Sei sulla pagina 1di 16

Computer Networks 151 (2019) 52–67

Contents lists available at ScienceDirect

Computer Networks
journal homepage: www.elsevier.com/locate/comnet

Cyber security challenges and solutions for V2X communications: A


survey
Aljawharah Alnasser a,b, Hongjian Sun b,∗, Jing Jiang c
a
Department of Information Technology, King Saud University, Riyadh, Saudi Arabia
b
Durham University, Durham, UK
c
Department of Mathematics, Physics and Electrical Engineering, Northumbria University, UK

a r t i c l e i n f o a b s t r a c t

Article history: In recent years, vehicles became able to establish connections with other vehicles and infrastructure units
Received 27 July 2018 that are located in the roadside. In the near future, the vehicular network will be expanded to include
Revised 22 November 2018
the communication between vehicles and any smart devices in the roadside which is called Vehicle-to-
Accepted 29 December 2018
Everything (V2X) communication. The vehicular network causes many challenges due to heterogeneous
Available online 8 January 2019
nodes, various speeds and intermittent connection, where traditional security methods are not always
Keywords: efficacious. As a result, an extensive variety of research works has been done on optimizing security
V2X communications solutions whilst considering network requirements. In this paper, we present a comprehensive survey
LTE and taxonomy of the existing security solutions for V2X communication technology. Then, we provide
Cyber security discussions and comparisons with regard to some pertinent criteria. Also, we present a threat analysis
Vehicular network for V2X enabling technologies. Finally, we point out the research challenges and some future directions.
© 2019 Elsevier B.V. All rights reserved.

1. Introduction network and communicate with any smart device as a part of IoT.
(Table 1)
As a result of massive spread of Internet, a new notion has With the integration of IoT technologies, vehicular networks be-
emerged which converts rigid objects to smart objects and con- came vulnerable to various types of cyber-attacks: internal or ex-
nects them together, known as Internet of Things (IoT). This is ternal attacks. Internal attacks are initiated by the fully authorized
achieved by embedding extra hardware such as sensors and com- node which can bypass the authentication model, while external
munication interface within each device and combining them with attacks are launched by an unauthorized node. In the latter case,
a software system. Thus, the devices can sense the surrounding en- secure authorization model can minimize the effect of these at-
vironment and share information using wireless communications. tacks.
IoT has been broadly applied in various domains such as health- Many security solutions were studied to protect the vehicular
care, smart cities and industry. Indeed, the people spend the most networks against various types of cyber attacks. In this survey, we
times in homes, offices and transportation. According to the U.S. aim to provide a deep research in this area and study the secu-
Department of Transportation and Safety Administration, the peo- rity solutions for all types of vehicular communications. We believe
ple spend 500 million hours per week in the vehicle. As a re- that this survey will guide future research for addressing chal-
sult, based on Alcatel–Lucent’s research which was accomplished lenges of the future vehicular network.
in 2009, they found that over 50% of participants liked the idea of
connected vehicles and 22% are willing to pay fees for communi- 1.1. Relations to existing surveys
cation services [10]. Consequently, the need has been increased for
joining transportation system under the umbrella of IoT. Initially, Although there are a large number of publications regarding the
transportation system was transformed into cyber physical system security aspects in vehicular networks, there is so far no compre-
by embedding software into vehicles. Hence, vehicles can form a hensive survey on that for Vehicle-to-Everything (V2X) communi-
cations. Vehicular ad-hoc network is one type of vehicular net-
works. There exist surveys focusing on general structure of ve-

Corresponding author. hicular ad-hoc network: Al-Sultan et al. [9] provided a survey on
E-mail addresses: alalnasser@ksu.edu.sa (A. Alnasser), vehicular ad-hoc network structure, enabling technologies, appli-
hongjian.sun@durham.ac.uk (H. Sun), jing.jiang@northumbria.ac.uk (J. Jiang). cations, and research challenges. Karagiannis et al. [47] proposed

https://doi.org/10.1016/j.comnet.2018.12.018
1389-1286/© 2019 Elsevier B.V. All rights reserved.
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 53

Table 1 the security requirements and threats analysis for V2X enabling
Abbreviations used throughout the paper.
technologies. A taxonomy of security methods for V2X technol-
3GPP 3rd generation partnership project ogy is presented in Section 4. In Section 5, we classify and ex-
D2D Direct-to-Direct amine the presented methods. Some challenges and research di-
eNodeB Evolved Node B rection are given in Section 6. Finally, Section 7 concludes this
IoT Internet of Things survey.
LTE Long-Term Evolution
RSU Road Side Unit
UE User Equipment 2. Vehicle-to-Everything (V2X) communication technology
V2I Vehicle-to-Infrastructure
V2P Vehicle-to-Pedestrian V2X technology refers to intelligent transportation system
V2V Vehicle-to-Vehicle
where all road entities including vehicles, pedestrians, cycles, mo-
V2X Vehicle-to-Everything
QoS Quality of Service torcycles and infrastructure units are interconnected with each
other. This connectivity will produce more accurate information
about the traffic situation across the entire network. Thus, it will
help in improving traffic flows and reduce accidents. In 2015,
the basic characteristics and requirements of vehicular ad-hoc net-
Siemens implemented the first fully dynamic system on Germany’s
work, and the standardization efforts in intelligent transportation
A9 highway. The result showed 35% fewer accidents and reduction
systems.
of people injured at roads with 31% [75].
There are some surveys on general security challenges in ve-
hicular ad-hoc networks only. For instance, Al-Kahtani [7] pub-
lished a survey on the potential cyber attacks on vehicular ad- 2.1. Architecture
hoc networks and the proposed security methods to guard against
them. Engoulou et al. [26] provided security requirements and Intelligent transportation system applies data processing, com-
threats in vehicular ad-hoc networks. Also, they discussed the at- munication, and sensor technologies to vehicles, infrastructure
tacks characteristics and security solutions. In addition, Fonseca units and roadside users to increase safety and efficiency of the
and Festag [29] reviewed the existing security solutions and de- transportation system. The heterogeneous network consists of two
scribed them on a comparable level. Mishra et al. [63] presented main sub-networks [35] as shown in Fig. 1:
a general review of some security research in vehicular ad-hoc
• Intra-vehicle network comprises of a collection of sensors which
network.
are located in the vehicle. The interactions among sensors are
On the other hand, there exist some surveys on a specific secu-
bridged via Ethernet, ZigBee or WiFi connections.
rity mechanism that can be used in vehicular networks. Mejri et al.
• Inter-vehicle network covers the communication between the
[62] classified the security solutions in vehicular ad-hoc networks
vehicle and surrounding devices. It comprises of four entities
based on cryptographic schemes and compared them to evaluate
as follows:
their performance. While, Zhang [90] analysed existing trust-based
• On-board unit is the main entity in intelligent transporta-
solutions in multi-agent systems, mobile ad-hoc networks and ve-
tion system. Each vehicle is equipped with on-board unit to
hicular ad-hoc networks. Kerrache et al. [48] reviewed the main
be able to process the collected data and interact with sur-
existing trust-based models and studied when trust-based solution
rounding entities.
is more suitable than cryptography, and the opposite. In this sur-
• Roadside users such as pedestrian, motorcyclists, bikers and
vey, we conduct an in-depth analysis on two dimensions. The first
roller skates.
dimension includes the ability of security services in IEEE802.11p
• Road Side Unit (RSU) is the transportation infrastructure
and Long-Term Evolution for V2X (LTE-V2X) to defend against var-
unit which exist in the roadside. it has information about
ious cyber-attacks. The second dimension covers the security chal-
local topology which assists in providing several services to
lenges for various security methods which were applied on vehicu-
the road entities.
lar networks. This will give the researchers the full picture regards
• Central/Cloud server has a central control on all road enti-
the security constraints for each communication protocol and also
ties, traffic and roads.
for each security method.

2.2. Communications
1.2. Contributions and structure

V2X supports a unified connectivity platform for the connected


The main aim of this survey is to present a comprehensive and
entities. Also, it allows road entities to transmit information such
organized overview of various security solutions in vehicular net-
as their current speed, position, and direction to their fixed and
works and discuss the design challenges of security model for V2X
moving neighboring entities. Then, they use this information to
communications. This paper makes three significant contributions
make intelligent decisions. The communication type depends on
to the field of V2X security:
the entities that establish the link. It supports five types of com-
1. The proposed taxonomy classifies the security solutions of ve- munications [1]:
hicular networks to study the challenges of designing security
• Vehicle-to-Sensors (V2S) represents the communication between
model for the V2X network which is a novel approach to the
sensors in intra-vehicle sub-network;
subject.
• Vehicle-to-Vehicle (V2V) covers the communication between ve-
2. Threats analysis for V2X enabling technologies is conducted.
hicles using V2V application;
Based on our knowledge, this is the first such analysis for
• Vehicle-to-Pedestrian (V2P) provides the connection between the
threats in IEEE802.11p and LTE-V2X.
vehicle and roadside users using V2V application;
3. We evaluate the effectiveness of security solutions on the con-
• Vehicle-to-Grid (V2G) supports the communication between ve-
sidered attack, message type, latency limit and model structure.
hicles and the electric grid to charge Electric Vehicles.
The paper is organized as follow: in Section 2 we present • Vehicle-to-Infrastructure (V2I) represents the communication be-
some necessary background information. In Section 3 we mention tween road entities and infrastructure units.
54 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

Fig. 1. General Structure of intelligent transportation system.

