Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Nov 24;22(23):9123. doi: 10.3390/s22239123

Security in V2I Communications: A Systematic Literature Review

Pablo Marcillo 1,*, Diego Tamayo-Urgilés 1, Ángel Leonardo Valdivieso Caraguay 1, Myriam Hernández-Álvarez 1
Editor: Valderi R Q Leithardt1
PMCID: PMC9741211  PMID: 36501828

Abstract

Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium.

Keywords: VANET, V2I, security, privacy, authentication, confidentiality, integrity

1. Introduction

According to Statista [1], by 2021, the number of connected vehicles worldwide will reach 237 million units, and by 2025 that number will be 400 million. The impact of those numbers in the telecommunication area is enormous. One of the implications is related to security in communications. Because of the opening of wireless communications, the dynamic topology and the big size of the network, and the use of the same credentials for registration, attackers may be able to listen, forge, manipulate, or destroy information exchanged between vehicles and roadside units affecting the proper operation and performance of the network [2,3,4].

Generally, there are two modes of communication in a vehicular network: Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V). This last one has the advantage of having roadside units (RSU) with high computational and transmission power to exchange information at high speed with vehicles. For instance, it assures the correct operation of driving guidance and early warning services. In addition to the advantages of V2I, benefits such as avoiding traffic accidents or traffic jams or accessing services on the Internet could justify why many authors have focused more on V2I communication than V2V [2,3]. In that way, it is also essential to cover some aspects of security in this type of communication.

This literature review aims to report the most current and relevant information on V2I communications security. In that way, the authors posed five research questions. The first one is related to the vulnerabilities in this type of communication and their respective countermeasures. The second concerns the methods, technologies, tools, or mechanisms used to provide security solutions to mitigate these vulnerabilities. The third and fourth ones are about the available evaluation metrics to measure the effectiveness of the solutions and thus find out which offers the best results. Finally, the last one concerns the challenges to be faced by the proposals and their possible solutions.

One of the contributions of the present review is the information that the authors provided compared to previous studies related to the same topic. The authors noted that almost all reviews focus on all communication in Vehicular Ad-hoc Network (VANET) without emphasizing V2I communication. VANET is a large overall system model comprising four approaches comprehending driver and vehicle, traffic flow, communications, and applications. The components related to data communication are V2V and V2I. The whole system is vast and complex. Therefore, this research aims to provide a systematic literature review centered on one of the components of VANET: V2I communication, to review it in more detail.

The rest of this article is organized as follows: Section 2 presents the definitions of specific attacks, evaluation metrics, and methods. Meanwhile, Section 3 presents the methodology used to elaborate on this review. Then, Section 4 shows the information used to answer the research questions, followed by Section 5, which introduces the answers to those questions and discusses the most relevant security aspects of V2I. Finally, the conclusions of this work are presented in Section 6.

2. Concepts and Definitions

Section 2.1 and Section 2.2 present the lists of the security requirements and attacks that occur in V2I communications. Section 2.3 presents a list of evaluation metrics used by the authors, and Section 2.4 the main methods used to provide solutions.

2.1. Security Requirements

  • Confidentiality: It guarantees that only authorized nodes can access and reveal sensitive information.

  • Integrity: It ensures that the information sent by the sender is the same as that received by the receiver.

  • Authentication: It guarantees that the node that wants to access or use network resources is who it claims to be.

  • Availability: It ensures that the access to network resources for authorized nodes is continuous and without interruptions.

  • Non-repudiation: It guarantees that neither the receiver nor the sender can deny having processed certain information.

2.2. Attacks

  • MitM: It occurs when an adversary secretly enters the communication of two devices to make them believe that they are communicating directly and thus exchange its public key between the devices.

  • Replay: It occurs when an adversary listens to the communication, intercepts it, and later fraudulently resend the obtained messages.

  • Modification/Tampering: It occurs when an adversary alters the message transmitted between two nodes fraudulently.

  • DoS: It occurs when an adversary floods the communication system with no genuine requests getting the service down.

  • Repudiation: It occurs when a system or application does not track nor log the user’s actions properly, permitting manipulation or forging new actions.

  • Session Key Disclosure: It occurs when an adversary can obtain values from memory devices (OBU or TPD) and messages from insecure communication channels. Thus, the adversary can calculate the session key using the values and messages.

  • Impersonation: It occurs when an adversary can take someone’s identity to gain advantages or cause damage to other nodes.

  • Sybil: It occurs when an adversary forges node identities to obtain privileges and thus causes chaos in normal conditions.

  • Forgery: It occurs when an adversary forges a valid certificate and signs a message successfully.

  • Bogus: It occurs when an adversary generates a fake node in a network and informs it about false traffic conditions in a particular location.

  • Eavesdropping: It occurs when an adversary listens to the communication channel extracting information that can be useful for node tracking activity.

  • Plaintext: It occurs when an adversary, who has access to the ciphertext and its plaintext, tries to guess the secret key or develops an algorithm for decrypting messages.

  • Key Leakage: It occurs when an adversary, who has access to the signer, can learn some sensitive information (e.g., computation-time, memory contents, and others).

  • Chosen Message: It occurs when an adversary, who can obtain the ciphertext of plaintext messages from the signer, tries to reveal the secret encryption key.

  • Ciphertext: It occurs when an adversary, who has access to a set of ciphertexts, tries to guess the plaintexts or even the key.

  • Beacon Transmission Denial: It occurs when an adversary suspends itself its beacon transmission for an indefinite time to avoid detection.

2.3. Evaluation Metrics

  • Computational Cost: It refers to the time required to apply certain operations to a message before sending it over the network.

  • Communication Overhead: It refers to the length of information transmitted by a successful message transference.

  • Transmission Delay: It refers to the time a packet takes to get to the destination from the source.

  • Propagation Delay: It refers to the distance between the sender and receiver divided by the light speed.

  • Packet Delivery Ratio: It refers to the ratio of packets successfully delivered to their destinations.

  • Packet Loss Ratio: It refers to the ratio between the number of lost packets and the total number of sent packets.

  • Accuracy: It refers to the general ratio of vehicles correctly detected.

  • Trust Value: It refers to the general cooperativeness of a user.

  • Data Receiving Rate: It refers to the rate of data successfully received.

  • Storage Cost: It refers to the memory size required to store the parameters in the different devices.

  • Roaming Latency: It refers to the time required to transfer the node control between gateways.

  • Cyphertext Length: It refers to the length of messages after performing encryption operations.

  • Energy Consumption: It refers to the energy consumed during the routing process.

  • Throughput: It refers to the rate of messages successfully transmitted in one second over a communication channel.

  • Attack Detection Ratio: It refers to the ratio between the number of attacks detected and the total number of attacks.

  • Average Delay: It refers to the expected time a beacon message of a node remains in a queue before being sent to the infrastructure.

  • False Accept Ratio: It refers to the ratio between the correct number of planned trajectories and the total number of trajectories of a node.

2.4. Methods

  • Elliptic Curve Cryptography (ECC): It is a public key encryption technique that generates cryptographic keys using the elliptic curve theory.

  • Public Key Cryptography (PKC): It is a scheme that performs encryption and decryption using public and private keys. The public key is published, and the private one is kept secret. It is known as asymmetric key cryptography.

