Research Article

VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead

Table 2

Summery of related work on VANET security.

SchemeTechniqueArea of applicationsParameters addressedDeficiencies

Secure message delivery and authentication [15]Aggregate message authentication code (MAC)VANET securityReduced communication overhead, improved authenticityPacket loss
End-to-end delay
Believe what you see, verify what you hear [16]Detection and correction of errorVANET securityFalse position information detection, quick and fast data disseminationSafety warnings, electronic toll collection, blind curve problem, etc.
Greedy detection for VANETs (GDVANs) [17]Linear regression, mathematical concept, and fuzzy logicVANET securityPrevention of DOS attack, no modification in IEEE 802.11p, greedy behavior detectionDuration between two successive transmission, transmission time, connection attempts made by node
Attack-resistant trust (ART) management [18]Two separate metrics: data trust and node trustVANET securityEnsure trustworthiness of data and node, cost effective in terms of comm. overheadMisbehavior detection and trust management
GPS-based wireless hardware system [19]Conversion of conventional vehicles into connected vehiclesVANET securityLimited speed threshold, effective in terms of safety, avoids accidentCloud computing, advanced features needed to make the system smart and more realistic
AODV [20]Routing protocolVANET securitySybil attack in VANETsAODV with features of anti-Sybil attack
Various security threats and possible defensive mechanisms [21]Threat investigationVANET securityFalse info. dissemination, black hole attack, impersonation, man in the middle attacks, etc.Security check when changing RSU by vehicles, secure private data like e-mail, IP address changed to pseudonym, etc.
Game theory model [22]Reaction game mechanismVANET securityDOS attack reaction problemCostly and complex
Detection of intelligent malicious behavior [23]Adaptive detection thresholdVANET securityHigh detection ratio, high packet delivery ratio, etc.Investigates other adversaries, mobile certification authority
Trust [24]Trust value assignmentVANET securityRouted the messages via trusted vehiclesMisbehavior detection and trust management
Logistic trust (LT) [25]Authenticated node, correct event detectionVANET security90% accurate with 2% error possibility in informationNo specified attacks, that is, ballot stuffing and bad mouth attack.