Abstract
Recently, the number of vehicles equipped with wireless connections has increased considerably. The impact of that growth in areas such as telecommunications, infotainment, and automatic driving is enormous. More and more drivers want to be part of a vehicular network, despite the implications or risks that, for instance, the openness of wireless communications, its dynamic topology, and its considerable size may bring. Undoubtedly, this trend is because of the benefits the vehicular network can offer. Generally, a vehicular network has two modes of communication (V2I and V2V). The advantage of V2I over V2V is roadside units’ high computational and transmission power, which assures the functioning of early warning and driving guidance services. This paper aims to discover the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. Researchers have identified the non-resistance to attacks, the regular updating and exposure of keys, and the high dependence on certification authorities as main vulnerabilities. Thus, the authors found schemes resistant to attacks, authentication schemes, privacy protection models, and intrusion detection and prevention systems. Of the solutions for providing security analyzed in this review, the authors determined that most of them use metrics such as computational cost and communication overhead to measure their performance. Additionally, they determined that the solutions that use emerging technologies such as fog/edge/cloud computing present better results than the rest. Finally, they established that the principal challenge in V2I communication is to protect and dispose of a safe and reliable communication channel to avoid adversaries taking control of the medium.
Keywords: VANET, V2I, security, privacy, authentication, confidentiality, integrity
1. Introduction
According to Statista [1], by 2021, the number of connected vehicles worldwide will reach 237 million units, and by 2025 that number will be 400 million. The impact of those numbers in the telecommunication area is enormous. One of the implications is related to security in communications. Because of the opening of wireless communications, the dynamic topology and the big size of the network, and the use of the same credentials for registration, attackers may be able to listen, forge, manipulate, or destroy information exchanged between vehicles and roadside units affecting the proper operation and performance of the network [2,3,4].
Generally, there are two modes of communication in a vehicular network: Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V). This last one has the advantage of having roadside units (RSU) with high computational and transmission power to exchange information at high speed with vehicles. For instance, it assures the correct operation of driving guidance and early warning services. In addition to the advantages of V2I, benefits such as avoiding traffic accidents or traffic jams or accessing services on the Internet could justify why many authors have focused more on V2I communication than V2V [2,3]. In that way, it is also essential to cover some aspects of security in this type of communication.
This literature review aims to report the most current and relevant information on V2I communications security. In that way, the authors posed five research questions. The first one is related to the vulnerabilities in this type of communication and their respective countermeasures. The second concerns the methods, technologies, tools, or mechanisms used to provide security solutions to mitigate these vulnerabilities. The third and fourth ones are about the available evaluation metrics to measure the effectiveness of the solutions and thus find out which offers the best results. Finally, the last one concerns the challenges to be faced by the proposals and their possible solutions.
One of the contributions of the present review is the information that the authors provided compared to previous studies related to the same topic. The authors noted that almost all reviews focus on all communication in Vehicular Ad-hoc Network (VANET) without emphasizing V2I communication. VANET is a large overall system model comprising four approaches comprehending driver and vehicle, traffic flow, communications, and applications. The components related to data communication are V2V and V2I. The whole system is vast and complex. Therefore, this research aims to provide a systematic literature review centered on one of the components of VANET: V2I communication, to review it in more detail.
The rest of this article is organized as follows: Section 2 presents the definitions of specific attacks, evaluation metrics, and methods. Meanwhile, Section 3 presents the methodology used to elaborate on this review. Then, Section 4 shows the information used to answer the research questions, followed by Section 5, which introduces the answers to those questions and discusses the most relevant security aspects of V2I. Finally, the conclusions of this work are presented in Section 6.
2. Concepts and Definitions
Section 2.1 and Section 2.2 present the lists of the security requirements and attacks that occur in V2I communications. Section 2.3 presents a list of evaluation metrics used by the authors, and Section 2.4 the main methods used to provide solutions.
2.1. Security Requirements
Confidentiality: It guarantees that only authorized nodes can access and reveal sensitive information.