In one vehicular network, all road entities are supposed to • Safety-related applications use wireless communications be-
generate and exchange messages. The messages can be used to tween surrounding entities to decrease accidents and protect
support variety of applications, e.g., applications related to safety, the commuters from dangers. Each road entity periodically
traffic and infotainment. The messages are categorized into four sends safety message to its neighbors to report its current sta-
types [6]: tus. Furthermore, they may also need to transmit warning mes-
sages when local or global event is detected.
• Periodic message (beacon): Road entity periodically broadcasts
• Traffic-related applications are deployed to manage the traffic ef-
a status message, which contains information such as speed, lo-
ficiently and ensure smoothly traffic flow. They are responsi-
cation and direction, to the neighboring entities. It generated at
ble for collecting the traffic information and transmitting them
regular intervals between 100ms to 1s. As a result, each entity
wirelessly to a remote server for analysis. After that, the analy-
can perceive the local topology. Also, they can predict and an-
sis results are sent to vehicles for future usage.
ticipate dangerous situations or traffic congestion. This type of
• Infotainment-related applications aim at improving the driving
messages is not time critical (300ms).
experience by supporting various services such as Internet ac-
• Local event triggered message: Road entity sends the message
cess, online gaming, video streaming, weather information.
when a local event is detected such as the critical warning or
intersection assist. It is sent locally to the neighboring entities
using V2V/V2P links where it contains useful information for
neighborhood area only. In addition, it is a time critical which 3. Security for V2X enabling technologies
requires to be delivered with a low latency around 100ms.
• Global event triggered message: Road entity sends the mes- Supporting safety-related applications is the core of vehicle-to-
sage when a global event is detected such as road construction vehicle communication. Since ten years ago, V2X technology has
and road congestion. This message needs to be propagated over been enabled by IEEE802.11p, which has been standardized, imple-
a wider area. As a result, road entities use V2I communication mented and examined.
link to transmit the message. One of the most critical challenges to make V2X technology fea-
• Emergency vehicle message: It is used to support a smooth sible is how to ensure interoperability among heterogeneous de-
movement for emergency vehicles. It is sent by emergency ve- vices. As a result, the 3rd Generation Partnership Project (3GPP)
hicles to the surrounding vehicles using V2V/V2P links to clear has worked on standardization for LTE protocol to fit the require-
the road. ments and services of the V2X communications. 3GPP has concen-
trated on supporting different types of communications using one
2.3. Applications standard. The first release (Release 8) was in 2008. The standard-
ization of LTE Advanced Pro-(Release 14) finalized at the beginning
As a result of the technological improvements in the areas of of 2017 [1].
sensing and wireless networking, intelligent transportation system The safety of commuters relies on the performance of these
permits for the existing of various applications that are related to technologies. Consequently, it is important to analyse the security
safety, traffic, and infotainment [35]. services offered by these technologies.
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 55

Fig. 2. General Structure of LTE-based V2X network.

3.1. IEEE 802.11p

3.1.1. Overview
It is an enhanced version of the ad-hoc mode in IEEE802.11a.
It was implemented for supporting the communication between
mobile nodes with the presence of obstacles, dynamic topology
and intermittent connection. The main purpose of IEEE802.11p is
to support non-line of sight [28]. It was proposed for supporting
intelligent transportation system applications in vehicular adhoc
networks. It provides ad-hoc communication between vehicles and
RSUs. It gives vehicles the ability to share information with their Fig. 3. Communication links in LTE-V2X.
neighboring vehicles using V2V and V2I only.
IEEE 802.11p can be easily deployed with minimum cost, how-
ever, it lacks of scalability, unlimited delays, and Quality of Service
(QoS). Furthermore, it can only offer intermittent V2I connectivity • User Equipment (UE) is the device that is used directly by an
because of the short radio range [19]. end-user to communicate with eNodeB or other UEs.
• Evolved Node B (eNB) is the wireless interface for LTE net-
3.1.2. Security measures work which allows for sending and receiving radio transmis-
IEEE P1609.2 is based on cryptography standards such as ellip- sions to/from all UEs in one or more cells.
tic curve cryptography, wireless access in vehicular environment • V2X Application Server is responsible for distribution of V2X
certificate formats, and hybrid encryption methods [43]. Broadcast messages to different target areas.
Messages usually are not directed to particular destination and they • V2X Control Function is responsible for authorization and revo-
related to safety-related applications. Also, they contain the times- cation of V2X services. It provides various services after suc-
tamp which is obtained from the internal clock for synchroniza- cessful mutual authentication and security key generation.
tion. However, these messages are only signed with the sender’s • Multimedia Broadcast Multicast Service supports efficient deliv-
certificate. Elliptic Curve Digital Signature Algorithm is the signa- ery for multicast services over areas typically spanning multiple
ture algorithm in the standard [53]. Transaction Messages are gen- cells.
erally unicast messages and they may be used to access location- • Single-cell Point-to-Multipoint provides the delivery of multicast
based services and personal data. Consequently, to protect the data, services over a single cell.
these messages are encrypted with a symmetric encryption al-
gorithm. To ensure more protection, the algorithm uses random In LTE-V2X, the messages are sent using two types of links, as
key which is encrypted using elliptic curve integrated encryption shown in Fig. 3:
scheme [53]. • Cellular-based communication covers the two way communica-
tion between UE and eNB over LTE air interface [11]. The com-
3.2. LTE-V2X munication going from UE to eNB is called uplink and when
it is going from eNB to a UE it is called downlink. Cellular-
3.2.1. Overview based communication covers wide area with high capacity. It
It has the potential to deal with the low-latency and high- is used by V2X application server to broadcast messages to
reliability V2X use cases. LTE-V2X is mainly composed of six main vehicles and beyond, or send them to the server via a uni-
components [1] as shown in Fig. 2: cast connection. In addition to one-to-one communications be-
56 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

Fig. 4. RSU implementation in V2X.

tween eNB and UE, eNB supports one-to-many communica- 3.2.2. Security measures
tions via downlink. eNB uses single-cell point-to-multipoint There are two types of LTE security mechanisms based on the
service for the transmissions over a single cell and multimedia type of communications as follows.
broadcast multicast service for communications over multiple
• Cellular-based communications: There is a mutual authentication
cells.
between UE and the core network. This is achieved by using the
• Device-to-Device communication (D2D) enables the direct con-
evolved packet core authentication and key agreement proce-
nection between UEs without traversing eNB and it is called
dure and generating ciphering key and an integrity key. More-
side-link. It supports multi-hop communications between net-
over, UEs apply different keys for different communication ses-
work entities to enhance the end-to end connectivity. Also,
sions where session keys are produced using ciphering key and
it provides a short-range communication and low latency for
integrity key [69]. When an UE connects to the LTE network
safety messages. It allows for UE to transmit data directly to
over LTE radio interface, the mobility management entity is re-
other UEs over the side-link even if they reside out-of-network
sponsible for executing a mutual authentication with the UE.
coverage. Every D2D pair can communicate via Inband or Out-
First, the UEs send authentication requests to the mobility man-
band modes [11]. Inband mode uses the cellular spectrum for
agement entity. Second, the mobility management entity checks
both D2D and cellular communications. Underlay communica-
the request validity and forwards it to home subscriber server,
tion allows for both of them sharing and reusing the same radio
which is combined with the authentication centre, to manage
resources to improve the spectrum efficiency. The main draw-
and check user authenticity. Third, the authentication centre
back is the high possibility of collision between D2D links and
generates and sends the authentication vector for specific UE to
cellular links. In contrast, overlay communication allocates dedi-
the mobility management entity [92]. However, the token that
cated cellular resources for D2D connections between the trans-
is sent by UE is not encrypted and not integrity protected. After
mitter and the receiver. To minimize the interference between
mutual authenticated, the key is exchanged between the mo-
D2D and cellular links, outband mode uses unlicensed spec-
bility management entity and UEs, then the UEs will be able to
trum such as 2.4 GHz industrial, scientific and medical radio
access the core network. UE uses a pre-shared symmetric key-
band. However, it is necessary to have an extra interface that
ing and integrity algorithm for signalling packets that is sent to
implements Wi-Fi Direct or Bluetooth.
the network. However, for user plane data, only ciphering algo-
rithm is applied between UE and eNB [2].
In LTE-V2X, RSU can be implemented in two ways [1]. First, • D2D communications: Before starting D2D communication, UEs
it can be executed as stationary UE; then it receives V2X mes- have to finish authentication procedure with the core network
sages via the sidelink as shown in Fig. 4(a). In this case, the V2X [41].
application can communicate with other V2X application. Second, Because the core network is responsible for managing the se-
it can be implemented in eNB, where it receives V2X messages curity parameters, the availability of accessing the network will
via LTE radio interface as shown in Fig. 4(b). In this case, V2X directly affect the security level of D2D communications. The
application in UE communicates with the V2X application server connectivity of UEs is based on three scenarios [85]. In-network
in eNB. coverage when both UEs are located in the network coverage,
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 57

they can communicate securely by the assist of the core net- • Flooding attack: The attacker sends a huge volume of packets to
work; partial coverage when only one UE is in the network make victim node unavailable. The IEEE 802.11p MAC is vulner-
coverage, the communication is also managed by the core net- able to flooding attack. To initiate the attack, the attacker may
work, thus, they can establish a secure communication. Also, it exploit the binary exponential backoff scheme. Among the com-
includes when both are located at the edge of eNB coverage. peting nodes, the winning node captures the channel by send-
They can forward their information to other covered UEs us- ing data constantly. Thus, it causes delay in transmitting data
ing D2D link to communicate with the eNB. In this case, the by forcing loaded neighbors to backoff for a long time [64].
core network fully manages D2D communications as same as Another weakness in IEEE 802.11p MAC is network allocation
the “In-network coverage” scenario; and out-network coverage vector field [64]. When there is a communication between two
when the UEs cannot communicate with the core network. In nodes, the nearby nodes update their network allocation vector
this case, each UE saves the authentication vector which is re- based on the communication duration. During that period, all
leased by the authentication centre for securing D2D commu- neighboring nodes stop transmission and only overhear for the
nications [41]. The authentication parameters are valid for spe- channel. On the other hand, the attacker may transmit bogus
cific time and they might be revoked at any time, however, the message to cause errors in the transmitted packets. As a result
security risk is increased. of MAC authentication, the previous attacks could only be initi-
To overcome this challenge, each group has a group ID, which ated by internal attackers.
is corresponding to the ProSe group ID (layer 2), Algorithm ID In LTE-V2X, there may be two potential techniques to initiate
and proSe group key. Also, each UE within the group has a par- flooding attack against a specific UE [70]. First, the malicious
ticular member ID [69]. Each proSe group key is provided with node can use the resource scheduling information to transmit
an expiry time. When UE is located out-of-network coverage, an uplink control signal when another node uses the channel
the UE may work for a longer time without extra provision- to transmit its information. Thus, it causes a conflict at the eNB.
ing when proSe group keys valid at that time. The data in D2D Second, the UE is permitted to stay in active mode, but turn
communication is encrypted by proSe encryption key which is off its radio transceiver to save its power resource. During that
derived from proSe group key [69]. In this case, the confiden- mode, the UE is still allowed to transmit packets in urgent sit-
tiality requirement is achieved in data transmission. However, uations. However, the attackers can inject packets during that
there is no integrity protection on the user data because the period to cause flooding attack.
integrity key is shared by all group members. Moreover, each UE transmits periodically buffer status reports
to eNB which are used for packet scheduling and load balanc-
ing [70]. Flooding attack could happen when the attacker im-
3.3. Threats analysis for IEEE 802.11p and LTE-V2X
personates other UE and sends fake reports that indicate larger
data volume than in the real UE. As a result, eNB may stop ac-
Similar to most communication networks, V2X security require-
cepting new requests for joining the cell because it thinks that
ments can be divided into five points: availability, data integrity,
the cell is fully loaded [70].
confidentiality, authenticity and non-repudiation [48]. However, in
• Jamming attack: the attacker broadcasts signals to corrupt the
the V2X environment, attacks which targeting information avail-
data or jam the channel. Both IEEE802.11p and LTE-V2X phys-
ability are the most dangerous because they cause a serious effect
ical layer is based on the orthogonal frequency-division multi-
on safety-critical situations. The following presents the security re-
plexing technology. In fact, a jammer requires to recognize the
quirements for V2X network and threats against each one. Also, we
presence of packets to launch jamming attack. However, none
present security analysis for IEEE802.11p and LTE-V2X.
of current solutions can prevent jamming signals. Using direc-
tional antennas could minimize the effect of this attack and al-
3.3.1. Threats on availability low for vehicles to avoid the jamming area [53].
They prevent the authorized users from access the information • Coalition and platooning attacks: a group of compromised nodes
such as: collaborate to initiate malicious activities such as blocking in-
formation or isolate legitimate vehicles. For instance, when sev-
• Blackhole and Greyhole attacks: the compromised node stops re- eral internal attackers collaborate and initiate blackhole attack,
laying packets to the neighboring nodes. Thus, it blocks up the it could affect the information delivery even with broadcast na-
spreading of information over the network. The attacker drops ture that it is supported by the IEEE802.11p. Also, these attacks
all packets that received in blackhole attack, while drops some are not only limited to blackhole but include any malicious be-
packets in the greyhole attack. In IEEE 802.11p, each node must havior. In LTE-V2X, several compromised node could prevent
be authenticated to be a part of packets’ route. In this case, the the traffic from the node at the edge of eNB coverage.
authentication process can deny the external attacker from ini-
tiate blackhole/greyhole attacks. However, the standard fails to 3.3.2. Threats on integrity
protect the network from internal attackers. The broadcast of Ensuring the data integrity includes the assurance of the accu-
warning packets could reduce the effect of attack because of racy and consistency of data that spreading over the network. The
the diffuse multiple copies over the network. following attacks address data integrity [7]:
On the other hand, LTE-V2X is capable of eliminating external
attackers by applying mutual authentication between UEs and • Alter or inject false messages attack: the compromised node
the core network. In D2D communications when two UEs are spreads bogus messages in the network, by generating a new
located out of the network coverage, there is a possibility that message or modifying the received one. In both cases, it mis-
UEs communicate with another UEs with revoked credentials leads the vehicles by giving them a wrong information and
because they are not provisioned by the core network. In ad- putting them in a danger situation.
dition, the internal attacker is possible in case of partial D2D In IEEE802.11p, it is possible that internal attacker may try to
coverage when UE that is located at the edge of eNB coverage broadcast false safety messages through the network. Broadcast
uses other UEs to relay the packets to eNB. In this case, the messages are intended for all surrounding nodes, but they need
relaying node could be a compromised node which drops the to be signed in order to hinder external attackers from gener-
received packets and blocks the communication with eNB. ating bogus messages. Because internal attacker is an authenti-
58 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

