 1-5: IEEE. [15] S. Eichler, C. Schroth, and J. Eberspächer, "Car-to-
[3] W. Al Chaab, M. Ismail, M. A. Altahrawi, H. car communication," 2006.
Mahdi, and N. Ramli, "Efficient rate adaptation [16] M. M. Hamdi, H. F. Mahdi, M. S. Abood, R. Q.
algorithm in high-dense vehicular ad hoc network," Mohammed, A. D. Abbas, and A. H. Mohammed,
in 2017 IEEE 13th Malaysia International "A review on Queue Management Algorithms in
Conference on Communications (MICC), 2017, pp. Large Networks," in IOP Conference Series:
23-28: IEEE. Materials Science and Engineering, 2021, vol.
[4] M. M. Hamdi, L. Audah, S. A. Rashid, and M. A. 1076, no. 1, p. 012034: IOP Publishing.
Al-shareeda, "Techniques of Early Incident [17] M. Chaqfeh, A. Lakas, and I. Jawhar, "A survey on
Detection and Traffic Monitoring Centre in data dissemination in vehicular ad hoc networks,"
VANETs: A Review," Journal o f Communications, Vehicular Communications, vol. 1, no. 4, pp. 214-
vol. 15, no. 12, 2020. 225, 2014.
[5] H. F. Mahdi, M. S. Abood, and M. M. Hamdi, [18] G. Samara and Y. Al-Raba'nah, "Security issues in
"Performance evaluation for vehicular ad-hoc vehicular ad hoc networks (VANET): a survey,"
networks based routing protocols," Bulletin o f arXivpreprint arXiv: 1712.04263, 2017.
Electrical Engineering and Informatics, vol. 10, no. [19] O. S. Oubbati, N. Chaib, A. Lakas, P. Lorenz, and
2, pp. 1080-1091, 2021. A. Rachedi, "UAV-assisted supporting services
[6] M. M. Hamdi, S. A. Rashid, M. Ismail, M. A. connectivity in urban VANETs," IEEE
Altahrawi, M. F. Mansor, and M. K. AbuFoul,

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
Transactions on Vehicular Technology, vol. 68, no. based vehicular ad hoc networks (VANET),"
4, pp. 3944-3951, 2019. Wireless Networks, vol. 24, no. 2, pp. 373-382,
[20] A. S. Mustafa, M. M. Hamdi, H. F. Mahdi, and M. 2018.
5. Abood, "VANET: Towards Security Issues [28] H. Cheng and Y. Liu, "An improved RSU-based
Review," in 2020 IEEE 5th International authentication scheme for VANET," Journal o f
Symposium on Telecommunication Technologies Internet Technology, vol. 21, no. 4, pp. 1137-1150,
(ISTT), 2020, pp. 151-156: IEEE. 2020.
[21] K. Chellappan, A. S. Mustafa, M. J. Mohammed, [29] I. Ali and F. Li, "An efficient conditional privacy-
and A. M. Thajeel, "Layered Defense Approach: preserving authentication scheme for Vehicle-To-
Towards Total Network Security," International Infrastructure communication in VANETs,"
Journal o f Computer Science and Business Vehicular Communications, vol. 22, p. 100228,
Informatics, vol. 15, no. 1, pp. 13-22, 2015. 2020.
[22] A. Rawat, S. Sharma, and R. Sushil, "VANET: [30] L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C.
Security attacks and its possible solutions," Journal Hu, "Distributed aggregate privacy-preserving
o f Information and Operations Management, vol. 3, authentication in VANETs," IEEE Transactions on
no. 1, p. 301, 2012. Intelligent Transportation Systems, vol. 18, no. 3,
[23] N.-W. Lo and H.-C. Tsai, "Illusion attack on vanet pp. 516-526, 2016.
applications-a message plausibility problem," in [31] A. Tomandl, K.-P. Fuchs, and H. Federrath, "REST-
2007 IEEE Globecom Workshops, 2007, pp. 1-8: Net: A dynamic rule-based IDS for VANETs," in
IEEE. 2014 7th IFIP wireless and mobile networking
[24] M. Muhammad and G. A. Safdar, "Survey on conference (WMNC), 2014, pp. 1-8: IEEE.
existing authentication issues for cellular-assisted [32] N. B. Bhavesh, S. Maity, and R. C. Hansdah, "A
V2X communication," Vehicular Communications, protocol for authentication with multiple levels of
vol. 12, pp. 50-65, 2018. anonymity (AMLA) in VANETs," in 2013 27th
[25] J. Li, H. Lu, and M. Guizani, "ACPN: A novel International Conference on Advanced Information
authentication framework with conditional privacy- Networking and Applications Workshops, 2013, pp.
preservation and non-repudiation for vANETs," 462-469: IEEE.
IEEE Transactions on Parallel and Distributed [33] G. Hatzivasilis, O. Soultatos, S. Ioannidis, G.
Systems, vol. 26, no. 4, pp. 938-948, 2014. Spanoudakis, V. Katos, and G. Demetriou,
[26] M. A. Alazzawi, H. Lu, A. A. Yassin, and K. Chen, "MobileTrust: Secure knowledge integration in
"Efficient conditional anonymity with message VANETs," AC M Transactions on Cyber-Physical
integrity and authentication in a vehicular ad-hoc Systems, vol. 4, no. 3, pp. 1-25, 2020.
network," IEEE Access, vol. 7, pp. 71424-71435,
2019.
[27] R. Sugumar, A. Rengarajan, and C. Jayakumar,
"Trust based authentication technique for cluster

Authorized licensed use limited to: Karabuk University. Downloaded on June 28,2021 at 10:45:35 UTC from IEEE Xplore. Restrictions apply.
View publication stats

You might also like