  • Symmetric Key Cryptography (SKC): It is a cryptography scheme that uses the same key for encryption and decryption.

  • Public Key Infrastructure (PKI): It is a scheme in which the public key is associated with a certificate provided by a certificate authority instead of choosing one generated randomly.

  • Identity-Based Public Key Cryptography (IBPKC): It is a scheme that uses a representation of identity as the public key to avoid using public ones associated with a certificate. Instead of a certificate authority, there is a key generation center to generate the private keys based on the public ones.

  • Certificateless-Based Cryptography (CBC): It is a scheme that distributes the private keys of the key generation center into several entities. In this scheme, the user and the key generation center calculate the private key, but only the user can obtain the result.

3. Materials and Methods

The authors used Kitchenham’s guide [5,6] for performing systematic reviews to elaborate on this work. Thus, they considered the following phases and activities: Planning the Review-Research Questions, Conducting the Review-Search Strategy, Study Quality Assessment, and Data Extraction, and Reporting the Review-Results.

3.1. Planning the Review

The five research questions for this review are presented as follows.

  • RQ01. What are the principal vulnerabilities in V2I communications?

  • RQ02. What are the methods or tools to mitigate those vulnerabilities?

  • RQ03: What evaluation metrics are available to measure the effectiveness of those methods or tools?

  • RQ04: What methods, technologies, or tools provide the best results based on those evaluation metrics?

  • RQ05: What are the principal challenges for mitigating vulnerabilities in VANETs?

3.2. Conducting the Review

3.2.1. Search Strategy

The authors used the following bibliographic databases: IEEExplore, ACM Digital Library, and Semantic Scholar. From the research questions, they extracted the following keywords: VANET, V2I, privacy, authentication, confidentiality, and integrity. They developed the search strings using the keywords, the meaning of acronyms VANET and V2I, and the operators AND and OR. Table 1 presents the search strings, date filters, and the search results.

Table 1.

Search Results.

Database Search Engine ID Command Search Date Filters Search Date Total
Scopus SS01 ((“All Metadata”:”vehicular ad hoc network” OR “All Metadata”:vanet) AND (“All Metadata”:”vehicle to infrastructure” OR “All Metadata”:v2i) AND “All Metadata”:security AND (“All Metadata”:privacy OR “All Metadata”:authentication OR “All Metadata”:confidentiality OR “All Metadata”:integrity)) 2017–2022 22 June 2022 55
SS02 ((“All Metadata”:”vehicle to infrastructure” OR “All Metadata”:v2i) AND “All Metadata”:security AND (“All Metadata”:privacy OR “All Metadata”:authentication OR “All Metadata":confidentiality OR “All Metadata”:integrity)) 2017–2022 22 June 2022 96
151
ACM SS03 [[All: “vehicular ad hoc networks”] OR [All: vanet]] AND [[All: “vehicle to infrastructure”] OR [All: v2i]] AND [All: security] AND [[All: privacy] OR [All: authentication] OR [All: confidentiality] OR [All: integrity]] [Publication Date: Past 5 years] 22 June 2022 67
SS04 [[All: “vehicle to infrastructure”] OR [All: v2i]] AND [All: security] AND [[All: privacy] OR [All: authentication] OR [All: confidentiality] OR [All: integrity]] [Publication Date: Past 5 years] 22 June 2022 152
219
Semantic Scholar SS05 vanet vehicular ad-hoc network v2i vehicle to infrastructure privacy authentication confidentiality integrity Last 5 years 22 June 2022 40
SS06 v2i vehicle to infrastructure privacy authentication confidentiality integrity Last 5 years 22 June 2022 20
60

3.2.2. Study Selection

They established some inclusion and exclusion criteria to accomplish the study selection process.

  • Inclusion Criteria

    • IC01. Studies that are peer-reviewed research papers.

    • IC02. Studies published in the last five years.

    • IC03. Studies published in journals and conferences.

  • Exclusion Criteria

    • EC01. Studies that are literature reviews, chapters in books, analysis papers, comparative papers, position papers, theses, technical reports, workshop reports, or lecture notes.

    • EC02. Studies published in preprint platforms.

    • EC03. The full text of the study is not available.

3.2.3. Quality Assessment

The authors defined one assessment question and established two possible answers for each one. The questions are presented as follows. The answer “no” is rated with 0 and “yes” with 1.

  • AQ01. Is the study targeted at V2I communications?

They established that the primary study is accepted only if the score is equals to 1; otherwise, it will be rejected. Table A1 presents the quality instrument and its results. As can be seen in Figure 1, 430 articles were found after performing the search. Of them, 48 duplicates were removed, for a total of 382. Then, 335 were removed because they did not meet the inclusion and exclusion criteria, for a total of 47. After that, 11 articles obtained on the snowballing technique were added, for a total of 58. Finally, 11 articles were removed because they did not fulfill the quality criterion. Thus, the selected articles reached 47. Table A2 presents the selected primary studies.

Figure 1.

Figure 1

The review process.

3.2.4. Data Extraction

The authors designed three data collection forms to obtain information from the selected primary studies. The following is a description of each of them. Firstly, Table 2 includes the primary study ID and the attacks to which the proposal is resistant. Whereas Table 3 contains the primary study ID, the category to which it belongs, and the methods, technologies, simulators, and other tools on which the solutions are based. Finally, Table 4 contains the primary study ID and the evaluation metrics used by the proposals. The design of those tables was based on addressing the research questions. Thus, they used Table 2 to answer RQ01, Table 3 to answer RQ02, and Table 4 to answer both RQ03 and RQ04. The generated data are presented in Section 3 and interpreted in Section 4.

Table 2.

Protection against attacks.

ID MiTM Replay Modification Tampering DoS Session Key Disclosure Impersonation Sybil Forgery Bogus Eavesdropping Plaintext Key Leakage Chosen Message Ciphertext Beacon Trans. Denial
PS01
PS02
PS03
PS04
PS05
PS06
PS07
PS08
PS09 *
PS10
PS11
PS12
PS13
PS14
PS15
PS16 *
PS17
PS18
PS19
PS20
PS21
PS22
PS23
PS24
PS25
PS26
PS27
PS28
PS29
PS30
PS31
PS32
PS33
PS34
PS35
PS36
PS37
PS38
PS39
PS40
PS41
PS42
PS43
PS44
PS45
PS46 *
PS47

* Not defined. √ Defined.

Table 3.

Methods and tools.