cated node, it could use its digital certificate to sign any num- • Location tracking: sharing the location with neighboring nodes
ber of false messages [53]. However, the standard requires an is very important for various vehicular applications. As a re-
additional scheme to be able to detect the attackers and then sult, attackers can collect and use these information for track-
includes them in certificate revocation lists. In addition, these ing users. In IEEE802.11p, every time an on-board unit broad-
messages are protected from alternation because they are digi- casts message to warn neighboring vehicles regarding a safety
tally signed by the sender’s certificate. update, it digitally signs the message with its own certifi-
In LTE-V2X, external attacker cannot inject/alter any packet be- cate. Therefore, the receiving nodes can identify the sending
cause the user data in LTE-Advanced is encrypted with cipher- on-board unit and its current position. Unfortunately, wire-
ing key which is generated after a mutual authentication. On less access in vehicular environment cannot support anony-
the other hand, the internal attackers can inject false informa- mous broadcast messages [53]. In LTE-V2X, the core network
tion in the network. Also, they can alter the received messages assigns different temporary identifiers, which are continuously
because in all communication scenarios the integrity algorithm changed, to UEs. The temporary identifier is sent to UEs in a
is only applied on signalling packets. plain text. Thus, the passive attacker is able to identify the lo-
• Replay attack: the compromised node captures the packets and cation of the user at that time [70]. However, location tracking
replays them in a different time to look like that they were could be achieved only if the attacker can perform the mapping
sent by the original sender. The vehicles which are operating in between various identifiers and the UE. As a consequence, both
IEEE802.11p can defend against replay attacks where each node internal and external attackers can initiate that attack.
has a cache of recently received messages. Any new message is
compared with the ones in the cache, and messages older than 3.3.4. Threats on authenticity
a predefined time are rejected [64]. To prevent replay attack, Ensuring the authenticity includes the process of giving nodes
LTE-V2X uses a timestamp and a nonce in each message. Also, access to the network based on their identity using certificates and
the message has a short lifetime in the network, which leads to digital signatures. It works like a wall that protects the network
reject any repeated messages [70]. from external attacks. Some threats violate this requirement ([29])
• GPS spoofing attack: the compromised node sends messages such as:
with fake location or after a period of time. In general, GPS
• Certificate replication attack: the compromised node uses repli-
is responsible for delivering both location and time to the sur-
cated certificates to conceal itself by deleting the certificates
rounding nodes. However, GPS antennas are vulnerable to dam-
that were added to the blacklist.
age from storms and lightning. In addition, the antennas are
• Sybil attack: a single compromised node pretends many fake
susceptibility to jamming or spoofing attacks. In both protocols,
identities.
the attackers can send fake location by generating strong sig-
• Masquerading attack or impersonation attack:The attacker ex-
nal from a GPS satellite simulator. Moreover, a successful re-
ploits a legitimate identity to obtain access to the network and
play attack could happen when UE uses GPS clock for message
confidential information.
timestamp because it is easy for the attacker to spoof GPS clock
[17]. Thus, the repeated message, which is sent after a while, Using fake identity in IEEE802.11p by the internal or external
could be accepted as a new message [53]. In this case, the pro- attacker could be prevented using certificate revocation lists. Each
tocols require to propose plausibility checks to detect fake lo- on-board units and RSUs can be identified by their certificate and
cation and time. in case that the normal node turns to behave maliciously, the iden-
tity will be added to the certificate revocation lists. In LTE-V2X,
the home subscriber server is able to avoid the messages that
3.3.3. Threats on confidentiality come from unauthorized UEs by applying the mutual authentica-
The confidentiality requirement allows for information to be tion. However, the attacker could send a repeated message with
known only by the intended receiver. This is usually achieved by a new timestamp. Because the replay attack can be detected in
encrypting the message with the public key of the receiver where LTE-V2X, the home subscriber server can detect the replication and
it only can be decrypted by the private key of the intended re- drop the message. As a result, the user impersonation or sybil at-
ceiver. tack will also be prevented [31]. However, UEs are not protected
Some threats violate this requirement [62], such as: when they are located out of the network coverage because they
cannot ensure that they have the updated certificate revocation
• Eavesdropping attack: it aims to capture packet’s information list.
and acquire sensitive and confidential information. Broadcast
messages generally contain traffic safety information which 3.3.5. Threats on non-repudiation
are considered non-confidential information [64]. On the other Non-repudiation is responsible for identifying the real node’s ID
hand, location based services and other types of transaction ap- which performs a specific behavior. It is a method to ensure mes-
plication information are encrypted in IEEE802.11p. As long as sage transmission between entities via digital signature and/or en-
the internal attacker can collect information without a permis- cryption [48]. In IEEE802.11p, the periodic message and warning
sion from other users, it considers a challenge. messages are signed with the sender certificate. Also, the location
In LTE-V2X, the UEs use the pre-shared secret keys which are based services and any sensitive information are encrypted. Thus,
issued by the authentication centre to establish a secure com- the node identity can be identified when it launches a malicious
munication with the core network. Thus, the external attacker behavior.
cannot collect information because the communication is en- In addition, the message exchange between UEs and eNB is en-
crypted. While in D2D communication, the UE use a pre-shared crypted with cipher key. In addition to the encryption, LTE-V2X ap-
secret key for each application. However, this may cause addi- plied integrity protection on the signalling packets. On the other
tional computation costs on UEs [41]. In both communications, hand, it is severe to achieve non-repudiation requirements in co-
internal attacker can gather network information. To reduce the operative D2D communications because of trust concept. Indeed,
latency and computation cost, the message is not encrypted. As if one node trusts another node, it communicates with it even
a result, the external attacker can collect confidential informa- if it used fake identity. Thus, that violates some features of non-
tion. repudiation [39].
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 59

Table 2
Comparison between IEEE802.11p and LTE-V2X regarding to security services.

Security Requirements Threats IEEE802.11p LTE-V2X

Cellular-based D2D-based

External Internal External Internal External Internal


√ √
Availability Blackhole Greyhole attacks ✗ ✗ ✗ ✗
√ √
Flooding attack ✗ ✗ ✗ ✗
Jamming attack ✗ ✗ ✗ ✗ ✗ ✗
√ √ √
Coalition attack ✗ ✗ ✗
√ √ √ √
Integrity Alter messages attack ✗ ✗
√ √ √
Inject false messages attack ✗ ✗ ✗
√ √ √ √ √ √
Replay attack
GPS spoofing attack ✗ ✗ ✗ ✗ ✗ ✗
√ √
Confidentiality Eavesdropping attack ✗ ✗ ✗ ✗
Location tracking ✗ ✗ ✗ ✗ ✗ ✗
√ √ √ √
Authenticity Certificate replication attack ✗ ✗
√ √ √ √
Sybil attack ✗ ✗
√ √ √ √
Masquerading impersonation attack ✗ ✗
√ √
Non-repudiation Any – – – ✗