Integrity: It ensures that the information sent by the sender is the same as that received by the receiver.
Authentication: It guarantees that the node that wants to access or use network resources is who it claims to be.
Availability: It ensures that the access to network resources for authorized nodes is continuous and without interruptions.
Non-repudiation: It guarantees that neither the receiver nor the sender can deny having processed certain information.
2.2. Attacks
MitM: It occurs when an adversary secretly enters the communication of two devices to make them believe that they are communicating directly and thus exchange its public key between the devices.
Replay: It occurs when an adversary listens to the communication, intercepts it, and later fraudulently resend the obtained messages.
Modification/Tampering: It occurs when an adversary alters the message transmitted between two nodes fraudulently.
DoS: It occurs when an adversary floods the communication system with no genuine requests getting the service down.
Repudiation: It occurs when a system or application does not track nor log the user’s actions properly, permitting manipulation or forging new actions.
Session Key Disclosure: It occurs when an adversary can obtain values from memory devices (OBU or TPD) and messages from insecure communication channels. Thus, the adversary can calculate the session key using the values and messages.
Impersonation: It occurs when an adversary can take someone’s identity to gain advantages or cause damage to other nodes.
Sybil: It occurs when an adversary forges node identities to obtain privileges and thus causes chaos in normal conditions.
Forgery: It occurs when an adversary forges a valid certificate and signs a message successfully.
Bogus: It occurs when an adversary generates a fake node in a network and informs it about false traffic conditions in a particular location.
Eavesdropping: It occurs when an adversary listens to the communication channel extracting information that can be useful for node tracking activity.
Plaintext: It occurs when an adversary, who has access to the ciphertext and its plaintext, tries to guess the secret key or develops an algorithm for decrypting messages.
Key Leakage: It occurs when an adversary, who has access to the signer, can learn some sensitive information (e.g., computation-time, memory contents, and others).
Chosen Message: It occurs when an adversary, who can obtain the ciphertext of plaintext messages from the signer, tries to reveal the secret encryption key.
Ciphertext: It occurs when an adversary, who has access to a set of ciphertexts, tries to guess the plaintexts or even the key.
Beacon Transmission Denial: It occurs when an adversary suspends itself its beacon transmission for an indefinite time to avoid detection.
2.3. Evaluation Metrics
Computational Cost: It refers to the time required to apply certain operations to a message before sending it over the network.
Communication Overhead: It refers to the length of information transmitted by a successful message transference.
Transmission Delay: It refers to the time a packet takes to get to the destination from the source.
Propagation Delay: It refers to the distance between the sender and receiver divided by the light speed.
Packet Delivery Ratio: It refers to the ratio of packets successfully delivered to their destinations.
Packet Loss Ratio: It refers to the ratio between the number of lost packets and the total number of sent packets.
Accuracy: It refers to the general ratio of vehicles correctly detected.
Trust Value: It refers to the general cooperativeness of a user.
Data Receiving Rate: It refers to the rate of data successfully received.
Storage Cost: It refers to the memory size required to store the parameters in the different devices.
Roaming Latency: It refers to the time required to transfer the node control between gateways.
Cyphertext Length: It refers to the length of messages after performing encryption operations.
Energy Consumption: It refers to the energy consumed during the routing process.
Throughput: It refers to the rate of messages successfully transmitted in one second over a communication channel.
Attack Detection Ratio: It refers to the ratio between the number of attacks detected and the total number of attacks.
Average Delay: It refers to the expected time a beacon message of a node remains in a queue before being sent to the infrastructure.
False Accept Ratio: It refers to the ratio between the correct number of planned trajectories and the total number of trajectories of a node.
2.4. Methods
Elliptic Curve Cryptography (ECC): It is a public key encryption technique that generates cryptographic keys using the elliptic curve theory.
Public Key Cryptography (PKC): It is a scheme that performs encryption and decryption using public and private keys. The public key is published, and the private one is kept secret. It is known as asymmetric key cryptography.