ID Category Methods Based on Technology Simulators Other Tools
PS01 Authentication Elliptic Curve Cryptography (ECC) Blockchain Bouncy Castle [7] and Scyther Tool [8]
PS02 Authentication Certificateless-Based Cryptography (CBC) Blockchain MIRACL [9]
PS03 Authentication Cuckoo filters Crypto++ [10]
PS04 Authentication Public Key Cryptography (PKC) and Symmetric Key Cryptography NS-2 [11]
PS05 Network Security Identity-Based PKC Blockchain OMNeT++ [12] and SUMO [13]
PS06 Authentication Public Key Infrastructure (PKI) and ECC Blockchain
PS07 Authentication PKC Blockchain Crypto++
PS08 Authentication PKC and ECC Blockchain Go environment [14]
PS09 Authentication PKC and Certificateless-Based Cryptography Java Pairing Based Cryptography (JPBC) library [15]
PS10 Authentication PKC and Trust Degree Estimation Matlab [16]
PS11 Authentication Hash functions and XOR operations
PS12 Authentication ECC and Private Key Insulation TEPLA [17]
PS13 Authentication Certificateless-Based Cryptography and ECC MIRACL
PS14 Authentication PKC Blockchain GMP [18] and PBC [19] libraries
PS15 Authentication Certificateless-Based Cryptography NS-3 [20] and SUMO
PS16 Authentication PKC OMNeT++ and SUMO
PS17 Authentication Protocols suite OMNeT++ and SUMO Tamarin [21], TEPLA [17], and Python Cryptography Tool (pycrypto) [22]
PS18 Intrusion Prevention System Edge Computing, Software, Defined Networking (SDN) and Network Functions Virtualization (NFV) Stop Sign Gap Assist (SSGA) [23]
PS19 Authentication Identity-Based PKC and Hash Message Authentication Code (HMAC) NS-3 [20], SUMO, and MObility Model Generator for Vehicular Networks (MOVE) [24]
PS20 Authentication Blockchain NS-3, Automated Validation of Security Protocols and Applications (AVISPA) [25] MIRACL and PBC
PS21 Intrusion Detection System Auto Correlation Function (ACF) OMNeT++ and SUMO
PS22 Network Security Port Hopping Technique
PS23 Authentication PKC and Identity-Based PKC NS-2
PS24 Authentication Certificateless-Based Cryptography MIRACL
PS25 Authentication Cooperative Group Beaconing Strategy
PS26 Authentication Protocol Based on Vehicles Trajectory Open Street Map [26]
PS27 Authentication Identity-Based PKC and Pseudonyms MIRACL and PBC
PS28 Authentication PKC AVISPA and OpenSSL [27]
PS29 Authentication Lattice-Based Cryptosystem
PS30 Authentication Roaming Protocol OMNeT++
PS31 Authentication ECC, Identity-based PKC, and Pseudonyms MIRACL
PS32 Authentication Symmetric Encryption and Group Signature
PS33 Communication Protocol ECC and One-Way Hash Function Testbed [28]
PS34 Authentication BGN Homomorphic Encryption and Moore Curve Technique
PS35 Authentication PKI and Identity-Based Cryptosystem (IBC)
PS36 Authentication Certificateless Aggregate Signature and Pseudonyms MIRACL
PS37 Authentication Symmetric Key Encryption Fog Computing
PS38 Authentication Authenticated Key Agreement (AKA), ECC and Hash Functions OMNeT++, SUMO, and Veins [29] MIRACL and Crypto++
PS39 Authentication Identity-Based Cryptography
PS40 Authentication Reputation-Based Validation Blockchain Socket.io [30], Node.js [31], and Google Maps [32]
PS41 Authentication Symmetric and Asymmetric Cryptography, and ECC AVISPA and Proverif [33]
PS42 Messages exchange security Permutation-Only Encryption Group Formation Criteria
PS43 Messages exchange security Cloudlets AWS IoT [34], AWS Greengrass [35], and Boto [36]
PS44 Authentication PKI and Message Accessing Code (MAC) Encryption
PS45 Authentication Authentication Tokens and Schnorr Signature NS-3 and SUMO
PS46 Privacy Protection Trusted Third Party (TTP) and Circle Based Dummy Generation (CBDG) OMNeT++, SUMO, and Veins
PS47 Intrusion Detection System (IDS) Position Verification Technique NS-2

✗ Not defined.

Table 4.

Evaluation Metrics.

ID Computational Cost Communication Overhead Transmission Delay Propagation Delay Packet Delivery Ratio Packet Loss Ratio Accuracy Trust Value Data Receiving Rate Storage Cost Storage Overhead Roaming Latency Cyphertext Length Energy Consumption Throughput Attack Detection Rate Average Delay False Accept Rate Others
PS01
PS02
PS03
PS04
PS05
PS06
PS07
PS08
PS09
PS10
PS11
PS12
PS13
PS14
PS15
PS16
PS17
PS18
PS19
PS20
PS21
PS22
PS23
PS24
PS25
PS26
PS27
PS28
PS29
PS30
PS31
PS32
PS33
PS34
PS35
PS36
PS37
PS38
PS39
PS40
PS41 *
PS42
PS43
PS44 *
PS45
PS46
PS47

* Not defined. √ Defined.

3.3. Reporting the Review

Of 47 primary studies, 21 are from conferences, and 26 are from journals. The two years when more studies have been published are 2018 and 2019. Figure 2 shows the number of studies and types published by year.

Figure 2.

Figure 2

Primary studies published by year and type of publication.

4. Results

The authors determined that around seven of every ten solutions use a simulation as an experimental method and around one of every ten solutions as an experiment. Furthermore, they found that one of every two solutions uses network simulators, and one of every two uses both network and traffic simulators. Figure 3 presents the experimental methods and the use of simulators.

Figure 3.

Figure 3

Experimental methods and use of simulators based on the frequency of occurrence.

4.1. Data Collections Forms

The three data collection forms (Table 2, Table 3 and Table 4) described in the Data Extraction are presented as follows. Table 2 presents the attacks to which the proposals are resistant. Table 3 presents the methods, technologies, and tools used to provide solutions. Table 4 presents the evaluation metrics used to measure the effectiveness of the proposals.

4.2. Review of Reviews

Intending to contribute more to this topic, the authors performed a simplified review of reviews. Similarly, they used the same search strategy and partly the study selection presented in this section. Below, the authors present two data collection forms (Table 5 and Table 6) with all the information extracted from the reviews.

Table 5.

Review articles.

ID Authors Title Aim Search Strategy Number of Studies Year
RV01 Islam et al. [37] A Comprehensive Survey on Attacks and Security Protocols for VANETs It informs about fundamentals, application areas, security services, and possible attacks in vehicular networks. Not defined 11 2021
RV02 Hamdi et al. [38] A review on various security attacks in vehicular ad hoc networks It discusses security concerns, security services, and advances in authentication. It also describes attacks and threats. Not defined 13 2021
RV03 Sheikh et al. [39] A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) It presents an overview of VANET that includes architecture, communication methods, standards, and characteristics. It also presents security services, security threats and attacks, simulation tools, and challenges. Not defined >65 2019
RV04 Singh et al. [40] Advanced Security Attacks on Vehicular AD HOC Network (VANET) It presents security requirements, challenges, attacks, and privacy issues in VANET. Not defined Not defined 2019
RV05 Azam et al. [41] An outline of the security challenges in VANET It informs about security attacks and solutions. Not defined 6 2020
RV06 Kohli et al. [42] Future Trends of Security and Privacy in Next Generation VANET It addresses security and privacy issues in next-generation VANET. It also presents solutions for those issues. Not defined 11 2020
RV07 Mitsakis et al. [43] Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review It presents solutions to both the attacks and challenges in a VANET. Not defined 15 2020
RV08 Mihai et al. [44] Security Aspects of Communications in VANETs It presents relevant proposals for privacy, authentication, and integrity in the context of vehicular networks. Not defined 12 2020
RV09 Goyal et al. [45] Security Attacks, Requirements, and Authentication Schemes in VANET It provides a classification of attacks, security requirements, and authentication schemes Not defined 8 2019
N/A Our review Security in V2I Communications: A Systematic Literature Review It informs the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Available 47 2022

Table 6.

