4.6 Review

A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)

Journal

SENSORS
Volume 19, Issue 16, Pages -

Publisher

MDPI
DOI: 10.3390/s19163589

Keywords

vehicular ad hoc network (VANET); intelligent transportation system (ITS); security threats and attacks; privacy-preserving authentication; cryptography

Funding

  1. National key research and development program [2018YFB1600503]
  2. Natural Science Foundation of China [U1564201, 1664258, 61773184]
  3. Six talent peaks in Jiangsu Province [DZXX-048]
  4. College Graduate Research Innovation Program of Jiangsu University [18KJA580002]
  5. Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)

Ask authors/readers for more resources

Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems. VANET has drawn significant attention from the wireless communication research community and has become one of the most prominent research fields in intelligent transportation system (ITS) because of the potential to provide road safety and precautionary measures for the drivers and passengers. In this survey, we discussed the basic overview of the VANET from the architecture, communication methods, standards, characteristics, and VANET security services. Second, we presented the threats and attacks and the recent state-of-the-art methods of the VANET security services. Then, we comprehensively reviewed the authentication schemes that can protect vehicular networks from malicious nodes and fake messages. Third, we discussed the latest simulation tools and the performance of the authentication schemes in terms of simulation tools, which was followed by the VANET applications. Lastly, we identified the open research challenges and gave future research directions. In sum, this survey fills the gap of existing surveys and summarizes the latest research development. All the security attacks in VANETs and their related countermeasures are discussed with respect to ensuring secure communication. The authentication schemes and comprehensive applications were introduced and analyzed in detail. In addition, open research challenges and future research directions were issued.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available