Symmetric Key Cryptography (SKC): It is a cryptography scheme that uses the same key for encryption and decryption.
Public Key Infrastructure (PKI): It is a scheme in which the public key is associated with a certificate provided by a certificate authority instead of choosing one generated randomly.
Identity-Based Public Key Cryptography (IBPKC): It is a scheme that uses a representation of identity as the public key to avoid using public ones associated with a certificate. Instead of a certificate authority, there is a key generation center to generate the private keys based on the public ones.
Certificateless-Based Cryptography (CBC): It is a scheme that distributes the private keys of the key generation center into several entities. In this scheme, the user and the key generation center calculate the private key, but only the user can obtain the result.
3. Materials and Methods
The authors used Kitchenham’s guide [5,6] for performing systematic reviews to elaborate on this work. Thus, they considered the following phases and activities: Planning the Review-Research Questions, Conducting the Review-Search Strategy, Study Quality Assessment, and Data Extraction, and Reporting the Review-Results.
3.1. Planning the Review
The five research questions for this review are presented as follows.
RQ01. What are the principal vulnerabilities in V2I communications?
RQ02. What are the methods or tools to mitigate those vulnerabilities?
RQ03: What evaluation metrics are available to measure the effectiveness of those methods or tools?
RQ04: What methods, technologies, or tools provide the best results based on those evaluation metrics?
RQ05: What are the principal challenges for mitigating vulnerabilities in VANETs?
3.2. Conducting the Review
3.2.1. Search Strategy
The authors used the following bibliographic databases: IEEExplore, ACM Digital Library, and Semantic Scholar. From the research questions, they extracted the following keywords: VANET, V2I, privacy, authentication, confidentiality, and integrity. They developed the search strings using the keywords, the meaning of acronyms VANET and V2I, and the operators AND and OR. Table 1 presents the search strings, date filters, and the search results.
Table 1.
Search Results.
Database Search Engine | ID | Command Search | Date Filters | Search Date | Total |
---|---|---|---|---|---|
Scopus | SS01 | ((“All Metadata”:”vehicular ad hoc network” OR “All Metadata”:vanet) AND (“All Metadata”:”vehicle to infrastructure” OR “All Metadata”:v2i) AND “All Metadata”:security AND (“All Metadata”:privacy OR “All Metadata”:authentication OR “All Metadata”:confidentiality OR “All Metadata”:integrity)) | 2017–2022 | 22 June 2022 | 55 |
SS02 | ((“All Metadata”:”vehicle to infrastructure” OR “All Metadata”:v2i) AND “All Metadata”:security AND (“All Metadata”:privacy OR “All Metadata”:authentication OR “All Metadata":confidentiality OR “All Metadata”:integrity)) | 2017–2022 | 22 June 2022 | 96 | |
151 | |||||
ACM | SS03 | [[All: “vehicular ad hoc networks”] OR [All: vanet]] AND [[All: “vehicle to infrastructure”] OR [All: v2i]] AND [All: security] AND [[All: privacy] OR [All: authentication] OR [All: confidentiality] OR [All: integrity]] | [Publication Date: Past 5 years] | 22 June 2022 | 67 |
SS04 | [[All: “vehicle to infrastructure”] OR [All: v2i]] AND [All: security] AND [[All: privacy] OR [All: authentication] OR [All: confidentiality] OR [All: integrity]] | [Publication Date: Past 5 years] | 22 June 2022 | 152 | |
219 | |||||
Semantic Scholar | SS05 | vanet vehicular ad-hoc network v2i vehicle to infrastructure privacy authentication confidentiality integrity | Last 5 years | 22 June 2022 | 40 |
SS06 | v2i vehicle to infrastructure privacy authentication confidentiality integrity | Last 5 years | 22 June 2022 | 20 | |
60 |
3.2.2. Study Selection
They established some inclusion and exclusion criteria to accomplish the study selection process.
-
Inclusion Criteria
-
–
IC01. Studies that are peer-reviewed research papers.
-
–
IC02. Studies published in the last five years.