3.4. Summary to share the secret key. In addition, a Secure and Intelligent Rout-
ing protocol [13] used a double encryption for the data packets and
In this section, we provide a summary for the supported secu- applied authentication scheme to measure node’s trust. However, it
rity services in each communication protocol. Table 2 summarizes caused an increase in the processing time and raised the network
the comparison between IEEE802.11p and LTE-V2X regarding to se- overhead.
curity services. We concluded that D2D link in LTE-V2X is the most Shukla et al. [74] proposed a model that obtains the security
exposed protocol to external and internal attacks. The reason be- in the vehicular network using multiple operating channels where
hind is that D2D link is not managed by the core network when the encrypted data is sent on multiple channels. The receiver con-
both nodes are located out of the network coverage. Therefore, de- siders the mean value of the received data. For example, if the at-
signing a security model for D2D link is recommended to achieve tacker hacks some channels and alters the data. Then, the partial
high security level. In contrast, IEEE802.11p has more security ser- incorrect data is received which is improved partially by taking the
vices which achieve more secured ad-hoc link between vehicles. mean of the received data. Also, in case of jamming of particular
channels, the receiver still can receive the data using other chan-
4. Security solutions for V2X communications nels. However, this method is only considered when the security is
a major concern rather than resources because it achieves a high
Vehicular communications encounter many challenges, there- bandwidth waste.
fore, ensuring a secure communication is considered a complex Key management process manages the cryptographic keys in a
function. Because of the shortage of the security services in both crypto-system which includes the generation, exchange and stor-
enabling technologies of V2X communications, additional secu- age of the keys. For instance, Hong et al. [40] proposed a situa-
rity model is needed to protect vehicular network. This section tion aware trust that is based on vehicle situations. For building
presents various security solutions that were proposed for vehicu- the situation aware trust, it first defines the attribute (static or dy-
lar networks. We divided them based on the security method into namic) such as time, company and location. The group which be-
three categories: cryptography-based, behavior-based and identity- long to specific attribute share the same key. Then, the packet is
based. The outline of the proposed classification scheme is shown encrypted using that key where it only can be read by the group
in Fig. 5. members. For example, if there is a taxi from company A and
want to send a message to other drivers. The message has four
attributes as follows (Company, Taxi, Time, Location). As a result,
4.1. Cryptography-based solutions only vehicles with these attribute can read the message. Moreover,
Zhang [91] proposed a novel method based on one-time identity-
Cryptography is responsible for achieving a secure communi- based authenticated asymmetric group key agreement to create
cation between sender and receiver by developing protocols that cryptographic mix-zones which resist malicious eavesdroppers. The
prevent unauthorized users from accessing the network [23]. As safety messages are encrypted using a group secret key to im-
a result, these solutions concentrate on external attacks that are prove vehicle privacy. Thus, any external entity cannot track the
launched by unauthorized users. Encryption is the main technique safety messages in the cryptographic mix-zones. In addition, Lei
in cryptography-based solutions where it uses various algorithms et al. [54] proposed a novel key management scheme for key ex-
to transform the data into another form that is only readable change among security managers in heterogeneous networks. They
by intended users [14]. For example, Li et al. [55] proposed a used blockchain concept for allowing key exchange securely within
lightweight secure navigation system for vehicular ad-hoc network. the security manager network. Flexible transaction collection pe-
Each vehicle applies encryption and the digital signature for sup- riod was proposed to reduce the key exchange time in blockchain
porting a secure communication between the vehicle and RSU. The scheme.
system addressed the replay attack and man-in-the-middle attack. A key generation model in [79] used received signal strength
In addition, the proposed model in [4] applied advanced encryp- to guarantee the randomness in key generation. The node senses
tion standard to achieve the user privacy. The key distribution the received signal and transforms the received signal strength val-
problem of advanced encryption standard is addressed by taking ues to binary value by applying upper threshold (Thup ) and lower
advantage of the randomness of the channel in vehicular networks
60 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

Fig. 5. Overview of the surveyed research works - Classified according to the security methods.

threshold (Thlow ). For key generation, the node sets one if the re- identity-based signature and pseudonym scheme. Also, it provides
ceived signal strength value greater than Thup and zero if the re- the authentication in inter-vehicle communications.
ceived signal strength value less than Thlow . Any value in between
is ignored. Also, Zhu et al. [96] proposed a scheme which grants 4.2. Behavior-based/trust-based solutions
the vehicles the ability to generate a shared secret key from re-
ceived signal strength indicator values with low probability of get- They were proposed as complementary solutions to cryptogra-
ting the same key by neighboring vehicles. phy, where traditional cryptography-based solutions are not able to
Authentication schemes were proposed using various techniques detect internal attackers because they are authenticated users [7].
to detect unauthorized nodes and prevent them from launching The trust evaluation is typically conducted by monitoring nodes,
malicious attacks. For instance, Chuang and Lee [18] introduced a which monitor and collect other nodes’ behavior information. The
scheme for authenticating the vehicles by considering them trusted most common methods that are used for trust management in ve-
nodes if they are successfully authenticated. On the other hand, hicular networks as follows:
Yang et al. [87] proposed two lightweight anonymous authenti-
cation schemes for the V2X network. One scheme was applica- • The weighted-sum method is the most common methodology
ble for V2V communication, while the other was suitable for V2I for trust management, where trust evaluation is computed by
communications. Both schemes were considered the limitations in assigning different weights for each trust component. When the
V2X such as resource constraints of on-board unit and latency node behaves maliciously; the total trust value decreases until
limit. reach to zero [5]. Total trust is computed by:
Mamun et al. [60] presented a reliable and standard chosen 
U
plaintext secure group signature solution for vehicular network ap- Ttotal = wi × Tx (1)
plications. It allows any fixed entities such as RSUs to link mes- i=1
sages, and recognize if they are generated by one or group of vehi-
where wi is a weight value for Tx , Tx is a trust value for trust
cles, without breaching their privacy. Thus, it prevents malicious
level x such as direct and indirect. Indeed, direct trust measures
complaints against normal nodes. In addition, Ying and Nayak
trust level of one-hop neighbors using direct monitoring, while
[88] proposed an anonymous and lightweight authentication based
indirect trust measures trust level of two-hops neighbors us-
on smart card protocol. It consists of two main phases which are
ing the recommendations from other nodes. U is the number of
user authentication and data authentication. It protects the net-
trust levels that will be considered.
work against various attacks such as offline password guessing at-
Gazdar et al. [30] proposed a dynamic and distributed trust
tack, impersonation attack and many others. Also, the anonymity
model for vehicular adhoc network that used the monitor-
is achieved by using dynamic identities.
ing nodes for observing their neighboring nodes and send-
The work of Sun et al. [76] applied a model which achieved the
ing an alert about any malicious activity such as packet drop-
privacy requirements. It is composed of two schemes which are
ping or packet modification. On the other hand, Kerrache et al.
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 61

[49] proposed trust model that provided two trust metrics: three parameters for choosing appropriate verifiers which are
vehicle-based and RSU-based. Each node is able to monitor its load, distance and trust value. In addition, Shen et al. [73] pro-
neighbors and measure local trust value. Then, RSUs are re- posed a distributed authentication scheme where verifier vehi-
sponsible for managing a global and historical trust informa- cles were responsible for checking the validity of the message
tion about all nodes which locate in the same road segment. At while non-verifier vehicles depend on verification results. The
the same time, the model could work without the existence of choice of verifier nodes is made using three methods: N-nearest
RSU. Patel and Jhaveri [65] applied ant colony optimization al- method, most-even distributed method and hybrid method.
gorithm for choosing the shortest trusted path by isolating non- • The rewarding-based method uses credit to reward coopera-
cooperative nodes. However, the node is compelled to transmit tive nodes. For instance, the node rewards its neighboring node
the packets to the next hop even if all neighbors are malicious. while it behaves normally and cooperates with other nodes.
Unlike [65], Wei et al. [82] proposed a trust model for detecting Thus, a node with high trust value considered a reliable node.
non-cooperative nodes on V2V communications only. Moreover, The rewarding method is used as a security solution to encour-
Abdelaziz et al. [3] proposed intrusion detection system to en- age non-cooperative nodes to participate in packet forwarding
hance the message relay mechanism by evaluating the trusti- process. For example on this, Haddadou et al. [33] and Had-
ness of received messages. dadou et al. [34] proposed a rewarding scheme for detect-
Event-based models collect data and monitor different events ing blackhole and greyhole attacks. Moreover, Jesudoss et al.
going on in the environment to build the reputation. In the [45] proposed a Payment Punishment Scheme where it is ap-
vehicular networks, some models were proposed to monitor plied during election and routing processes. They used vick-
traffic events and evaluate the trustworthiness of these events. rey, clarke and groves model and designed the payments in
For example, event-based reputation model was proposed in a way that the collaborative node will gain rewards and be
[32] for checking data consistency. Indeed, the sensors pro- able to participate in election and routing processes. In addi-
vide redundant information which allowed for each node to tion, the model assigns monitoring nodes which are responsi-
process the data and remove malicious information. If incon- ble for monitoring the behavior of the relay nodes. The work in
sistencies occur, the security model is activated to detect the [50] represents trust-based routing protocol which is composed
malicious node. Furthermore, similarity mining technique was of two main phases. The first phase includes the trust measure-
suggested in [86] for recognizing similarity among vehicles ment, which is done periodically and in distributed manner.
and messages. For instance, at a similar location and similar When the node receive a data packet, it applies trust model
time, messages about the same event that are generated by on the received packet. Thus, it is able to evaluate the sender
the same vehicle usually have similar trust values. In addition, behavior and compute its trust value. Then, based on the pre-
Ding et al. [20] proposed event-based reputation model to fil- vious step, the second phase involves sending the data through
ter fake warning messages and increase the accuracy of the net- the most trusted route.
work. It measures the reputation of the event based on its roles • The fuzzy logic method incorporates a series of IF-THEN rules
(event reporter, event observer or event participant) to check to solve a control problem rather than attempt to model a sys-
if the event triggered is real or fake alarm. Furthermore, trust tem mathematically. The main steps of the fuzzy logic model
value can be related to a specific location. For example, when are as follows [93]. First, the fuzzy sets and criteria are de-
trustworthy interactions are established between vehicles in a fined; next, the input variable values are initialized; then, the
specific road segment, then, the corresponding trust value for fuzzy engine applies the fuzzy rules to determine the output
that location and time is increased. Dixit et al. [22] proposed a data and evaluate the results. For instance, Mármol and Pérez
model for selecting the trusted location using Ad Hoc On De- [61] proposed a security model that worked on detecting self-
mand Distance Vector routing protocol where RSUs were re- ish nodes that transmit false or bogus messages. The model de-
sponsible for controlling packets routing. However, as the num- fined a fuzzy set to classify each node with three different trust
ber of malicious nodes increased, the vehicles may follow the levels. Based on the source node trustworthiness level, the re-
wrong path. In addition, the proposed framework in [68] com- ceiver can decide whether it has to receive, forward or drop it.
posed of two modules: the first one implements three security Also, fuzzy logic models were proposed in [66] to detect packet
checks to measure the message’s trustworthiness. First, it ex- dropping attack. Moreover, Ding et al. [21] proposed a fuzzy
amines that the message is generated from a trusted location reputation based model to prevent the spreading of false mes-
and followed a trusted route. Second, it inspects that message sages.
route does not contain any malicious nodes. Third, it checks • Others methods Some existing models utilized different meth-
that it has a valid content. Indeed, it computes a trust value ods to detect internal attacks. For example, Fan et al. [27] pro-
for each road section and for each neighborhood. Once a mes- posed a detection system using support vector machine learn-
sage is evaluated and considered trusted, then it looks up for a ing algorithm to stop replay attack. It applied a training phase
trusted route to forward the message. to fetch attack’s characteristics. In addition, Kim et al. [52] pro-
The most recent malicious nodes behave intelligently and con- posed collaborative security attack detection mechanism in a
ceal themselves from detection by alternating between normal software-defined vehicular cloud architecture. It consists of two
and malicious behaviors. To protect the network from smart at- phases: information aggregation phase where each vehicle anal-
tacks, Li et al. [58] offered a Reputation-based Global Trust Es- yses the received information and transmits the result periodi-
tablishment to address a smart blackhole attack by considering cally to the controller for training the support vector machine,
the past behavior of nodes. and Multi-class support vector machine training phase. Then, the
The monitoring role could be concentrated on the message classification using support vector machine is started where
content. The monitor nodes measure trust value based on the each vehicle applied the classifier to detect malicious nodes.
validity of the received messages. For instance, Khan et al. However, this method is not energy-efficient because it requires
[51] proposed an algorithm for vehicular ad-hoc networks training phase to be able to detect the attack. Sedjelmaci and
which provides distributed message authentication. It gave the Senouci [71] proposed a framework as intrusion detection sys-
monitoring roles to specific nodes called verifier nodes. These tem that concentrated on behavioral attacks. It addressed var-
nodes were responsible for verifying the message and transmit- ious attacks in vehicular adhoc networks such as selective for-
ting the decision through the network. The model considered warding, blackhole, wormhole and sybil attacks. It uses special
62 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