Comparative analysis among reviews.

ID Protection against Attacks Methods and Tools Based on Technology Simulators Evaluation Metrics
RV01 DoS PKI
Tampering ECC
Sybil IBPKC
Replay
Impersonation
RV02 DoS Blockchain
Tampering
Impersonation
Sybil
Replay
Eavesdropping
MitM
RV03 DoS PKC Cloud computing SUMO Computational cost
Tampering SKC OMNET++ Communication overhead
MitM IBPKC NS-2
Eavesdropping PKI NS-3
Impersonation Hash functions Veins
Replay ECC
Sybil
RV04 Tampering
Impersonation
Sybil
MitM
DoS
Eavesdropping
Replay
Bogus
RV05 DoS PKI Blockchain
Tampering Hash functions Fog computing
Eavesdropping
Sybil
Replay
RV06 DoS PKI
Bogus
Impersonation
Eavesdropping
RV07 DoS PKI
Sybil PKC
MitM SKC
Tampering
Impersonation
Replay
RV08 MitM PKI Blockchain
Impersonation IBPKC
Tampering
Eavesdropping
RV09 Tampering PKI Computational cost
Eavesdropping ECC Communication overhead
SKC Average delay
IBPKC
Our review MitM ECC Blockchain SUMO Computational cost
Replay CBC Edge computing OMNet++ Communication overhead
Modification PKI SDN NS-3 Transmission delay
Tampering PKC NFV NS-2 Propagation delay
DoS SKC Fog computing Veins Packet Delivery Ratio
Session Key Disclosure IBPKC Group Formation Criteria SSGA Packet Loss Ratio
Impersonation Hash functions Cloud computing MOVE Accuracy
Sybil Pseudonyms Trust Value
Forgery Data Receiving Rate
Bogus Storage Cost
Eavesdropping Storage Overhead
Plaintext Roaming Latency
Key Leakage Cyphertext Length
Chosen Message Energy Consumption
Ciphertext Throughput
Beacon Transmission Denial Attack Detection Rate
Average Delay
False Accept Rate

5. Discussion

The answers to the five research questions are presented as follows.

RQ01: What are the principal vulnerabilities in V2I communications?

Since wireless communications are easy to intercept, the principal vulnerability in this type of communication is the susceptibility to attacks. Thus, adversaries can compromise RSUs/vehicles and send false information to drivers putting their lives at risk. They can also send unnecessary alerts to distract them and control the communication links. Once it is done, the adversaries can easily modify session messages. Considering that fact, researchers have focused on proposing solutions that offer any attack resistance. From the results, the authors identified the attacks to which the solutions are resistant. They found the following attacks: MitM, Replay, Tampering, DoS, Repudiation, Session Key Disclosure, Impersonation, Sybil, Forgery, Eavesdropping, and Plaintext. The authors commonly offer solutions against Replay, Impersonation, MitM, Tampering, and Sybil attacks.

RQ02: What methods, technologies, or tools can mitigate those vulnerabilities?

The proposals were grouped using the following categories. The Network Communication Security category for routing protocols, communication schemes, messages exchange security, and privacy protection; the Malicious Node Detection category for intrusion detection systems, trust management schemes, and intrusion prevention systems; and the Authentication Scheme category. According to Figure 4, eight of every ten proposals are about Authentication Schemes, one is about Network Communication Security, and less than one is about Malicious Node Detection.

Figure 4.

Figure 4

Types of solutions based on the frequency of occurrence.

Regarding technologies, The authors observed that there are several solutions based on PKC/ECC with Blockchain. This technology is gaining attentions in various study fields. This interest must be due to its key features such as decentralization, anonymity, and immutability [46,47]. Regarding simulators, authors have used both network and traffic ones. Figure 5 presents the use of simulators in studies based on the frequency of occurrence. According to it, they use OMNeT++, NS-3, and NS-2 to a greater extent and Veins, SSGA, and MOVE to a lesser extent, and the only traffic simulator is SUMO.

Figure 5.

Figure 5

Use of network simulators based on the frequency of occurrence.

RQ03: What evaluation metrics are available to measure the effectiveness of those methods or tools?

Researchers have used the following evaluation metrics to measure the performance of their solutions. Metrics such as computational cost/time/overhead, communication cost/overhead, storage cost/overhead, transmission delay, propagation delay, packet delivery ratio, packet drop ratio, accuracy, trust value, data receiving rate, roaming latency, cyphertext length, energy consumption, and false success rate. The more common metrics in order of occurrence are computational cost, communication overhead, transmission delay, and packet delivery rate. Because of the use of emerging technologies to solve certain obstacles and limitations, more researchers are focusing on evaluation metrics such as computational cost and communication overhead to measure the effectiveness of their solutions.

RQ04: What methods, technologies, or tools provide the best results based on those evaluation metrics?

From the results, the authors could establish that the solutions that offer better results are the ones in which the use of emerging technologies to overcome certain limits and obstacles are present. Thus, considering metrics such as computational cost and overhead, the solutions based on Fog/Edge/Cloud computing present better results than the others. The following comparative analysis (Table 7) reinforces this assumption.

Table 7.

Comparative analysis of emerging technologies in relation to some performance metrics.

Blockchain Fog Edge Cloud Cloudlets
Computing
Latency Low Medium Low High Low
Scalibility Low High High Medium Low
Energy Consumption High Medium Low High Medium
Interoperability Low High Low High Low

From the main methods (Figure 6), there is a slight trend of using Elliptic Curve Cryptography (ECC) instead of traditional cryptography (PKC); however, the evaluation metrics present good results for both cases. In this case, it is necessary for further research to determine the best method based on the evaluation metrics. Apart from the methods, researchers have also used network and traffic simulators, map tools, security tools, programming languages, platforms, and libraries. Figure 7 presents the distribution of the tools used in the proposals. The most used map tool is Open Street. About security tools, the most common are MIRACL and Avispa. The most used programming languages are C and Python, and among libraries, OpenSSL.

Figure 6.

Figure 6

Use of methods based on the frequency of occurrence.

Figure 7.

Figure 7

Use of tools based on the frequency of occurrence.

RQ05: What are the principal challenges for mitigating vulnerabilities in VANETs?

Since vehicles with limited computing resources must interact with communication infrastructure at high speed, the great challenge in vehicular networks is to dispose of a safe and reliable communication channel and suitable device performance. When a vehicle enters the coverage of a new roadside unit, the computational overhead can lower the quality of communications and driving safety. Not all attacks in vehicular networks are protected with security mechanisms such as cryptography techniques, digital signatures, or message verification technique, and there are others as the bogus attack that requires a solution. Counting with a secure channel to transmit authentication information is still a paradigm considering that some security schemes must be applied to resource-limited and time-critical devices.