-
–
IC03. Studies published in journals and conferences.
-
–
-
Exclusion Criteria
-
–
EC01. Studies that are literature reviews, chapters in books, analysis papers, comparative papers, position papers, theses, technical reports, workshop reports, or lecture notes.
-
–
EC02. Studies published in preprint platforms.
-
–
EC03. The full text of the study is not available.
-
–
3.2.3. Quality Assessment
The authors defined one assessment question and established two possible answers for each one. The questions are presented as follows. The answer “no” is rated with 0 and “yes” with 1.
AQ01. Is the study targeted at V2I communications?
They established that the primary study is accepted only if the score is equals to 1; otherwise, it will be rejected. Table A1 presents the quality instrument and its results. As can be seen in Figure 1, 430 articles were found after performing the search. Of them, 48 duplicates were removed, for a total of 382. Then, 335 were removed because they did not meet the inclusion and exclusion criteria, for a total of 47. After that, 11 articles obtained on the snowballing technique were added, for a total of 58. Finally, 11 articles were removed because they did not fulfill the quality criterion. Thus, the selected articles reached 47. Table A2 presents the selected primary studies.
Figure 1.
The review process.
3.2.4. Data Extraction
The authors designed three data collection forms to obtain information from the selected primary studies. The following is a description of each of them. Firstly, Table 2 includes the primary study ID and the attacks to which the proposal is resistant. Whereas Table 3 contains the primary study ID, the category to which it belongs, and the methods, technologies, simulators, and other tools on which the solutions are based. Finally, Table 4 contains the primary study ID and the evaluation metrics used by the proposals. The design of those tables was based on addressing the research questions. Thus, they used Table 2 to answer RQ01, Table 3 to answer RQ02, and Table 4 to answer both RQ03 and RQ04. The generated data are presented in Section 3 and interpreted in Section 4.
Table 2.
Protection against attacks.
ID | MiTM | Replay | Modification | Tampering | DoS | Session Key Disclosure | Impersonation | Sybil | Forgery | Bogus | Eavesdropping | Plaintext | Key Leakage | Chosen Message | Ciphertext | Beacon Trans. Denial |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PS01 | √ | √ | √ | |||||||||||||
PS02 | √ | √ | √ | √ | ||||||||||||
PS03 | √ | √ | √ | √ | ||||||||||||
PS04 | √ | √ | ||||||||||||||
PS05 | √ | |||||||||||||||
PS06 | √ | √ | √ | |||||||||||||
PS07 | √ | |||||||||||||||
PS08 | √ | |||||||||||||||
PS09 * | ||||||||||||||||
PS10 | √ | √ | ||||||||||||||
PS11 | √ | √ | ||||||||||||||
PS12 | √ | |||||||||||||||
PS13 | √ | √ | √ | |||||||||||||
PS14 | √ | √ | ||||||||||||||
PS15 | √ | √ | √ | √ | ||||||||||||
PS16 * | ||||||||||||||||
PS17 | √ | √ | √ | |||||||||||||
PS18 | √ | |||||||||||||||
PS19 | √ | √ | √ | |||||||||||||
PS20 | √ | √ | √ | √ | ||||||||||||
PS21 | √ | |||||||||||||||
PS22 | √ | |||||||||||||||
PS23 | √ | √ | √ | √ | ||||||||||||
PS24 | √ | √ | √ | √ | ||||||||||||
PS25 | √ | |||||||||||||||
PS26 | √ | √ | √ | √ | ||||||||||||
PS27 | √ | |||||||||||||||
PS28 | √ | √ | ||||||||||||||
PS29 | √ | √ | √ | √ | ||||||||||||
PS30 | √ | |||||||||||||||
PS31 | √ | |||||||||||||||
PS32 | √ | |||||||||||||||
PS33 | √ | √ | √ | √ | √ | √ | ||||||||||
PS34 | √ | |||||||||||||||
PS35 | √ | √ | ||||||||||||||
PS36 | √ | |||||||||||||||
PS37 | √ | |||||||||||||||
PS38 | √ | √ | √ | |||||||||||||
PS39 | √ | √ | √ | √ | √ | √ | √ | |||||||||
PS40 | √ | √ | ||||||||||||||
PS41 | √ | √ | √ | √ | √ | √ | ||||||||||
PS42 | √ | √ | ||||||||||||||
PS43 | √ | |||||||||||||||
PS44 | √ | √ | ||||||||||||||
PS45 | √ | √ | √ | √ | √ | |||||||||||
PS46 * | ||||||||||||||||
PS47 | √ |
* Not defined. √ Defined.
