Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey

被引:6
作者
Khezri, Edris [1 ]
Hassanzadeh, Hiwa [2 ]
Yahya, Rebaz Othman [3 ]
Mir, Mahdi [4 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Boukan Branch, Boukan 59511, Iran
[2] Univ Raparin, Dept Comp Sci, Rania 46012, Iraq
[3] Cihan Univ Erbil, Coll Sci, Dept Comp Sci, Erbil 44001, Iraq
[4] Ferdowsi Univ Mashhad, Dept Elect Engn, Mashhad 9177948974, Iran
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2025年 / 30卷 / 04期
关键词
attack; attacker; routing; security; VANETs; PRESERVING AUTHENTICATION SCHEME; PRIVACY PRESERVATION; PERFORMANCE ANALYSIS; RESOURCE-ALLOCATION; VEHICULAR NETWORKS; CONNECTED VEHICLES; MANAGEMENT; LOCATION; ARCHITECTURE; PROTOCOL;
D O I
10.26599/TST.2024.9010083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to their diverse applications, including safety, welfare, and improving traffic efficiency, inter-vehicle ad-hoc networks have been extensively studied. Globally, road congestion, accidents, fuel consumption, and environmental pollution caused by the large number of vehicles have become serious problems that have caused a lot of human and financial losses. Intelligent transportation systems (ITS) have introduced VANETs in order to overcome these problems. In vehicular ad hoc networks (VANETs), vehicles equipped with wireless interfaces can communicate with other vehicles and with fixed roadside equipment via mobile ad hoc networks (MANETs). Messages are transmitted over open wireless channels in VANETs. Malicious nodes target these networks to protect them from various attacks, such as interference, eavesdropping, spoofing, denial of service, Sybil, black holes, worm holes, gray holes, etc. Security of VANETs is therefore one of the most significant issues. Security issues, attacks, attackers, and secure routing protocols in VANETs are discussed in this article, as well as available solutions to solve security issues.
引用
收藏
页码:1700 / 1723
页数:24
相关论文
共 242 条
[1]   VANET security and forensics: Challenges and opportunities [J].
Abassi, Ryma .
WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2019, 1 (02)
[2]   An Efficient Cluster Based Resource Management Scheme and its Performance Analysis for V2X Networks [J].
Abbas, Fakhar ;
Liu, Gang ;
Fan, Pingzhi ;
Khan, Zahid .
IEEE ACCESS, 2020, 8 :87071-87082
[3]  
Abdulkadhim F. G., 2024, Appl. Nanosci., V14, P721
[4]   Systematic literature review on Internet-of-Vehicles communication security [J].
Abu Talib, Manar ;
Abbas, Sohail ;
Nasir, Qassim ;
Mowakeh, Mohamad Fouzi .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12)
[5]   A V2V charging allocation protocol for electric vehicles in VANET [J].
Abualola, Huda ;
Otrok, Hadi ;
Mizouni, Rabeb ;
Singh, Shakti .
VEHICULAR COMMUNICATIONS, 2022, 33
[6]   A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET [J].
Abumansoor, Osama ;
Boukerche, Azzedine .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) :275-285
[7]   A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles [J].
Aftab, Muhammad Umar ;
Munir, Yasir ;
Oluwasanmi, Ariyo ;
Qin, Zhiguang ;
Aziz, Muhammad Haris ;
Zakria ;
Son, Ngo Tung ;
Iran, Van Dinh .
IEEE ACCESS, 2020, 8 :24196-24208
[8]   Towards A Distributed Ledger Based Verifiable Trusted Protocol For VANET [J].
Aftab, Muhammad Usman ;
Hussain, Mehdi ;
Lindgren, Anders ;
Ghafoor, Abdul .
2021 INTERNATIONAL CONFERENCE ON DIGITAL FUTURES AND TRANSFORMATIVE TECHNOLOGIES (ICODT2), 2021,
[9]   Security of Vehicular Ad-Hoc Networks (VANET): A survey [J].
Afzal, Zehra ;
Kumar, Manoj .
THIRD NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2019), 2020, 1427
[10]  
Agarwal P., 2017, J. Multimed. Technol. Recent Adv., V4, P21