6. Conclusions and Future Work

The capacity of modern vehicles to connect to an external infrastructure makes them vulnerable to cyber-attacks. Counting with a secure channel to transmit authentication information is still a paradigm considering that some security schemes must be applied to resource-limited and time-critical devices. V2I communications offer more advantages and benefits to users than V2V communications. Hence, the reasons for studying the state-of-the-art of security in V2I communications.

In the present review, the authors found that the principal attacks to which solutions are resistant are multiple and varied. The attackers could intrude on a network to intercept and manipulate the messages using MitM, Replay, Repudiation, Eavesdropping, or Tampering; shut down a machine making it inaccessible with DoS; pretend to be someone else to access information through impersonation and Sybil attack; tricks a web browser into executing unwanted actions using Forgery; obtain the key with plaintext attacks where the attacker knows the plaintext and its corresponding encrypted ciphertext or with Exploitation of the session control mechanisms with Session Key disclosure; among others fraudulent techniques.

Diverse methods and tools are developed to mitigate these vulnerabilities. They grouped them into solutions for authentication/trust management/network communication schemes for privacy preserving, IDS and IPS models to alert and act over a security incident, and routing protocol management to protect the devices. To evaluate the effectiveness of the methods and tools used to mitigate the vulnerabilities that measure computational cost through communication overhead, transmission delay, and data delivery reliability. The authors observed that researchers must address their future work toward using emerging technologies to reduce computational overhead and save computational costs. They observed a slight trend in using ECC instead of traditional cryptography. However, it is too soon to establish if ECC will become the dominant choice in cryptography in a few years. What is certain is that the use of emerging technologies such as Fog/Edge/Cloud computing, Cloudlets, Blockchain, Software-Defined Networking, and Network Functions Virtualization has suffered a rapid expansion. In fact, the inclusion of emerging technologies in proposals has contributed to reducing the computational overhead and saving the computational costs.

After conducting a simplified review of reviews, the authors observed that the number of analyzed articles in almost all reviews is insufficient, and the lack of a search strategy is surprising. The reviews vaguely mentioned evaluation metrics and emerging technologies as possible solutions to overcome certain limitations. Concerning the methods used to build solutions, the other authors mentioned at least the most common ones. Finally, the list of threats/attacks proposed in the reviews is relatively small compared to the list in the present review.

On the other hand, the authors identified coincidences in the presentation of information on fundamentals, security requirements, threats/attacks, solutions, and challenges. However, the present review stands out because it presents, for instance, a comparative analysis of emerging technologies in relation to some performance metrics, some graphics related to the percentage of occurrence in solutions of the methods, tools, and simulators used by researchers to build solutions against vulnerabilities, and also one representing the percentage of occurrence about the types of solutions presented in the present review. Not to mention the valuable information the authors obtained from a review of review articles.

Acknowledgments

Our recognition to the Research and Social Projection Department of Escuela Politécnica Nacional.

Appendix A

Table A1.

Quality instrument.

Title Score
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks 1
A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs 1
A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs 1
A low computation message delivery and authentication VANET protocol 1
A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET 1
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs 1
A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure 0
A Strong Secure V2I Authentication Scheme from PKI and Accumulator 1
A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs 1
A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs 1
A trust infrastructure based authentication method for clustered vehicular ad hoc networks 1
An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System 1
An efficient V2I authentication scheme for VANETs 1
An Improved Secure and Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs 1
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs 1
Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks 1
CIAS: A comprehensive identity authentication scheme for providing security in VANET 1
Continuous authentication for VANET 1
Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention 1
Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs 1
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET 1
Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-Correlation and Random Inspections 1
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping 1
ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications 1
eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication 1
Enhancing Beaconing Efficiency via Grouping for Vehicular Communications 1
Formal Validation of a Security Mechanism against the RSU Compromise Attack 0
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories 1
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs 1
IFAL: Issue First Activate Later Certificates for V2X 0
Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks 1
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication 1
Low-Latency Secure Roaming in V2I Networks 1
LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network 1
LVAP: Lightweight V2I authentication protocol using group communication in VANETs 1
Machine learning approach for detecting location spoofing in VANET 0
MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles 1
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications 0
Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems 0
PLVA: privacy-preserving and lightweight V2I authentication protocol 1
Practical V2I Secure Communication Schemes for Heterogeneous VANETs 1
Privacy-preserving authentication scheme with full aggregation in VANET 1
Privacy-preserving vehicular rogue node detection scheme for fog computing 1
Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs 1
Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks 1
Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology 1
Roadside Unit Allocation for Fog-Based Information Sharing in Vehicular Networks 0
SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems 0
Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud 1
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System 1
Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets 1
Securing V2X Communications for the Future: Can PKI Systems Offer the Answer? 0
Smart Certificate Revocation List Exchange in VANET 0
Strong privacy preserving authentication scheme for unmanned cars 1
Token-based lightweight authentication scheme for vehicle to infrastructure communications 1
Track me if you can? Query based dual location privacy in VANETs for V2V and V2I 1
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs 0
Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication 1

Table A2.

Primary studies.

ID Authors Title Year Type
PS01 Yu et al. [48] A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks 2021 Conference
PS02 Ali et al. [49] A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs 2019 Journal
PS03 Moni et al. [50] A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs 2022 Conference
PS04 Ahmed et al. [51] A low computation message delivery and authentication VANET protocol 2017 Conference
PS05 Alharthi et al. [52] A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET 2021 Journal
PS06 Lai et al. [53] A Secure Blockchain-Based Group Mobility Management Scheme in VANETs 2019 Conference
PS07 Heng et al. [54] A Strong Secure V2I Authentication Scheme from PKI and Accumulator 2022 Conference
PS08 Zheng et al. [55] A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs 2019 Journal
PS09 Liu et al. [56] A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs 2018 Conference
PS10 Mirsadeghi et al. [57] A trust infrastructure based authentication method for clustered vehicular ad hoc networks 2021 Journal
PS11 Jagriti et al. [58] An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System 2021 Conference
PS12 Zhou et al. [59] An efficient V2I authentication scheme for VANETs 2018 Journal
PS13 Wang et al. [60] An Improved Secure and Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs 2020 Conference
PS14 Wang et al. [61] B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs 2020 Journal
PS15 Hathal et al. [62] Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks 2020 Journal
PS16 Malik et al. [63] CIAS: A comprehensive identity authentication scheme for providing security in VANET 2018 Journal
PS17 Palaniswamy et al. [64] Continuous authentication for VANET 2020 Journal
PS18 Islam et al. [65] Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention 2018 Journal
PS19 Tangade et al. [66] Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs 2018 Journal
PS20 Son et al. [67] Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET 2022 Journal
PS21 Sultana et al. [68] Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-Correlation and Random Inspections 2019 Conference
PS22 Jie et al. [69] Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping 2018 Journal
PS23 Ali et al. [70] ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications 2021 Journal
PS24 Han et al. [71] eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication 2021 Journal
PS25 Feng et al. [72] Enhancing Beaconing Efficiency via Grouping for Vehicular Communications 2019 Conference
PS26 Vaas et al. [73] Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories 2018 Conference
PS27 Wang et al. [74] HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs 2020 Journal
PS28 Rekik et al. [75] Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks 2017 Conference
PS29 Dharminder et al. [76] LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication 2021 Journal
PS30 Richa et al. [77] Low-Latency Secure Roaming in V2I Networks 2018 Conference
PS31 Al-Shareeda et al. [78] LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network 2020 Journal
PS32 Liu et al. [79] LVAP: Lightweight V2I authentication protocol using group communication in VANETs 2017 Journal
PS33 Limbasiya et al. [80] MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles 2021 Journal
PS34 Lv et al. [81] PLVA: privacy-preserving and lightweight V2I authentication protocol 2021 Journal
PS35 Zhou et al. [2] Practical V2I Secure Communication Schemes for Heterogeneous VANETs 2019 Journal
PS36 Zhong et al. [82] Privacy-preserving authentication scheme with full aggregation in VANET 2019 Journal
PS37 Al-Otaibi et al. [83] Privacy-preserving vehicular rogue node detection scheme for fog computing 2019 Journal
PS38 Wei et al. [84] Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs 2021 Journal
PS39 Singh et al. [85] Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks 2019 Conference
PS40 Al-Ali et al. [86] Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology 2020 Conference
PS41 Limbasiya et al. [87] Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud 2019 Conference
PS42 Jolfaei et al. [88] Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System 2019 Conference
PS43 Gupta et al. [89] Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets 2020 Conference
PS44 Jeon et al. [90] Strong privacy preserving authentication scheme for unmanned cars 2018 Conference
PS45 Hathal et al. [91] Token-based lightweight authentication scheme for vehicle to infrastructure communications 2019 Conference
PS46 Arif et al. [92] Track me if you can? Query based dual location privacy in VANETs for V2V and V2I 2018 Journal
PS47 Celes et al. [93] Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication 2018 Conference