agents which are responsible for monitoring the nodes’ behav- messages were protected by cryptography and the pseudo identity
ior and triggering an alarm when the misbehavior is detected. schemes.
It is composed of two detections systems and decision sys- One common approach to preserving the privacy of vehicles’ lo-
tem. First, local intrusion detection system which operates on cation is the use of pseudonyms. Indeed, the vehicle broadcasts its
each node to monitor its neighbors and the cluster head. Sec- information with pseudonyms that frequently changes [67]. As an
ond, global intrusion detection system which runs at the cluster example of this, Kang et al. [46] proposed a defend system for two
head level to monitor its cluster members. Finally, global deci- cases of eavesdropping. The first case, an adversary tracks a tar-
sion system runs at RSU level to calculate trust level for each get vehicle by a specific pseudonym. In this case, the security so-
node by aggregating the reputation of each node and broadcast lution used a random Virtual Machine identifiers which make the
the blacklist through the network. mapping relationship fail. Unfortunately, the first solution was vul-
In addition, Li and Song [57] proposed a model using dempster- nerable to identity mapping attack. Because of that, they proposed
shafer theory of evidence to combine multiple evidence even if Pseudonyms Changing Synchronization Scheme to improve detec-
some of them might not be accurate. It was proposed to evalu- tion accuracy. In addition, Sun et al. [77] presented the vehicular
ate two types of trust: data trust and node trust. In particular, ad-hoc network security system which based on three main tech-
data trust is used to evaluate the received data and indicate if niques. First, a pseudonym-based technique which was used to as-
it is acceptable based on a calculated trust value. On the other sign pseudonym/private key pairs to the vehicles which are travel-
hand, node trust assesses the node based on its behavior with ing in the home domain or other domains. Second, Threshold sig-
neighboring nodes and indicates whether or not it is trusted. nature which was applied to send the secret information for recov-
A distributed reputation management system was proposed in ering a malicious vehicle’s identity. Meanwhile, it prevents com-
[42] for securing vehicular edge computing. Vehicular edge promised nodes from having a full authority to revoke a normal
computing servers are used to implement local reputation man- node. Third, Threshold authentication based defense scheme which
agement tasks for vehicles. In addition, they applied multi- provides a mechanism to distinguish between malfunctioning and
weighted subjective logic for computing the reputation values. malicious behavior.
On the other hand, some existing solutions implemented ad- Geographic proximity technique is used to detect sybil attack
justments on routing protocol to increase the security level. For when malicious node uses multiple identities. Al Mutaz et al.
instance, in the model that was proposed in [15], each node [8] applied this method to identify sybil identities where the geo-
appends a list of trust opinions with the cluster data. Also, it graphic proximity of the compromised node and all its sybil iden-
applies confidence level for its opinion to determine the assur- tities last for a long time and repeated.
ance level about the computed trust value. Moreover, Jahan and
Suman [44] proposed a change in routing protocol to detect 4.4. Summary
non-cooperative nodes using a double acknowledge technique.
In another work, Zhang et al. [89] proposed an amendment to In this section, we provide a summary to get an overview of the
adhoc on-demand distance vector routing protocol to identify proposed security methods. Table 3 summarizes characteristics of
packet dropping behavior by adding new fields to the control the main security models were proposed for vehicular networks.
packets. The main drawback of this method is the risen net- The parameters of this summary are presented as follows:
work overhead as a result of the increase in packet size.
• Organization: indicates whether the model applied on flat or
Moreover, Wu et al. [83] proposed MobiFish which is a
clustered network.
lightweight anti-phishing application. They develop enhanced
• Architecture: indicates whether the model used the centralized
version of heuristics-based method by addressing the high rely-
structure, distributed or hybrid.
ing on web page source code. They implemented it on a Google
• Purpose: indicate whether the aim of the model is intrusion de-
Nexus 4 smartphone running the Android 4.2 OS.
tection system, achieve a secure route or protect message con-
tent.
4.3. Identity-based solutions
• Addressed attacks: indicates which attacks is addressed in the
model.
They address attacks that exploit users’ identity for malicious
activities such as sybil attack and breach user’s privacy. Most se- We concluded that the most research applied the security
curity solutions used the vehicles identity to identify them and model on a flat network where all nodes have the same respon-
revoke malicious node. As a result, user’s privacy has been re- sibility. In addition, many security solutions focused on address-
vealed and misused by an attacker. To resolve this issue, the se- ing one type of attacks: internal or external. Using central unit for
curity model should operate on an identity anonymous environ- security measurements was frequently used. However, centralized
ment. For example, Shaikh and Alzahrani [72] proposed the first models are not applicable in vehicular networks where the node
trust management scheme which takes into account the anony- could be located out of the network coverage.
mous identity. It protects vehicular ad-hoc networks from spread-
ing messages with fake location and time. Each node calculates its 5. Comparison and discussion
confidence value regarding the received messages about a specific
event. The confidence value is based on four parameters: location In this section, we discuss the effectiveness of security meth-
closeness, time closeness, location verification and timestamp ver- ods for protecting V2X communications. Based on our analysis, we
ification. Then, it calculates the trust value for each message that noticed that most of proposed models were applied on vehicular
reporting the same event and makes the decision regarding that ad-hoc network where the security model was implemented on
message based on the trust value. vehicles (homogeneous network). Because V2V is part of V2X com-
Moreover, Tajeddine et al. [78] proposed a privacy-preserving munications and both of them support the communications in ve-
trust framework that allowed for collecting information about ve- hicular network, they have common characteristics such as various
hicles’ behavior while preserving their privacy by applying a group speeds, non-stable connection and dynamic topology. As a result,
ID rather than real identity. Also, Chen and Wei [16] proposed a studying the security solutions in V2V is required to address their
beacon-based trust model that ensured the vehicular ad-hoc net- challenges while designing security model for V2X communication.
works safety while preserving the drivers’ privacy. All transmitted In addition, few proposed security models [15,45,51,71] considered
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 63

Table 3
Main security solutions in vehicular networks.

Topology Purpose Addressed Attacks Security Requirements

Organization Architecture (Use of RSU) IDS Secure Route Secure Content Internal attack External attack Both Av. Int. Conf. Auth. NRep.

Flat Clustered Centralized Distributed Hybrid


√ √ √ √ √ √
[71]
√ √ √ √ √
[34]
√ √ √ √ √ √ √
[68]
√ √ √ √ √ √
[49]
√ √ √ √ √ √ √
[18]
√ √ √ √ √
[56]
√ √ √ √ √ √
[24]
√ √ √ √ √ √
[91]
√ √ √ √ √
[96]
√ √ √ √ √ √ √
[77]
√ √ √ √ √
[38]
√ √ √ √ √
[54]
√ √ √ √ √ √
[42]
√ √ √ √ √ √ √
[76]

Av: Availability, Int: Integrity, Conf: Confidentiality, Auth: Authentication and NRep: Non-repudiation.

clustering vehicular network and all of them are behavior-based the vehicular networks require low latency in message delivery, a
solutions. lightweight security method is recommended. Furthermore, there
After analyzing the existing solutions, we evaluated them based are a few works recommended a fuzzy logic for the vehicular net-
on four parameters as follows: work because it needs for a training phase, and it is suitable for
the predictable environment. On the other hand, the rewarding-
• The considered attack: study the ability of various security meth-
based method is suitable for encouraging non-cooperative nodes.
ods in protecting the network against internal or external at-
Therefore, it limited to address the selfish behavior attack.
tacks.
In addition, the shortcoming of identity-based solutions is the
• The message type: study to which extent the security method is
focus on attacks that exploit user’s information to track them or
important for delivering various V2X messages.
pretend false identity. Thus, it is ordinarily used as complementary
• The latency limit: study the effect of applying various security
solution to protect user information where both protocols were not
methods on message delivery time.
supported anonymous identity. As a result, the need for designing
• The security model structure: study the impact of security
identity-based solutions is increased.
method on the model structure.
Some researchers made efforts to address the previous limita-
tion by applying hybrid system which combines multiple security
5.1. The considered attacks
methods to increase the security level of the network. For instance,
Eiza et al. [24] utilized Ant Colony Algorithm with graph model to
Some existing works [13,18,74] used traditional security scheme
detect internal attacks of routing control packets. It considers the
for protecting vehicular networks such as encryption and authen-
external attacks by applying a digital signature. Also, it addresses
tication. These methods are important in protecting the network
internal attacks using plausibility checks such as QoS, link breakage
from external attacks, and also they achieved high-security levels
and control messages broadcast. Moreover, Harsch et al. [38] sug-
in a centralized network. However, they are not reliable solutions
gested a security solution that combined a distributed plausibil-
for distributed networks. Moreover, based on the study on V2V ap-
ity checks and digital signature technique. The model used time
plications which was done in [37], they listed some limitations
stamps, transmission range and vehicles velocity to detect false po-
of various cryptography-based methods. Symmetric key systems
sition injection.
causes additional overhead and delay in key distribution phase.
While, asymmetric cryptography is suitable for distributed systems
where nodes is highly dynamic. However, it is slower than sym- 5.2. The message type
metric key systems and causes a huge latency. Furthermore, the
revocation process in group signature method needs for high com- 5.2.1. The event-based messages
putation power and also the signature is too large to transmit over The message encryption is applied to keep the message content
the air. confidential while traverse through multi-hop route. However, the
Based on the previous comparison between the main vehicular encryption is not essential for event-based message because it is
network communication protocols, we noticed that the most ex- directed towards all nodes in the area and not targeting specific
ternal attacks are considered by protocol security services. Thus, destination. Thus, the message should be delivered to all nodes in
applying additional cryptography model will increase the overhead a plain text to be able to read its content and make a decision re-
on the network. garding the traffic in a short period [37]. As a consequence, the
Behavior-based solutions can be implemented as a supplemen- encryption could affect negatively on the network performance.
tal solution to fill the gap of classical cryptography solutions, as On the other hand, unauthorized nodes may start behaving ma-
proposed in [12,84]. They commonly are necessary against in- liciously and mislead other nodes by sending false messages. As
ternal attackers which they own legitimate certificate. Also, they a result, all nodes should be authenticated to be able to gener-
are mostly applied on distributed and semi-centralized network ate message to protect the network from false alarm which is in-
[48]. The weighted-sum method has some challenges such as set- jected by the external attackers. In addition, generating false alarm
ting the weights and trust threshold, however, it is considered a is not limited to external attackers but it can be initiated by autho-
common and lightweight method for vehicular networks. Because rized nodes. Much research [30,51,61,68] were proposed behavior-
64 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