Table 3.
Methods and tools.
ID | Category | Methods | Based on Technology | Simulators | Other Tools |
---|---|---|---|---|---|
PS01 | Authentication | Elliptic Curve Cryptography (ECC) | Blockchain | ✗ | Bouncy Castle [7] and Scyther Tool [8] |
PS02 | Authentication | Certificateless-Based Cryptography (CBC) | Blockchain | ✗ | MIRACL [9] |
PS03 | Authentication | Cuckoo filters | ✗ | ✗ | Crypto++ [10] |
PS04 | Authentication | Public Key Cryptography (PKC) and Symmetric Key Cryptography | ✗ | NS-2 [11] | ✗ |
PS05 | Network Security | Identity-Based PKC | Blockchain | OMNeT++ [12] and SUMO [13] | ✗ |
PS06 | Authentication | Public Key Infrastructure (PKI) and ECC | Blockchain | ✗ | ✗ |
PS07 | Authentication | PKC | Blockchain | ✗ | Crypto++ |
PS08 | Authentication | PKC and ECC | Blockchain | ✗ | Go environment [14] |
PS09 | Authentication | PKC and Certificateless-Based Cryptography | ✗ | ✗ | Java Pairing Based Cryptography (JPBC) library [15] |
PS10 | Authentication | PKC and Trust Degree Estimation | ✗ | ✗ | Matlab [16] |
PS11 | Authentication | Hash functions and XOR operations | ✗ | ✗ | ✗ |
PS12 | Authentication | ECC and Private Key Insulation | ✗ | ✗ | TEPLA [17] |
PS13 | Authentication | Certificateless-Based Cryptography and ECC | ✗ | ✗ | MIRACL |
PS14 | Authentication | PKC | Blockchain | ✗ | GMP [18] and PBC [19] libraries |
PS15 | Authentication | Certificateless-Based Cryptography | ✗ | NS-3 [20] and SUMO | ✗ |
PS16 | Authentication | PKC | ✗ | OMNeT++ and SUMO | ✗ |
PS17 | Authentication | Protocols suite | ✗ | OMNeT++ and SUMO | Tamarin [21], TEPLA [17], and Python Cryptography Tool (pycrypto) [22] |
PS18 | Intrusion Prevention System | ✗ | Edge Computing, Software, Defined Networking (SDN) and Network Functions Virtualization (NFV) | ✗ | Stop Sign Gap Assist (SSGA) [23] |
PS19 | Authentication | Identity-Based PKC and Hash Message Authentication Code (HMAC) | ✗ | NS-3 [20], SUMO, and MObility Model Generator for Vehicular Networks (MOVE) [24] | ✗ |
PS20 | Authentication | ✗ | Blockchain | NS-3, Automated Validation of Security Protocols and Applications (AVISPA) [25] | MIRACL and PBC |
PS21 | Intrusion Detection System | Auto Correlation Function (ACF) | ✗ | OMNeT++ and SUMO | ✗ |
PS22 | Network Security | Port Hopping Technique | ✗ | ✗ | ✗ |