Author Contributions

Conceptualization, P.M.; methodology, P.M. and D.T.-U.; investigation, P.M. and D.T.-U.; writing—original draft preparation, P.M.; writing—review and editing, P.M., Á.L.V.C., and M.H.-Á.; supervision, Á.L.V.C. and M.H.-Á. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Funding Statement

The publication of this research was funded by the Research and Social Projection Department of Escuela Politécnica Nacional.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Placek M. Connected Cars Worldwide-Statistics & Facts. [(accessed on 30 October 2022)]. Available online: https://www.statista.com/topics/1918/connected-cars/
  • 2.Zhou F., Li Y., Ding Y. Practical V2I Secure Communication Schemes for Heterogeneous VANETs. Appl. Sci. 2019;9:3131. doi: 10.3390/app9153131. [DOI] [Google Scholar]
  • 3.Park Y., Sur C., Rhee K.H. Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J. Ambient. Intell. Humaniz. Comput. 2016;7:661–671. doi: 10.1007/s12652-015-0309-4. [DOI] [Google Scholar]
  • 4.Abassi R. VANET security and forensics: Challenges and opportunities. Wiley Interdiscip. Rev. Forensic Sci. 2019;1:e1324. doi: 10.1002/wfs2.1324. [DOI] [Google Scholar]
  • 5.Kitchenham B. Procedures for performing systematic reviews. Keele Univ. Tech. Rep. TR/SE-0401. 2004;33:1–26. [Google Scholar]
  • 6.Kitchenham B., Brereton O.P., Budgen D., Turner M., Bailey J., Linkman S. Systematic literature reviews in software engineering—A systematic literature review. Inf. Softw. Technol. 2009;51:7–15. doi: 10.1016/j.infsof.2008.09.009. [DOI] [Google Scholar]
  • 7.Legion of the Bouncy Castle The Legion of the Bouncy Castle. [(accessed on 22 September 2022)]. Available online: https://www.bouncycastle.org/
  • 8.CISPA Helmholtz Center for Information Security The Scyther Tool. [(accessed on 22 September 2022)]. Available online: https://github.com/cascremers/scyther.
  • 9.MIRACL UK Ltd. MIRACL. [(accessed on 22 September 2022)]. Available online: https://github.com/miracl/MIRACL.
  • 10.Crypto++ Community Crypto++ [(accessed on 22 September 2022)]. Available online: https://www.cryptopp.com.
  • 11.NSNAM NS-2. [(accessed on 22 September 2022)]. Available online: http://nsnam.sourceforge.net/wiki/index.php/Main_Page.
  • 12.OMNeT OMNeT++ [(accessed on 22 September 2022)]. Available online: https://omnetpp.org.
  • 13.Eclipse Foundation SUMO. [(accessed on 22 September 2022)]. Available online: https://www.eclipse.org/sumo/
  • 14.Google GO. [(accessed on 22 September 2022)]. Available online: https://go.dev.
  • 15.Angelo De Caro and Vincenzo Iovino The Java Pairing Based Cryptography Library (JPBC) [(accessed on 22 September 2022)]. Available online: http://gas.dia.unisa.it/projects/jpbc.
  • 16.MathWorks MATLAB. [(accessed on 22 September 2022)]. Available online: https://www.mathworks.com/products/matlab.html.
  • 17.TEPLA Project TEPLA. [(accessed on 22 September 2022)]. Available online: https://github.com/TEPLA/tepla-library.
  • 18.Free Software Foundation GMP. [(accessed on 22 September 2022)]. Available online: https://gmplib.org/
  • 19.Ben Lynn PBC Library. [(accessed on 22 September 2022)]. Available online: https://crypto.stanford.edu/pbc/
  • 20.NSNAM NS-3 Network Simulator. [(accessed on 22 September 2022)]. Available online: https://www.nsnam.org.
  • 21.Basin D., Cremers C., Dreier J., Meier S., Sasse R., Schmidt B. Tamarin Prover. [(accessed on 22 September 2022)]. Available online: https://tamarin-prover.github.io.
  • 22.Python SOftware Foundation pycrypto. [(accessed on 22 September 2022)]. Available online: https://pypi.org/project/pycrypto/
  • 23.U.S. Department of Transportation Stop Sign Gap Assist (SSGA) [(accessed on 22 September 2022)]. Available online: https://local.iteris.com/cvria/html/applications/app70.html.
  • 24.Karnadi F., Mo Z., Lan K.C. MOVE: A MObility model generator for VEhicular network; Proceedings of the International Conference on Mobile Computing and Networking (MobiCom05); Cologne, Germany. 28 August–2 September 2005; p. 5. [Google Scholar]
  • 25.Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuéllar J., Drielsma P.H., Héam P.C., Kouchnarenko O., Mantovani J., et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications; Proceedings of the International Conference on Computer Aided Verification (CAV); Edinburgh, Scotland. 6–10 July 2005; pp. 281–285. [Google Scholar]
  • 26.OpenStreetMap Foundation OpenStreetMap. [(accessed on 22 September 2022)]. Available online: https://www.openstreetmap.org.
  • 27.OpenSSL Project OpenSSL. [(accessed on 22 September 2022)]. Available online: https://www.openssl.org.
  • 28.Marchetto A., Pantazopoulos P., Varádi A., Capato S., Amditis A. CVS: Design, Implementation, Validation and Implications of a Real-world V2I Prototype Testbed; Proceedings of the IEEE Conference on Vehicular Technology (VTC); Virtual. 25–28 May 2020; pp. 1–5. [Google Scholar]
  • 29.Christoph Sommer Veins. [(accessed on 22 September 2022)]. Available online: https://veins.car2x.org.
  • 30.Socket.IO Socket.IO. [(accessed on 22 September 2022)]. Available online: https://socket.io/
  • 31.The OpenJS Foundation Node.js. [(accessed on 22 September 2022)]. Available online: https://nodejs.org.
  • 32.Google Google Maps. [(accessed on 22 September 2022)]. Available online: https://www.google.com/maps.
  • 33.Bruno Blanchet and Vincent Cheval ProVerif: Cryptographic Protocol Verifier in the Formal Model. [(accessed on 22 September 2022)]. Available online: https://bblanche.gitlabpages.inria.fr/proverif/
  • 34.Amazon AWS IoT. [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/iot/
  • 35.Amazon AWS IoT Greengrass. [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/greengrass/
  • 36.AWS AWS SDK for Python (Boto3) [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/sdk-for-python/
  • 37.Islam A., Ranjan S., Rawat A.P., Maity S. A Comprehensive Survey on Attacks and Security Protocols for VANETs. Innov. Comput. Sci. Eng. 2021:583–595. [Google Scholar]
  • 38.Hamdi M.M., Audah L., Abood M.S., Rashid S.A., Mustafa A.S., Mahdi H., Al-Hiti A.S. A review on various security attacks in vehicular ad hoc networks. Bull. Electr. Eng. Informatics. 2021;10:2627–2635. doi: 10.11591/eei.v10i5.3127. [DOI] [Google Scholar]