based solutions for securing packet content and detect internal Behavior-based solutions designed to give the nodes ability to
attacker. manage security model independently from the central unit. How-
The risk of tracking users by mapping event-based messages is ever, some models used central units for gathering trust values
too low because the road entity will generate a message when an from vehicles such as [22,66,71]. The main drawback in distributed
event is triggered. Thus, the attacker can know the current location structure is deficient in global knowledge about the network. For
of the road entity but he has to wait for next event to know its example, if vehicle A meet vehicle B for the first time, vehicle A don’t
next location. As a result, hiding user’s information is not critical. have information about the security record of vehicle B.
The proposed model in [49] applied a hybrid system which
5.2.2. Periodic messages manages both model structures. The distributed structure applied
As we mentioned in Section 2, the beacon message contains when the vehicles are located in the area that is not covered by a
user’s information such as location, speed and direction. This infor- central unit. However, this assumption gives us non-stable detec-
mation is targeting on the nodes which are belonging to the net- tion accuracy.
work. Thus, this message should be encrypted to prevent external
attacker from tracking users. 6. Challenges and research direction
Moreover, internal attackers may send false status information
to mislead neighboring nodes. For instance, the model in [72] pro- The security in the vehicular network is still considered open
posed to detect beacon messages with false location and time. research area. vehicular ad-hoc networks gave researchers the op-
Moreover, some recent works [16,81] suggested beacon-based trust portunity to study and evaluate their works. As a part of commu-
where the node’s trust value is measured based on the validity of nication progress, the future vehicular network will not be limited
beacon message. to vehicles and RSUs, but it will include all roadside entities. As
As a result of missing mechanism in vehicular network proto- a result, applying traditional solutions in the V2X network cannot
cols which supports user privacy, applying identity-based methods perform as it is expected.
is necessary for beacon messages. The attacker can follow the bea- Major efforts have been made; however, several open issues are
con message and track the user’s location because it is sent peri- still needing more consideration to achieve a high-security level for
odically and has much information about the user. Applying ran- V2X communications. Some of these issues are discussed in the
dom identities is one of the main solutions for user privacy, how- following section.
ever, it is vulnerable for mapping attack. The model in [46] pro-
posed Pseudonyms Changing Synchronization Scheme to improve 6.1. Security attacks
the user privacy.
In trust-based solutions, the evaluation is based on monitor-
ing neighbor’s behavior. As a result, they are susceptible to trust
5.3. The latency limit attacks, such as whitewashing attack, on-off attack and good/bad
mouthing attacks. In these attacks, the compromised node behaves
As we know that vehicular network is latency sensitive be- smartly to conceal itself from being detected by alternate between
cause the information should be delivered to other nodes in short normal and malicious behavior. Unfortunately, most existing works
time approximately 300 ms. As a consequence, applying compli- did not address them in vehicular networks except the proposed
cated model will increase the delivery time. The main communi- model in [58] considered intelligent compromised nodes which be-
cation protocols for vehicular network support encryption and au- have maliciously for intermittent periods.
thentication services. Thus, applying additional cryptography solu- The wireless communication is the prospective method to facil-
tions increase the packet delivery time. For instance, the model in itate the communication inside large public transportation systems
[13] proposed double encryption scheme which increase the com- such as trains, metro and buses. However, it is more susceptible
putation overhead. to various cyber attacks than the wired communication. Therefore,
Behavior-based solution were proposed as a lightweight solu- implementing security model for intra-vehicle subnetwork is rec-
tion, however, some research work [82] were proposed complex ommended. For instance, Liyanage et al. [59] proposed secure sys-
mathematical model to measure trust value. Also, some of these tem based on host identity protocol. It is designed to protect intra-
solutions apply machine learning algorithms such as support vec- vehicular communication from common IP based attacks.
tor machine in [27,52] where the complexity is high for training The most centralized security solutions used RSU as a fully
phase and testing phase. trusted unit for updating security records. Thus, the vehicles re-
Identity-based solutions are lightweight where it only based on quire communicating with RSU to get updated information. How-
random pseudonyms [16,46,72,77] or group ID [78]. These meth- ever, this assumption is not applicable in vehicular networks be-
ods have simple calculations which not require much time to apply cause RSUs are not always available along the roadside. Also, RSUs,
them. like any road entities, are vulnerable to various attacks [35]. As
a result, in case of RSU attacks, these solutions are not working
5.4. The model structure efficiently and have a huge impact on network performance. For
instance, Hao et al. [36] developed security protocols for the key
The most cryptography-based solutions applied centralized distribution, which are able to detect the compromised RSUs and
structure [56,77,88,91]. However, centralized model is not suitable their collusion with the malicious vehicles.
for the vehicular network because the central units such as RSUs
are not always available along the roadside. Because of that, El 6.2. Security vs. QoS management
Zouka [25] and Shen et al. [73] proposed distributed authentication
schemes. In addition, El Zouka [25] proposed distributed authen- The term Quality of Service (QoS) is used to represent the level
tication scheme where if the node would like to request a cloud of performance provided to users. In traditional networks, high lev-
service, it sends a message containing its own identity and its lo- els of QoS can be obtained by resource allocation and sufficient in-
cation to neighboring nodes; then, the neighboring nodes authen- frastructure. However, the control over the network resources, such
ticate the message using reputation list. However, it concentrated as bandwidth, equipment, power consumption and transmission
on V2V communication. delay, is difficult in the vehicular networks because the network
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 65