PS23 | Authentication | PKC and Identity-Based PKC | ✗ | NS-2 | ✗ |
PS24 | Authentication | Certificateless-Based Cryptography | ✗ | ✗ | MIRACL |
PS25 | Authentication | Cooperative Group Beaconing Strategy | ✗ | ✗ | ✗ |
PS26 | Authentication | Protocol Based on Vehicles Trajectory | ✗ | ✗ | Open Street Map [26] |
PS27 | Authentication | Identity-Based PKC and Pseudonyms | ✗ | ✗ | MIRACL and PBC |
PS28 | Authentication | PKC | ✗ | ✗ | AVISPA and OpenSSL [27] |
PS29 | Authentication | Lattice-Based Cryptosystem | ✗ | ✗ | ✗ |
PS30 | Authentication | Roaming Protocol | ✗ | OMNeT++ | ✗ |
PS31 | Authentication | ECC, Identity-based PKC, and Pseudonyms | ✗ | ✗ | MIRACL |
PS32 | Authentication | Symmetric Encryption and Group Signature | ✗ | ✗ | ✗ |
PS33 | Communication Protocol | ECC and One-Way Hash Function | ✗ | ✗ | Testbed [28] |
PS34 | Authentication | BGN Homomorphic Encryption and Moore Curve Technique | ✗ | ✗ | ✗ |
PS35 | Authentication | PKI and Identity-Based Cryptosystem (IBC) | ✗ | ✗ | ✗ |
PS36 | Authentication | Certificateless Aggregate Signature and Pseudonyms | ✗ | ✗ | MIRACL |
PS37 | Authentication | Symmetric Key Encryption | Fog Computing | ✗ | ✗ |
PS38 | Authentication | Authenticated Key Agreement (AKA), ECC and Hash Functions | ✗ | OMNeT++, SUMO, and Veins [29] | MIRACL and Crypto++ |
PS39 | Authentication | Identity-Based Cryptography | ✗ | ✗ | ✗ |
PS40 | Authentication | Reputation-Based Validation | Blockchain | ✗ | Socket.io [30], Node.js [31], and Google Maps [32] |
PS41 | Authentication | Symmetric and Asymmetric Cryptography, and ECC | ✗ | ✗ | AVISPA and Proverif [33] |
PS42 | Messages exchange security | Permutation-Only Encryption | Group Formation Criteria | ✗ | ✗ |
PS43 | Messages exchange security | ✗ | Cloudlets | ✗ | AWS IoT [34], AWS Greengrass [35], and Boto [36] |
PS44 | Authentication | PKI and Message Accessing Code (MAC) Encryption | ✗ | ✗ | ✗ |
PS45 | Authentication | Authentication Tokens and Schnorr Signature | ✗ | NS-3 and SUMO | ✗ |
PS46 | Privacy Protection | Trusted Third Party (TTP) and Circle Based Dummy Generation (CBDG) | ✗ | OMNeT++, SUMO, and Veins | ✗ |
PS47 | Intrusion Detection System (IDS) | Position Verification Technique | ✗ | NS-2 | ✗ |
✗ Not defined.
Table 4.
Evaluation Metrics.