  • 39.Sheikh M.S., Liang J., Wang W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) Sensors. 2019;19:3589. doi: 10.3390/s19163589. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40.Singh K., Sharma S. Advanced security attacks on vehicular ad hoc network (VANET) Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2019;9:3057–3064. doi: 10.35940/ijitee.B7687.129219. [DOI] [Google Scholar]
  • 41.Azam F., Kumar S., Yadav K., Priyadarshi N., Padmanaban S. An Outline of the Security Challenges in VANET; Proceedings of the IEEE UP Section Conference on Electrical Computer and Electronics (UPCON); Prayagraj, India. 27–29 November 2020; pp. 1–6. [Google Scholar]
  • 42.Kohli P., Painuly S., Matta P., Sharma S. Future Trends of Security and Privacy in Next Generation VANET; Proceedings of the International Conference on Intelligent Sustainable Systems (ICISS); Thoothukudi, India. 3–5 December 2020; pp. 1372–1375. [Google Scholar]
  • 43.Mitsakis E., Anapali I.S. Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review. Period. Polytech. Transp. Eng. 2020;48:377–383. [Google Scholar]
  • 44.Mihai S., Dokuz N., Ali M.S., Shah P., Trestian R. Security Aspects of Communications in VANETs; Proceedings of the International Conference on Communications (COMM); Bucharest, Romania. 18–20 June 2020; pp. 277–282. [Google Scholar]
  • 45.Goyal A.K., Tripathi A.K., Agarwal G. Security Attacks, Requirements and Authentication Schemes in VANET; Proceedings of the International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT); Ghaziabad, India. 27–28 September 2019; pp. 1–5. [Google Scholar]
  • 46.Pradhan N.R., Singh A.P., Verma S., Wozniak M., Shafi J., Ijaz M.F. A blockchain based lightweight peer-to-peer energy trading framework for secured high throughput micro-transactions. Sci. Rep. 2022;12:1–15. doi: 10.1038/s41598-022-18603-z. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 47.Wadhwa S., Rani S., Verma S., Shafi J., Wozniak M. Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing. Sensors. 2022;22:3733. doi: 10.3390/s22103733. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 48.Yu F., Ma M., Li X. A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks; Proceedings of the IEEE International Conference on Communications (ICC); Montreal, QC, Canada. 14–23 June 2021; pp. 1–6. [Google Scholar]
  • 49.Ali I., Gervais M., Ahene E., Li F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst. Archit. 2019;99:101636. doi: 10.1016/j.sysarc.2019.101636. [DOI] [Google Scholar]
  • 50.Moni S.S., Manivannan D. A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs; Proceedings of the Consumer Communications & Networking Conference (CCNC); Las Vegas, NV, USA. 8–11 January 2022; pp. 815–820. [Google Scholar]
  • 51.Ahmed I.Z., Mohamed T.M., Sadek R.A. A low computation message delivery and authentication VANET protocol; Proceedings of the International Conference on Computer Engineering and Systems (ICCES); Cairo, Egypt. 19–20 December 2017; pp. 204–211. [Google Scholar]
  • 52.Alharthi A., Ni Q., Jiang R. privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access. 2021;9:87299–87309. doi: 10.1109/ACCESS.2021.3086225. [DOI] [Google Scholar]
  • 53.Lai C., Ding Y. A Secure Blockchain-Based Group Mobility Management Scheme in VANETs; Proceedings of the IEEE International Conference on Communications in China (ICCC); Changchun, China. 11–13 August 2019; pp. 340–345. [Google Scholar]
  • 54.Heng X., Qin S., Xiao Y., Wang J., Tao Y., Zhang R. A Strong Secure V2I Authentication Scheme from PKI and Accumulator; Proceedings of the International Conference on Consumer Electronics and Computer Engineering (ICCECE); Guangzhou, China. 14–16 January 2022; pp. 98–103. [Google Scholar]
  • 55.Zheng D., Jing C., Guo R., Gao S., Wang L. A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access. 2019;7:117716–117726. doi: 10.1109/ACCESS.2019.2936575. [DOI] [Google Scholar]
  • 56.Liu J., Hu Q., Li C., Sun R., Du X., Guizani M. A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs; Proceedings of the IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM); Abu Dhabi, United Arab Emirates. 9–13 December 2018; pp. 1–6. [Google Scholar]
  • 57.Mirsadeghi F., Rafsanjani M.K., Gupta B.B. A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 2021;14:2537–2553. doi: 10.1007/s12083-020-01010-4. [DOI] [Google Scholar]
  • 58.Jagriti J., Lobiyal D. An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System; Proceedings of the International Conference on Computational Performance Evaluation (ComPE); Shillong, India. 1–3 December 2021; pp. 190–194. [Google Scholar]
  • 59.Zhou Y., Liu S., Xiao M., Deng S., Wang X. An Efficient V2I Authentication Scheme for VANETs. Mob. Inf. Syst. 2018;2018:4070283. doi: 10.1155/2018/4070283. [DOI] [Google Scholar]
  • 60.Wang X., Jia W., Qin H. An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs; Proceedings of the International Conference on Cyberspace Innovation of Advanced Technologies; Guangzhou, China. 4–6 December 2020; pp. 496–503. [Google Scholar]
  • 61.Wang C., Shen J., Lai J.F., Liu J. B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 2020;9:1386–1396. doi: 10.1109/TETC.2020.2978866. [DOI] [Google Scholar]
  • 62.Hathal W., Cruickshank H., Sun Z., Maple C. Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks. IEEE Trans. Veh. Technol. 2020;69:16110–16125. doi: 10.1109/TVT.2020.3042431. [DOI] [Google Scholar]
  • 63.Malik A., Pandey B. CIAS: A comprehensive identity authentication scheme for providing security in VANET. Int. J. Inf. Secur. Priv. (IJISP) 2018;12:29–41. doi: 10.4018/IJISP.2018010103. [DOI] [Google Scholar]
  • 64.Palaniswamy B., Camtepe S., Foo E., Simpson L., Baee M.A.R., Pieprzyk J. Continuous authentication for VANET. Veh. Commun. 2020;25:100255. doi: 10.1016/j.vehcom.2020.100255. [DOI] [Google Scholar]
  • 65.Islam M., Chowdhury M., Li H., Hu H. Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention. Transp. Res. Rec. 2018;2672:66–78. doi: 10.1177/0361198118799012. [DOI] [Google Scholar]
