Professional Documents
Culture Documents
ABSTRACTVANET is new kind of Ad hoc. It is widely used moving outdoor communication network, also known as
in ITS (Intelligent Transportation Systems), which has many SOTIS (self-organizing traffic information system) [4]. In
characteristics as large scale network, fast moving nodes, the VANET, the moving vehicles can constitute a network
frequently changing topological structure and easily divided communication by exchanging the speed and position
networks. Therefore, routing protocol design must fully
information for another. Each node in the network has the
consider of this characteristics with much node information
that bring a great challenge to the security of VANET. In this ability to find the path, which adopted the multi-hop to
paper, we divide the information type into four categories based deliver the information sent out from the source node finally
on different content, and analyze the security threats in to the destination node place through a series of forwarding.
different information type, then summarize the existing security The network communication is made up of two parts:
technologies and give the possible research directions. vehicle to vehicle (V2V) communication and vehicle to
infrastructure (V2I) communication. As shown in figure 1,
.Introduction vehicle global positioning services (GPS, global positioning
135
The recent node will select the malicious nodes as the next disorder. It increases the network unnecessary costs and
hop. Actually, the distance between malicious nodes and the affects the data transfer process. As in figure 5(a), normally,
destination node is far outweighing the rest of the neighbor when the source node S send information to the destination
node. Malicious nodes destroy the network communication node D, it will be forwarding in accordance with the law of
in two aspects: on one hand, the involvement of malicious the right hand in S - A - B - C - D node order. When the
nodes influent the original communication process, that lead malicious nodes E and C tempers the azimuth information as
to some of the network node inaccessible or some node link figure 5(b) E 'and' C respectively, the forwarding path will
in idle, the malicious nodes in routing process will increase become S - A - E - B - F - C - D. This not only increases the
the unnecessary costs and make the transmission load number of routing and transport costs, but also increases the
increase at the same time. On the other hand, malicious transmission delay and packet loss. It offers a convenient
nodes could do data content analysis, take data tempered or manipulation for malicious nodes to diddle data information
even discarded in the cheated packed by modified distance and make analyze data content.
information, which cause packet transmission failure and
make the network data loss eventually damaging the DMoving Direction Information
information security. VANET network is different from traditional mobile Ad
When the source node A sending data to destination hoc network. It has the characteristics as high node
node D, we assumed the distance node B to the destination movement speed, the unevenly network node distribution
node D for d1, the distance between malicious nodes C to the and a certain regularity node mobility. It puts forward new
destination node D for d2. Malicious node C argues that its difficulties for the establishment of the routing, but also
distance to destination is minimum of the neighbor node provides new solutions.
within the scope of A communication, namely d2 < d1. At The particularity of network application environment
this time, source node A will choose C as the next hop. In determines the difficulties in building routing. In the
this way, the malicious node C increased the network routing intelligent transportation system, due to the few vehicles in
overhead, and could cheat data information to malicious night or fast vehicle speed may result in network
attacks.
CAzimuth Information
The traditional mobile Ad hoc routing protocol was not
carrying adjacent nodes azimuth information, which adopted
spending large broadcast ways to establish and maintain
routing. Deficiency in information increase delay and cost
during route setup process. If there are azimuth information
instructions in FIG. 3, the possibility against modified
distance information can reduce greatly. (a) The Edge of the Right Hand Rule Forwarding
VANET GPCR and GeoDTN+Nav are both to carrying
the node azimuth information. They have brought
convenient for the practical application in urban
136
environment of VANET, the correctness of the direction of broadcasted in large VANET is enough to cause major
moving information has great significance for the driver and delays, which lead that part of the vehicle is unable to obtain
passenger's safety. If the malicious node changes the vehicle the correct information.
moving direction from turning right to going straight, the
rear of the vehicle need to turn right would consider that the CIntrusion Detection
road ahead is unimpeded and relaxes driving vigilance. Until One of the most important remedy in network security
to find the vehicle ahead turning right, it will probably too protection is intrusion detection [15], which analyzes the
late to take measures and cause traffic accidents. Particularly, collected related information in network to check whether
owing to the direction of the mobile node influence by the the network exists the network threat security or the signs of
artificial factor, the network node movement direction may attack, thus provide protection for the network information
change in a short time. Hence the success of the network security. In cable network, intrusion detection depends on
communications depends on the tolerable delay constraints the flow analysis on the switches and routers gateway nodes.
and the correct data transmission. In the information security But VANET is a no center and in organization network,
mechanism, it comes up higher request with the speed in which can't provide monitory point for monitoring network
data encryption/decryption. data flow. Meanwhile, due to the network characteristics as
Therefore, protection the integrity and accuracy of the strong mobility and node uneven distribution, it is difficult to
information in routing protocol takes the significance for division network normal or proposed a abnormal threshold.
correct data transmission and network safety. We must take Therefore it brings new challenges for the application of
effective way to prevent malicious nodes attack. intrusion detection technology.
137
[8] Mohammadzadeh H, Bigdello S J. "UTCARP: Urban Traffic Control
Aware Routing Protocol, ". International Journal, 2013.
[9] Paul B, Ibrahim M, Bikas M, et al. "VANET Routing Protocols: Pros
and Cons, " arXiv preprint arXiv:1204.1201, 2012.
[10] LIU Zheng, XIANG Yong, SUN Wei-Zhen. "The contrast analysis on
VANET unicast routing protocols, " Computer Engineering and
Design, 2011, Vol.32, No.11
[11] Lee K C, Cheng P-C, Weng J-T, et al. " VCLCR: a practical
geographic routing protocol in urban scenarios, " Los Angeles, CA:
UCLA, Boelter Hall, 2008.
[12] KevinC. Lee, Pei-Chun Cheng, Jui-Ting Weng, Lung-CHih Tung,
Mario Gerla. VCLCR: AP ractical Geogrophic Routing Protocol in
Urban Scenarios, UCLACSDT Technical Report: TR080009, March
26, 2008
[13] Enge, Andreas. "Elliptic curve cryptographic systems." Handbook of
Finite Fields (2013).
[14] Li C, Wang Z.Location-based Security Authentication Mechanism for
Ad hoc Network[J]. parameters, 2012, 1: 2.
[15] Hoh B, Gruteser M, Herring R, et al. Virtual trip lines for distributed
privacy-preserving traffic monitoring [C]. In MobiSys 08: Proceeding
of the 6th international conference on Mobile systems, applications,
and services. New York, NY,USA, 2008: 1528.
138