Published 30 APR 2019 •  vol 12  •  no 4  • 



Mohit Balu, Lovely Professional University, India
Gulshan Kumar, Lovely Professional University, India
Se-Jung Lim, Chonnam National University, Republic of Korea



Vehicular ad hoc network (VANET) is one of the most promising candidates for Intelligent Transport System (ITS). It is also an emerging application of Mobile ad hoc network (MANET). Along with its popularity it also comes with number of challenges such as security, routing and data dissemination. Lots of solutions are already proposed for these challenges but because of daily emergence of new threats and attacks, security requires more concern among all of these. Therefore, in this paper different security techniques proposed by the researchers have been discussed, along with the security services they have considered (Confidentiality, Integrity or Availability). Moreover, different security attacks have been discussed which the proposed solution mitigates. Furthermore, comparison of all these techniques have been done by taking some security parameters.



VANETs, Security, DSRC, Threats, Attacks



[1] Sivasakthi, M., and S. R. Suresh. "Research on vehicular ad hoc networks (VANETs): an overview." International Journal of Applied Science and Engineering Research 2.1 (2013): 23-27.
[2] Liang, Wenshuang, et al. "Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends." International Journal of Distributed Sensor Networks 11.8 (2015): 745303.
[3] Maier, Mark W., David Emery, and Rich Hilliard. "Software architecture: Introducing IEEE standard 1471." Computer 4 (2001): 107-109.
[4] Maier, Mark W., David Emery, and Rich Hilliard. "ANSI/IEEE 1471 and systems engineering." Systems Engineering 7.3 (2004): 1-23.
[5] Emery, David, and Rich Hilliard. "Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010." 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture. IEEE, 2009.
[6] Timo Kosch, Christoph Schroth, Markus Strassberger, and Marc Bechler. Automotive internetworking. Vol. 4. John Wiley & Sons, 2012.
[7] Kumar, Gulshan, et al. "Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication." IEEE Access 6 (2018): 46558-46567.
[8] Laurendeau, Christine, and Michel Barbeau. "Threats to Security in DSRC/WAVE." International Conference on Ad-Hoc Networks and Wireless. Springer, Berlin, Heidelberg, 2006.
[9] Rahim, Aneel, and Fahad bin Muyaha. "Impact of Malicious Node on Broadcast Schemes." International Conference on Security Technology. Springer, Berlin, Heidelberg, 2009.
[10] Yan, Gongjun, Weiming Yang, Earl F. Shaner, and Danda B. Rawat. "Intrusion-tolerant location information services in intelligent vehicular networks." International Conference on Intelligent Computing and Information Science. Springer, Berlin, Heidelberg, 2011.
[11] DasGupta, Suparna, Rituparna Chaki, and Sankhayan Choudhury. "TruVAL: trusted vehicle authentication logic for VANET." International Conference on Advances in Computing, Communication and Control. Springer, Berlin, Heidelberg, 2013.
[12] Zhong, Hong, et al. "Privacy-preserving authentication scheme with full aggregation in VANET." Information Sciences 476 (2019): 211-221.
[13] Chikhaoui, Ons , Aida Ben Chehida, Ryma Abassi, Sihem Guemara, and El Fatmi. Ad-hoc, Mobile, and Wireless Networks 6811, (2011): 77–91.
[14] Xue-wen, Wu, Yan Wei, Song Shi-ming, and Wang Hui-bin. For vehicular Ad Hoc networks (2010): 294–309.
[15] Huang, Dijiang, and Mayank Verma. "ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks." Ad Hoc Networks 7.8 (2009): 1526-1535.
[16] Verma, Karan, Halabi Hasbullah, and Ashok Kumar. "Prevention of DoS attacks in VANET." Wireless personal communications 73.1 (2013): 95-126.
[17] Shabbir, Munazza, et al. "Detection and Prevention of Distributed Denial of Service Attacks in VANETs." 2016 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2016.
[18] Zhong, Hong, et al. "Privacy-preserving authentication scheme with full aggregation in VANET." Information Sciences476 (2019): 211-221.
[19] Xie, Yong, et al. "EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs." Telecommunication Systems 65.2 (2017): 229-240.
[20] Kadam, Megha and Suresh Limkar. Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications 515 (2017): 293–303.



Balu, M., Kumar, G., & Lim, S.-J. (2019). A Review on Security Techniques in VANETS. International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, 12(4), 1-14. doi: 10.33832/ijca.2019.12.4.01.

Balu, Mohit, et al. “A Review on Security Techniques in VANETS.” International Journal of Control and Automation, ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 4, 2019, pp. 1-14. IJCA, http://article.nadiapub.com/IJCA/vol12_no4/1.html.

[1] M. Balu, G. Kumar, and S.-J. Lim, "A Review on Security Techniques in VANETS." International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 4, pp. 1-14, Apr 2019.