Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey

被引:6
作者
Khezri, Edris [1 ]
Hassanzadeh, Hiwa [2 ]
Yahya, Rebaz Othman [3 ]
Mir, Mahdi [4 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Boukan Branch, Boukan 59511, Iran
[2] Univ Raparin, Dept Comp Sci, Rania 46012, Iraq
[3] Cihan Univ Erbil, Coll Sci, Dept Comp Sci, Erbil 44001, Iraq
[4] Ferdowsi Univ Mashhad, Dept Elect Engn, Mashhad 9177948974, Iran
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2025年 / 30卷 / 04期
关键词
attack; attacker; routing; security; VANETs; PRESERVING AUTHENTICATION SCHEME; PRIVACY PRESERVATION; PERFORMANCE ANALYSIS; RESOURCE-ALLOCATION; VEHICULAR NETWORKS; CONNECTED VEHICLES; MANAGEMENT; LOCATION; ARCHITECTURE; PROTOCOL;
D O I
10.26599/TST.2024.9010083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to their diverse applications, including safety, welfare, and improving traffic efficiency, inter-vehicle ad-hoc networks have been extensively studied. Globally, road congestion, accidents, fuel consumption, and environmental pollution caused by the large number of vehicles have become serious problems that have caused a lot of human and financial losses. Intelligent transportation systems (ITS) have introduced VANETs in order to overcome these problems. In vehicular ad hoc networks (VANETs), vehicles equipped with wireless interfaces can communicate with other vehicles and with fixed roadside equipment via mobile ad hoc networks (MANETs). Messages are transmitted over open wireless channels in VANETs. Malicious nodes target these networks to protect them from various attacks, such as interference, eavesdropping, spoofing, denial of service, Sybil, black holes, worm holes, gray holes, etc. Security of VANETs is therefore one of the most significant issues. Security issues, attacks, attackers, and secure routing protocols in VANETs are discussed in this article, as well as available solutions to solve security issues.
引用
收藏
页码:1700 / 1723
页数:24
相关论文
共 242 条
[51]   Location Prediction Model Based on the Internet of Vehicles for Assistance to Medical Vehicles [J].
Cheng, Jiujun ;
Yan, Huaichen ;
Zhou, Aiguo ;
Liu, Chunmei ;
Cheng, Ding ;
Gao, Shangce ;
Zang, Di ;
Cheng, Deli .
IEEE ACCESS, 2020, 8 :10754-10767
[52]  
Chinnasamy A., 2007, Int. J. Comput. Appl., V65, P22
[53]  
Choi DK, 2019, 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), P88, DOI [10.1109/icoin.2019.8718192, 10.1109/ICOIN.2019.8718192]
[54]  
Choudhari DP, 2019, INT CONF COMPUT
[55]   An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs [J].
Cui, Jie ;
Wu, Di ;
Zhang, Jing ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2972-2986
[56]  
Deeksha A.Kumar., 2017, IEEE INT CONF SIG PR, P580, DOI 10.1109/ISPCC.2017.8269745
[57]   A Survey on Vehicular Cloud Network Security [J].
Deng, Junyi ;
Deng, Jikai ;
Liu, Peihao ;
Wang, Huan ;
Yan, Junjie ;
Pan, Deru ;
Liu, Jiahua .
IEEE ACCESS, 2023, 11 :136741-136757
[58]  
Devi Y. S., 2022, Computer Communication, Networking and IoT, P245
[59]   Vehicular Security Through Reputation and Plausibility Checks [J].
Dhurandher, Sanjay K. ;
Obaidat, Mohammad S. ;
Jaiswal, Amrit ;
Tiwari, Akanksha ;
Tyagi, Ankur .
IEEE SYSTEMS JOURNAL, 2014, 8 (02) :384-394
[60]  
Dhyani I., 2017, Advances in Computer and Computational Sciences, P333