lacks of consistent infrastructure and stable topology. For instance, Supplementary material
Wang et al. [80] proposed method to fuse vehicle spacing infor-
mation and estimate average traffic density estimation. However, Supplementary material associated with this article can be
some security mechanisms can be added to the message frame to found, in the online version, at doi:10.1016/j.comnet.2018.12.018.
prevent attack on the spacing information. Therefore, achieving the
References
trade-off between QoS and security level in the vehicular networks
is an essential task. The security model should always consider the
[1] 3GPP, Universal Mobile Telecommunications System (UMTS); LTE; Architecture
efficient use of devices’ resources because the road entities in V2X enhancement for V2X Services (3GPP TS 23.285 version 14.2.0 Release 14),
communication have various capabilities and resources. An exam- Technical Report, ETSI, 2017.
[2] 5G-Americas, V2X Cellular Solutions, Technical Report, 2016.
ple of this is the power consumption, all current security models
[3] K.C. Abdelaziz, N. Lagraa, A. Lakas, Trust model with delayed verification for
did not consider the power consumption as a challenge because message relay in VANETs, in: Wireless Communications and Mobile Computing
they were implemented on vehicles which have a long life battery. Conference (IWCMC), 2014 International, IEEE, 2014, pp. 700–705.
However, in V2X, some road entities such as mobile phones have a [4] A.M. Abdelgader, F. Shu, Exploiting the physical layer security for providing a
simple user privacy security system for vehicular networks, in: Communica-
limited battery. As a result, designing a lightweight security model tion, Control, Computing and Electronics Engineering (ICCCCEE), 2017 Interna-
is recommended for V2X. tional Conference on, IEEE, 2017, pp. 1–6.
In addition, QoS includes the useful use of the network re- [5] A. Ahmed, K.A. Bakar, M.I. Channa, K. Haseeb, A.W. Khan, TERP: a trust and
energy aware routing protocol for wireless sensor network, IEEE Sens. J. 15
sources such as the bandwidth. Indeed, Zheng et al. [95] proposed (12) (2015) 6962–6972.
a two-stage delay-optimal scheme by integrating software defined [6] K.J. Ahmed, M.J. Lee, Secure, LTE-based V2X service, IEEE Internet Things J.
networking and radio resource allocation into an LTE system for (2017).
[7] M.S. Al-Kahtani, Survey on security attacks in vehicular ad hoc networks
vehicular networks. Also, the proposed model in [74] used multiple (VANETs), in: Signal Processing and Communication Systems (ICSPCS), 2012
channels to send the same information which achieves the avail- 6th International Conference on, IEEE, 2012, pp. 1–9.
ability but wastes the bandwidth. In addition, the proposed models [8] M. Al Mutaz, L. Malott, S. Chellappan, Leveraging platoon dispersion for
sybil detection in vehicular networks, in: Proceedings of the Eleventh An-
in [44,89] caused further overhead by increasing the packet size.
nual International Conference on Privacy, Security and Trust (PST), IEEE, 2013,
For critical applications such as safety-related applications in pp. 340–347.
vehicular networks require a minimum delay for delivering warn- [9] S. Al-Sultan, M.M. Al-Doori, A.H. Al-Bayatti, H. Zedan, A comprehensive survey
on vehicular ad hoc network, J. Network Comput. Appl. 37 (2014) 380–392.
ing messages to obtain a high safety level. However, the most en-
[10] G. Araniti, C. Campolo, M. Condoluci, A. Iera, A. Molinaro, Lte for vehicular
cryption methods need a time for encryption and decryption pro- networking: a survey, IEEE Commun. Mag. 51 (5) (2013) 148–157.
cesses. Thus, they protect the information and achieve confiden- [11] A. Asadi, Q. Wang, V. Mancuso, A survey on device-to-device communication
tiality but they have a negative impact on the QoS. in cellular networks, IEEE Commun. Surv. Tut. 16 (4) (2014) 1801–1819.
[12] R.S. Bali, N. Kumar, Secure clustering for efficient data dissemination in vehic-
Moreover, the existing solutions did not take into account the ular cyber–physical systems, Future Gener. Comput. Syst. 56 (2016) 476–492.
environment in the simulation model such as if the road is high- [13] S.K. Bhoi, P.M. Khilar, SIR: a secure and intelligent routing protocol for vehicu-
way or urban. Also, they did not simulate the real propagation lar ad-hoc network, IET Netw. 4 (3) (2014) 185–194.
[14] D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption
and mobility parameters which are affected by various factors such with keyword search, in: International Conference on the Theory and Appli-
as signal fading, multi-path propagation and obstacles. Therefore, cations of Cryptographic Techniques, Springer, 2004, pp. 506–522.
lack of applying models which simulate the real environment af- [15] C. Chen, J. Zhang, R. Cohen, P.-H. Ho, A trust modeling framework for message
propagation and evaluation in VANETs, in: Information Technology Conver-
fects the performance metrics. In addition, existing security solu- gence and Services (ITCS), 2010 2nd International Conference on, IEEE, 2010,
tions did not consider the malfunction behavior or communica- pp. 1–8.
tion condition when making a decision about malicious node. Fi- [16] Y.-M. Chen, Y.-C. Wei, A beacon-based trust management system for enhanc-
ing user centric location privacy in VANETs, J. Commun. Netw. 15 (2) (2013)
nally, edge computing was applied on IoT-devices to allow data
153–163.
to be processed near to where it is created rather than crossing [17] Y. Cheng, X. Fu, X. Du, B. Luo, M. Guizani, A lightweight live memory forensic
long route to reach central server/cloud. Thus, it reduces the de- approach based on hardware virtualization, Inf. Sci. 379 (2017) 23–41.
[18] M.-C. Chuang, J.-F. Lee, TEAM: trust-extended authentication mechanism for
lay that is resulted from the packets transmission. Edge computing
vehicular ad hoc networks, IEEE Syst. J. 8 (3) (2014) 749–758.
has been applied on V2X communication which is called vehicular [19] M. Dawood, W. Fuhrmann, B.V. Ghita, Assay of white space technology stan-
edge computing because it works efficiently with latency-sensitive dards for vehicular cognitive access, 2014.
use cases. This is suitable for situations that require very short la- [20] Q. Ding, X. Li, M. Jiang, X. Zhou, Reputation-based trust model in vehicular
ad hoc networks, in: Wireless Communications and Signal Processing (WCSP),
tency such as warning messages. However, security and privacy are 2010 International Conference on, IEEE, 2010, pp. 1–6.
still serious challenges in vehicular edge computing that require to [21] Q. Ding, X. Li, M. Jiang, X. Zhou, Reputation management in vehicular ad hoc
be considered in the future [94]. networks, in: Multimedia Technology (ICMT), 2010 International Conference
on, IEEE, 2010, pp. 1–5.
[22] K. Dixit, P. Pathak, S. Gupta, A new technique for trust computation and rout-
7. Conclusion ing in VANET, in: Colossal Data Analysis and Networking (CDAN), Symposium
on, IEEE, 2016, pp. 1–6.
[23] X. Du, M. Guizani, Y. Xiao, H. Chen, A routing-driven elliptic curve cryptog-
The rapid evolution of the transportation sector has caused se- raphy based key management scheme for heterogeneous sensor networks,
curity challenges which made the vehicular network vulnerable to IEEE Trans. Wireless Commun. 8 (3) (2009) 1223–1229, doi:10.1109/TWC.2009.
various cyber-attacks that hinder the secure V2X communication. 060598.
[24] M.H. Eiza, T. Owens, Q. Ni, Secure and robust multi-constrained QoS aware
In addition, we should take into account the features of the V2X routing algorithm for VANETs, IEEE Trans. Dependable Secure Comput. 13 (1)
network while designing the security model. In this survey pa- (2016) 32–45.
per, we first clarified the key features and architecture of the V2X [25] H.A. El Zouka, A secure interactive architecture for vehicular cloud environ-
ment, in: Proceedings in IEEE International Conference on Smart Cloud (Smart-
network. Also, we proposed the threats analysis for V2X enabling
Cloud), IEEE, 2016, pp. 254–261.
technologies. Then, we classified the current security solutions in [26] R.G. Engoulou, M. Bellaïche, S. Pierre, A. Quintero, VANET security surveys,
vehicular networks based on the security method. Also, we pre- Comput. Commun. 44 (2014) 1–13.
[27] Q.G. Fan, L. Wang, Y.N. Cai, Y.Q. Li, J. Chen, VANET routing replay attack detec-
sented the comparison and discussion of various security methods.
tion research based on SVM, in: Proceedings of Conferences on MATEC Web,
Finally, we mentioned the main challenges and future research 63, EDP Sciences, 2016, p. 05020.
directions for novel contributions to this research area. As a con- [28] A. Filippi, K. Moerman, V. Martinez, A.T.-N. Semiconductors, O. Haran, R.
clusion, combining cryptography and trust strategies will protect Toledano-Autotalks, IEEE802.11p ahead of LTE-V2V for safety applications
(2017).
the network from internal and external attacks and thus guarantee [29] E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing
high security level. and their applicability to VANETs, NEC Network Lab. 28 (2006) 1–28.
66 A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67

[30] T. Gazdar, A. Rachedi, A. Benslimane, A. Belghith, A distributed advanced ana- [58] X. Li, J. Liu, X. Li, W. Sun, RGTE: a reputation-based global trust establishment
lytical trust model for VANETs, in: Proceedings of Global Communications Con- in VANETs, in: Proceedings of the 5th International Conference on Intelligent
ference (GLOBECOM), IEEE, 2012, pp. 201–206. Networking and Collaborative Systems (INCoS), IEEE, 2013, pp. 210–214.
[31] H. Ghafghazi, A. El Mougy, H.T. Mouftah, Enhancing the privacy of LTE-based [59] M. Liyanage, P. Kumar, S. Soderi, M. Ylianttila, A. Gurtov, Performance and se-
public safety networks, in: Local Computer Networks Workshops (LCN Work- curity evaluation of intra-vehicular communication architecture, in: Commu-
shops), 2014 IEEE 39th Conference on, IEEE, 2014, pp. 753–760. nications Workshops (ICC), 2016 IEEE International Conference on, IEEE, 2016,
[32] P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in pp. 302–308.
VANETs, in: Proceedings of the 1st ACM international workshop on Vehicular [60] M.S.I. Mamun, A. Miyaji, H. Takada, A multi-purpose group signature for ve-
ad hoc networks, ACM, 2004, pp. 29–37. hicular network security, in: Network-Based Information Systems (NBiS), 2014
[33] N. Haddadou, A. Rachedi, Y. Ghamri-Doudane, Trust and exclusion in vehicular 17th International Conference on, IEEE, 2014, pp. 511–516.
ad hoc networks: an economic incentive model based approach, in: Proceed- [61] F.G. Mármol, G.M. Pérez, TRIP, a trust and reputation infrastructure-based pro-
ings of Computing, Communications and IT Applications Conference (Com- posal for vehicular ad hoc networks, J. Network Comput. Appl. 35 (3) (2012)
ComAp), IEEE, 2013, pp. 13–18. 934–941.
[34] N. Haddadou, A. Rachedi, Y. Ghamri-Doudane, A job market signaling scheme [62] M.N. Mejri, J. Ben-Othman, M. Hamdi, Survey on VANET security challenges
for incentive and trust management in vehicular ad hoc networks, IEEE Trans. and possible cryptographic solutions, Veh. Commun. 1 (2) (2014) 53–66.
Veh. Technol. 64 (8) (2015) 3657–3674. [63] B. Mishra, P. Nayak, S. Behera, D. Jena, Security in vehicular adhoc networks:
[35] E.B. Hamida, H. Noura, W. Znaidi, Security of cooperative intelligent transport a survey, in: Proceedings of the 2011 International Conference on Communica-
systems: standards, threats analysis and cryptographic countermeasures, Elec- tion, Computing & Security, ACM, 2011, pp. 590–595.
tronics 4 (3) (2015) 380–423. [64] B. Mokhtar, M. Azab, Survey on security issues in vehicular ad hoc networks,
[36] Y. Hao, Y. Cheng, K. Ren, Distributed key management with protection against Alexandria Eng. J. 54 (4) (2015) 1115–1126.
RSU compromise in group signature based VANETs, in: Global Telecommuni- [65] K.N. Patel, R.H. Jhaveri, Isolating packet dropping misbehavior in VANET using
cations Conference, 2008. IEEE GLOBECOM 2008. IEEE, IEEE, 2008, pp. 1–5. ant colony optimization, Int. J. Comput. Appl. 120 (24) (2015).
[37] J. Harding, G. Powell, R. Yoon, J. Fikentscher, C. Doyle, D. Sade, M. Lukuc, J. Si- [66] N. Rafique, M.A. Khan, N.A. Saqib, F. Bashir, C. Beard, Z. Li, Blackhole prevention
mons, J. Wang, Vehicle-to-vehicle communications: readiness of V2V technol- in VANETs using trust management and fuzzy logic analyzer, Int. J. Comput.
ogy for application, Technical Report, National Highway Traffic Safety Admin- Sci. Inf. Secur. 14 (9) (2016) 1226.
istration, 2014. [67] M. Raya, J.-P. Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur.
[38] C. Harsch, A. Festag, P. Papadimitratos, Secure position-based routing for 15 (1) (2007) 39–68.
VANETs, in: Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE [68] K. Rostamzadeh, H. Nicanfar, N. Torabi, S. Gopalakrishnan, V.C. Leung, A con-
66th, IEEE, 2007, pp. 26–30. text-aware trust-based information dissemination framework for vehicular
[39] M. Haus, M. Waqas, A.Y. Ding, Y. Li, S. Tarkoma, J. Ott, Security and privacy in networks, IEEE Internet Things J. 2 (2) (2015) 121–132.
Device-to-Device (D2D) communication: a review, IEEE Commun. Surv. Tut. 19 [69] R.A. Schlienz J, Whitepaper: Device to Device Communication in LTE, Technical
(2) (2017) 1054–1079. Report, ROHDE & SCHWARZ, 2015.
[40] X. Hong, D. Huang, M. Gerla, Z. Cao, SAT: situation-aware trust architecture [70] N. Seddigh, B. Nandy, R. Makkar, J.-F. Beaumont, Security advances and chal-
for vehicular networks, in: Proceedings of the 3rd international workshop on lenges in 4G wireless networks, in: Privacy Security and Trust (PST), 2010
Mobility in the evolving internet architecture, ACM, 2008, pp. 31–36. Eighth Annual International Conference on, IEEE, 2010, pp. 62–71.
[41] R.-H. Hsu, J. Lee, Group anonymous D2D communication with end-to-end se- [71] H. Sedjelmaci, S.M. Senouci, An accurate and efficient collaborative intrusion
curity in LTE-A, in: Communications and Network Security (CNS), 2015 IEEE detection framework to secure vehicular networks, Comput. Electr. Eng. 43
Conference on, IEEE, 2015, pp. 451–459. (2015) 33–47.
[42] X. Huang, R. Yu, J. Kang, Y. Zhang, Distributed reputation management for [72] R.A. Shaikh, A.S. Alzahrani, Intrusion-aware trust model for vehicular ad hoc
secure and efficient vehicular edge computing and networks, IEEE Access 5 networks, Secur. Commun. Networks 7 (11) (2014) 1652–1669.
(2017) 25408–25420. [73] W. Shen, L. Liu, X. Cao, Y. Hao, Y. Cheng, Cooperative message authentication in
[43] ITS Committee, IEEE standard for wireless access in vehicular environ- vehicular cyber-physical systems, IEEE Trans. Emerg. Top. Comput. 1 (1) (2013)
ments-security services for applications and management messages, IEEE Veh. 84–97.
Technol. Soc. 1609 (2013). [74] N. Shukla, A.G. Dinker, N. Srivastava, A. Singh, Security in vehicular ad hoc
[44] R. Jahan, P. Suman, Detection of malicious node and development of routing network by using multiple operating channels, in: Computing for Sustainable
strategy in VANET, in: Proceedings of the 3rd International Conference on Sig- Global Development (INDIACom), 2016 3rd International Conference on, IEEE,
nal Processing and Integrated Networks (SPIN), IEEE, 2016, pp. 472–476. 2016, pp. 3064–3068.
[45] A. Jesudoss, S.K. Raja, A. Sulaiman, Stimulating truth-telling and cooperation [75] Siemens, Vehicle-to-X (V2X) Communication Technology, Technical Report,
among nodes in VANETs through payment and punishment scheme, Ad Hoc Siemens, 2015.
Netw. 24 (2015) 250–263. [76] C. Sun, J. Liu, X. Xu, J. Ma, A privacy-preserving mutual authentication resisting
[46] J. Kang, R. Yu, X. Huang, M. Jonsson, H. Bogucka, S. Gjessing, Y. Zhang, Loca- dos attacks in VANETs, IEEE Access 5 (2017) 24012–24022.
tion privacy attacks and defenses in cloud-enabled internet of vehicles, IEEE [77] J. Sun, C. Zhang, Y. Zhang, Y. Fang, An identity-based security system for user
Wireless Commun. 23 (5) (2016) 52–59. privacy in vehicular ad hoc networks, IEEE Trans. Parallel Distrib. Syst. 21 (9)
[47] G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, T. Weil, (2010) 1227–1239.
Vehicular networking: a survey and tutorial on requirements, architectures, [78] A. Tajeddine, A. Kayssi, A. Chehab, A privacy-preserving trust model for
challenges, standards and solutions, IEEE Commun. Surv. Tut. 13 (4) (2011) VANETs, in: Computer and Information Technology (CIT), 2010 IEEE 10th In-
584–616. ternational Conference on, IEEE, 2010, pp. 832–837.
[48] C.A. Kerrache, C.T. Calafate, J.-C. Cano, N. Lagraa, P. Manzoni, Trust management [79] J. Wan, A.B. Lopez, M.A. Al Faruque, Exploiting wireless channel randomness to
for vehicular networks: an adversary-oriented overview, IEEE Access (2016). generate keys for automotive cyber-physical system security, in: Proceedings of
[49] C.A. Kerrache, N. Lagraa, C.T. Calafate, J.-C. Cano, P. Manzoni, T-VNets: a novel the 7th International Conference on Cyber-Physical Systems, IEEE Press, 2016,
trust architecture for vehicular networks using the standardized messaging p. 13.
services of ETSI ITS, Comput. Commun. 93 (2016) 68–83. [80] J. Wang, Y. Huang, Z. Feng, C. Jiang, H. Zhang, V.C. Leung, Reliable traffic den-
[50] C.A. Kerrache, N. Lagraa, C.T. Calafate, A. Lakas, TROUVE: A trusted routing pro- sity estimation in vehicular network, IEEE Trans. Veh. Technol. (2018).
tocol for urban vehicular environments, in: Proceedings of the 11th IEEE In- [81] Y.-c. Wei, Y.-m. Chen, H.-l. Shan, Beacon-based trust management for location
ternational Conference on Wireless and Mobile Computing, Networking and privacy enhancement vanets, in: Network Operations and Management Sym-
Communications (WiMob), IEEE, 2015, pp. 260–267. posium (APNOMS), 2011 13th Asia-Pacific, IEEE, 2011, pp. 1–8.
[51] U. Khan, S. Agrawal, S. Silakari, Detection of malicious nodes (DMN) in vehic- [82] Z. Wei, F.R. Yu, A. Boukerche, Trust based security enhancements for vehicular
ular ad-hoc networks, Procedia Comput. Sci. 46 (2015) 965–972. ad–hoc networks, in: Proceedings of the fourth ACM international symposium
[52] M. Kim, I. Jang, S. Choo, J. Koo, S. Pack, Collaborative security attack detection on Development and analysis of intelligent vehicular networks and applica-
in software-defined vehicular networks, in: Network Operations and Manage- tions, ACM, 2014, pp. 103–109.
ment Symposium (APNOMS), 2017 19th Asia-Pacific, IEEE, 2017, pp. 19–24. [83] L. Wu, X. Du, J. Wu, Effective defense schemes for phishing attacks on mo-
[53] C. Laurendeau, M. Barbeau, Threats to security in DSRC/WAVE, in: International bile computing platforms, IEEE Trans. Veh. Technol. 65 (8) (2016) 6678–6691,
Conference on Ad-Hoc Networks and Wireless, Springer, 2006, pp. 266–279. doi:10.1109/TVT.2015.2472993.
[54] A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C.P.A. Ogah, Z. Sun, Blockchain-based [84] G. Yan, D. Wen, S. Olariu, M.C. Weigle, Security challenges in vehicular cloud
dynamic key management for heterogeneous intelligent transportation sys- computing, IEEE Trans. Intell. Transp. Syst. 14 (1) (2013) 284–294.
tems, IEEE Internet Things J. 4 (6) (2017) 1832–1843. [85] Z. Yan, H. Xie, P. Zhang, B.B. Gupta, Flexible data access control in D2D com-
[55] G. Li, M. Ma, C. Liu, Y. Shu, A lightweight secure VANET-based naviga- munications, Future Gener. Comput. Syst. (2017).
tion system, in: Proceedings in IEEE Conference on Global Communica- [86] N. Yang, A similarity based trust and reputation management framework for
tions(GLOBECOM), IEEE, 2015, pp. 1–6. VANETs, Int. J. Future Gener. Commun. Networking 6 (2) (2013) 25–34.
[56] Q. Li, A. Malip, K.M. Martin, S.-L. Ng, J. Zhang, A reputation-based announce- [87] Y. Yang, Z. Wei, Y. Zhang, H. Lu, K.-K.R. Choo, H. Cai, V2X security: a case study
ment scheme for vanets, IEEE Trans. Veh. Technol. 61 (9) (2012) 4095–4108. of anonymous authentication, Pervasive Mob. Comput. (2017).
[57] W. Li, H. Song, ART: an attack-resistant trust management scheme for secur- [88] B. Ying, A. Nayak, Anonymous and lightweight authentication for secure vehic-
ing vehicular ad hoc networks, IEEE Trans. Intell. Transp. Syst. 17 (4) (2016) ular networks, IEEE Trans. Veh. Technol. 66 (12) (2017) 10626–10636.
960–969. [89] D. Zhang, F.R. Yu, Z. Wei, A. Boukerche, Trust-based secure routing in software-
defined vehicular ad-hoc networks, arXiv journal (2016).
A. Alnasser, H. Sun and J. Jiang / Computer Networks 151 (2019) 52–67 67

Hongjian Sun (S’07-M’11-SM’15) received his Ph.D. de-


[90] J. Zhang, A survey on trust management for VANETs, in: Advanced Information
gree from the University of Edinburgh (U.K.) in 2011 and
Networking and Applications (AINA), 2011 IEEE International Conference on,
then took postdoctoral positions at King’s College London
IEEE, 2011, pp. 105–112.
(U.K.) and Princeton University (USA). Since 2013, he has
[91] L. Zhang, OTIBAAGKA: a new security tool for cryptographic mix-zone estab-
been with the University of Durham, U.K., as a Lecturer
lishment in vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur. 12 (12)
and then a Reader in Smart Grid. His research mainly fo-
(2017) 2998–3010.
cuses on: (i) Smart grid: communications and networking,
[92] M. Zhang, Y. Fang, Security analysis and enhancements of 3gpp authentica-
(ii) Smart grid: demand side management and demand
tion and key agreement protocol, IEEE Trans. Wireless Commun. 4 (2) (2005)
response, and (iii) Smart grid: renewable energy sources
734–742.
integration. He is on the Editorial Board of the Journal
[93] Y. Zhang, L. Wang, W. Sun, Trust system design optimization in smart grid net-
of Communications and Networks, and EURASIP Journal
work infrastructure, IEEE Trans. Smart Grid 4 (1) (2013) 184–195.
on Wireless Communications and Networking. He also
[94] Y. Zhang, H. Zhang, K. Long, Q. Zheng, X. Xie, Software-defined and fog-com-
served as Guest Editor for IEEE Communication Magazine
puting-based next generation vehicular networks, IEEE Commun. Mag. 56 (9)
for 2 Feature Topics, including: Integrated Communications, Control, and Computing
(2018) 34–41.
Technologies for Enabling Autonomous Smart Grid, 2016. To date, he has published
[95] Q. Zheng, K. Zheng, H. Zhang, V.C. Leung, Delay-optimal virtualized radio re-
over 100 papers in refereed journals and international conferences; He has made
source scheduling in software-defined vehicular networks via stochastic learn-
contributions to and coauthored the IEEE 1900.6a-2014 Standard; He has published
ing, IEEE Trans. Veh. Technol. 65 (10) (2016) 7857–7867.
five book chapters, and edited two books: IET book “Smarter Energy: from Smart
[96] X. Zhu, F. Xu, E. Novak, C.C. Tan, Q. Li, G. Chen, Using wireless link dynamics
Metering to the Smart Grid” (ISBN: 978-1-78561-104-9), and CRC Book “From Inter-
to extract a secret key in vehicular scenarios, IEEE Trans. Mob. Comput. 16 (7)
net of Things to Smart Cities: Enabling Technologies” (ISBN: 9781498773782).
(2017) 2065–2078.

Aljawharah Alnasser received the M.Sc. degree in Computer Engineering from King
Saud University, Saudi Arabia in 2015. She is currently pursuing the Ph.D. degree
in Computing Sciences, Durham University, UK. Since 2011, she has been a Lecturer
with Information Technology Department, King Saud University. Her research inter-
ests focus on Trust management in Internet of Things (IoT), wireless communica-
tions, and network security.

Potrebbero piacerti anche