|
Scheme | Technique | Area of applications | Parameters addressed | Deficiencies |
|
Secure message delivery and authentication [15] | Aggregate message authentication code (MAC) | VANET security | Reduced communication overhead, improved authenticity | Packet loss End-to-end delay |
Believe what you see, verify what you hear [16] | Detection and correction of error | VANET security | False position information detection, quick and fast data dissemination | Safety warnings, electronic toll collection, blind curve problem, etc. |
Greedy detection for VANETs (GDVANs) [17] | Linear regression, mathematical concept, and fuzzy logic | VANET security | Prevention of DOS attack, no modification in IEEE 802.11p, greedy behavior detection | Duration between two successive transmission, transmission time, connection attempts made by node |
Attack-resistant trust (ART) management [18] | Two separate metrics: data trust and node trust | VANET security | Ensure trustworthiness of data and node, cost effective in terms of comm. overhead | Misbehavior detection and trust management |
GPS-based wireless hardware system [19] | Conversion of conventional vehicles into connected vehicles | VANET security | Limited speed threshold, effective in terms of safety, avoids accident | Cloud computing, advanced features needed to make the system smart and more realistic |
AODV [20] | Routing protocol | VANET security | Sybil attack in VANETs | AODV with features of anti-Sybil attack |
Various security threats and possible defensive mechanisms [21] | Threat investigation | VANET security | False info. dissemination, black hole attack, impersonation, man in the middle attacks, etc. | Security check when changing RSU by vehicles, secure private data like e-mail, IP address changed to pseudonym, etc. |
Game theory model [22] | Reaction game mechanism | VANET security | DOS attack reaction problem | Costly and complex |
Detection of intelligent malicious behavior [23] | Adaptive detection threshold | VANET security | High detection ratio, high packet delivery ratio, etc. | Investigates other adversaries, mobile certification authority |
Trust [24] | Trust value assignment | VANET security | Routed the messages via trusted vehicles | Misbehavior detection and trust management |
Logistic trust (LT) [25] | Authenticated node, correct event detection | VANET security | 90% accurate with 2% error possibility in information | No specified attacks, that is, ballot stuffing and bad mouth attack. |
|