  • 66.Tangade S., Manvi S.S., Lorenz P. Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Trans. Veh. Technol. 2018;67:8647–8655. doi: 10.1109/TVT.2018.2839979. [DOI] [Google Scholar]
  • 67.Son S., Lee J., Park Y., Park Y., Das A.K. Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022 doi: 10.1109/TNSE.2022.3142287. [DOI] [Google Scholar]
  • 68.Sultana S., Altaf F., Aditia M.K., Burra M.S., Maurya C., Maity S. Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections; Proceedings of the ICDCN ’19: International Conference on Distributed Computing and Networking; Bangalore, India. 4–7 January 2019; pp. 317–326. [Google Scholar]
  • 69.Jie Y., Li M., Guo C., Chen L. Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping. IEEE Access. 2018;6:51374–51383. doi: 10.1109/ACCESS.2018.2869399. [DOI] [Google Scholar]
  • 70.Ali I., Chen Y., Pan C., Zhou A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2021;9:4435–4450. doi: 10.1109/JIOT.2021.3104010. [DOI] [Google Scholar]
  • 71.Han Y., Song W., Zhou Z., Wang H., Yuan B. eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication. IEEE Syst. J. 2021;16:1637–1648. doi: 10.1109/JSYST.2021.3116029. [DOI] [Google Scholar]
  • 72.Feng Y., Al-Shareeda S., Koksal C.E., Özgüner F. Enhancing Beaconing Efficiency via Grouping for Vehicular Communications; Proceedings of the IEEE Middle East and North Africa Communications Conference (MENACOMM); Manama, Bahrain. 19–21 November 2019; pp. 1–6. [Google Scholar]
  • 73.Vaas C., Juuti M., Asokan N., Martinovic I. Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories; Proceedings of the IEEE European Symposium on Security and Privacy (EuroS & P); London UK. 24–26 April 2018; pp. 199–213. [Google Scholar]
  • 74.Wang P., Chen C.M., Kumari S., Shojafar M., Tafazolli R., Liu Y.N. HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2020;22:5071–5080. doi: 10.1109/TITS.2020.3013928. [DOI] [Google Scholar]
  • 75.Rekik M., Meddeb-Makhlouf A., Zarai F., Obaidat M.S. Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks; Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA); Hammamet, Tunisia. 30 October–3 November 2017; pp. 1133–1140. [Google Scholar]
  • 76.Dharminder D., Mishra D. LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication. Trans. Emerg. Telecommun. Technol. 2020;31:e3810. doi: 10.1002/ett.3810. [DOI] [Google Scholar]
  • 77.Richa C.H., Fröhlich A.A. Low-Latency Secure Roaming in V2I Networks; Proceedings of the Brazilian Symposium on Computing System Engineering (SBESC); Salvador, Brazil. 6–9 November 2018; pp. 31–37. [Google Scholar]
  • 78.Al-Shareeda M.A., Anbar M., Alazzawi M.A., Manickam S., Al-Hiti A.S. LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access. 2020;8:170507–170518. doi: 10.1109/ACCESS.2020.3024587. [DOI] [Google Scholar]
  • 79.Liu Y., Guo W., Zhong Q., Yao G. LVAP: Lightweight V2I authentication protocol using group communication in VANET s. Int. J. Commun. Syst. 2017;30:e3317. doi: 10.1002/dac.3317. [DOI] [Google Scholar]
  • 80.Limbasiya T., Das D., Das S.K. MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles. IEEE/ACM Trans. Netw. 2021;29:1349–1361. doi: 10.1109/TNET.2021.3062766. [DOI] [Google Scholar]
  • 81.Lv S., Liu Y. PLVA: Privacy-Preserving and Lightweight V2I Authentication Protocol. IEEE Trans. Intell. Transp. Syst. 2021;23:6633–6639. doi: 10.1109/TITS.2021.3059638. [DOI] [Google Scholar]
  • 82.Zhong H., Han S., Cui J., Zhang J., Xu Y. Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 2019;476:211–221. doi: 10.1016/j.ins.2018.10.021. [DOI] [Google Scholar]
  • 83.Al-Otaibi B., Al-Nabhan N., Tian Y. Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing. Sensors. 2019;19:965. doi: 10.3390/s19040965. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 84.Wei L., Cui J., Zhong H., Xu Y., Liu L. Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs. IEEE Trans. Mob. Comput. 2021;21:3280–3297. doi: 10.1109/TMC.2021.3056712. [DOI] [Google Scholar]
  • 85.Singh M., Limbasiya T., Das D. Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks; Proceedings of the International Symposium on Advanced Networks and Telecommunication Systems (ANTS); Goa, India. 16–19 December 2019; pp. 1–6. [Google Scholar]
  • 86.Al-Ali M.S., Al-Mohammed H.A., Alkaeed M. Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology; Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT); Doha, Qatar. 2–5 February 2020; pp. 451–456. [Google Scholar]
  • 87.Limbasiya T., Das D., Sahay S.K. Secure communication protocol for smart transportation based on vehicular cloud; Proceedings of the UbiComp ’19: The 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing; London, UK. 9–13 September 2019; pp. 372–376. [Google Scholar]
  • 88.Jolfaei A., Kant K., Shafei H. Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System; Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Rotorua, New Zealand. 5–8 August 2019; pp. 793–798. [Google Scholar]
  • 89.Gupta M., Benson J., Patwa F., Sandhu R. Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets. IEEE Trans. Serv. Comput. 2020;15:1912–1925. doi: 10.1109/TSC.2020.3025993. [DOI] [Google Scholar]
  • 90.Jeon S., Noh J., Kim J., Cho S. Strong privacy preserving authentication scheme for unmanned cars; Proceedings of the IEEE International Conference on Consumer Electronics (ICCE); Las Vegas, NV, USA. 12–14 January 2018; pp. 1–4. [Google Scholar]
  • 91.Hathal W.S., Cruickshank H., Asuquo P., Sun Z., Bao S. Token-based lightweight authentication scheme for vehicle to infrastructure communications; Proceedings of the Living in the Internet of Things (IoT 2019), IET; London, UK. 1–2 May 2019. [Google Scholar]
  • 92.Arif M., Wang G., Peng T. Track me if you can? Query based dual location privacy in VANETs for V2V and V2I; Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); New York, NY, USA. 1–3 August 2018; pp. 1091–1096. [Google Scholar]
  • 93.Celes A.A., Elizabeth N.E. Verification based authentication scheme for bogus attacks in VANETs for secure communication; Proceedings of the International Conference on Communication and Signal Processing (ICCSP); Chennai, India. 3–5 April 2018; pp. 0388–0392. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES