Review Article

A Comprehensive Survey on VANET Security Services in Traffic Management System

Table 1

Security attacks and their countermeasures in VANETs [1, 4, 22, 66].

AttackCompromised servicesCountermeasures

DOSAvailability, authenticationUse the bit commitment and signature-based authentication technique
JammingAvailabilityUse frequency hopping technique, direct-sequence spread spectrum (DSSS)
MalwareAvailabilityReliable hardware and digital signature of software
Broadcast tamperingAvailability, integrityCryptographic primitives are enabled for prevention, but a nonrepudiation mechanism may exist
Blackhole, grayholeAvailabilityReliable hardware and digital signature of software
Greedy behaviorAvailabilityUse intrusion detection systems (IDSs)
SpammingAvailability, confidentialityReliable hardware and digital signature of software
EavesdroppingConfidentiality, integrityExploit physical layer security protocols
Traffic analysisConfidentialityUse encryption techniques
Man-in-the-middleAuthentication, confidentiality, integrityRobust authentication technique such as digital certificates
SocialConfidentialityUse digital signatures
SybilAvailability, authenticationDeployment of central validation authority (VA), location and position verification, and efficient allocation of transmission resources.
TunnelingIntegrityReliable hardware and digital signature of software and sensors
GPS spoofingAuthenticationSignature-based authentication technique with positioning system and the usage of bit commitment
Free-ridingAuthenticationUse strong authentication technique
Key and/or certificate replicationConfidentiality, authenticationUse certified keys, and check the validity of certificates in real time through CRL
Message tamperingAvailability, authenticationZero-knowledge schemes for authenticate message
MasqueradingAuthentication, nonrepudiation, integrityDigital signature of software, and trusted and reliable hardware which makes impossible to change protocols
ReplayAuthentication, integrity, nonrepudiationMessage authentication, using digital signature scheme
IllusionAuthentication, integritySoftware must be handled by authorized entity, sensors operation must be authenticated, and use the plausibility validation network (PVN)
RepudiationNonrepudiationIdentity-based signature and ID-based online/offline (IBOOS) techniques with complex managing certificates may exist