ID | Computational Cost | Communication Overhead | Transmission Delay | Propagation Delay | Packet Delivery Ratio | Packet Loss Ratio | Accuracy | Trust Value | Data Receiving Rate | Storage Cost | Storage Overhead | Roaming Latency | Cyphertext Length | Energy Consumption | Throughput | Attack Detection Rate | Average Delay | False Accept Rate | Others |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
PS01 | √ | √ | √ | √ | |||||||||||||||
PS02 | √ | √ | |||||||||||||||||
PS03 | √ | ||||||||||||||||||
PS04 | √ | ||||||||||||||||||
PS05 | √ | √ | √ | ||||||||||||||||
PS06 | √ | √ | √ | ||||||||||||||||
PS07 | √ | √ | |||||||||||||||||
PS08 | √ | √ | |||||||||||||||||
PS09 | √ | ||||||||||||||||||
PS10 | √ | √ | √ | ||||||||||||||||
PS11 | √ | ||||||||||||||||||
PS12 | √ | ||||||||||||||||||
PS13 | √ | √ | |||||||||||||||||
PS14 | √ | √ | |||||||||||||||||
PS15 | √ | √ | √ | √ | |||||||||||||||
PS16 | √ | √ | √ | ||||||||||||||||
PS17 | √ | ||||||||||||||||||
PS18 | √ | ||||||||||||||||||
PS19 | √ | √ | |||||||||||||||||
PS20 | √ | √ | |||||||||||||||||
PS21 | √ | ||||||||||||||||||
PS22 | √ | ||||||||||||||||||
PS23 | √ | √ | |||||||||||||||||
PS24 | √ | √ | √ | ||||||||||||||||
PS25 | √ | ||||||||||||||||||
PS26 | √ | ||||||||||||||||||
PS27 | √ | ||||||||||||||||||
PS28 | √ | ||||||||||||||||||
PS29 | √ | √ | √ | ||||||||||||||||
PS30 | √ | √ | |||||||||||||||||
PS31 | √ | √ | |||||||||||||||||
PS32 | √ | ||||||||||||||||||
PS33 | √ | √ | √ | √ | |||||||||||||||
PS34 | √ | ||||||||||||||||||
PS35 | √ | √ | √ | √ | |||||||||||||||
PS36 | √ | √ | |||||||||||||||||
PS37 | √ | √ | |||||||||||||||||
PS38 | √ | √ | |||||||||||||||||
PS39 | √ | √ | |||||||||||||||||
PS40 | √ | ||||||||||||||||||
PS41 * | |||||||||||||||||||
PS42 | √ | ||||||||||||||||||
PS43 | √ | ||||||||||||||||||
PS44 * | |||||||||||||||||||
PS45 | √ | ||||||||||||||||||
PS46 | √ | ||||||||||||||||||
PS47 | √ |
* Not defined. √ Defined.
3.3. Reporting the Review
Of 47 primary studies, 21 are from conferences, and 26 are from journals. The two years when more studies have been published are 2018 and 2019. Figure 2 shows the number of studies and types published by year.
Figure 2.
Primary studies published by year and type of publication.
4. Results
The authors determined that around seven of every ten solutions use a simulation as an experimental method and around one of every ten solutions as an experiment. Furthermore, they found that one of every two solutions uses network simulators, and one of every two uses both network and traffic simulators. Figure 3 presents the experimental methods and the use of simulators.
Figure 3.
Experimental methods and use of simulators based on the frequency of occurrence.
4.1. Data Collections Forms
The three data collection forms (Table 2, Table 3 and Table 4) described in the Data Extraction are presented as follows. Table 2 presents the attacks to which the proposals are resistant. Table 3 presents the methods, technologies, and tools used to provide solutions. Table 4 presents the evaluation metrics used to measure the effectiveness of the proposals.
4.2. Review of Reviews
Intending to contribute more to this topic, the authors performed a simplified review of reviews. Similarly, they used the same search strategy and partly the study selection presented in this section. Below, the authors present two data collection forms (Table 5 and Table 6) with all the information extracted from the reviews.
Table 5.
Review articles.
ID | Authors | Title | Aim | Search Strategy | Number of Studies | Year |
---|---|---|---|---|---|---|
RV01 | Islam et al. [37] | A Comprehensive Survey on Attacks and Security Protocols for VANETs | It informs about fundamentals, application areas, security services, and possible attacks in vehicular networks. | Not defined | 11 | 2021 |
RV02 | Hamdi et al. [38] | A review on various security attacks in vehicular ad hoc networks | It discusses security concerns, security services, and advances in authentication. It also describes attacks and threats. | Not defined | 13 | 2021 |
RV03 | Sheikh et al. [39] | A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) | It presents an overview of VANET that includes architecture, communication methods, standards, and characteristics. It also presents security services, security threats and attacks, simulation tools, and challenges. | Not defined | >65 | 2019 |
RV04 | Singh et al. [40] | Advanced Security Attacks on Vehicular AD HOC Network (VANET) | It presents security requirements, challenges, attacks, and privacy issues in VANET. | Not defined | Not defined | 2019 |
RV05 | Azam et al. [41] | An outline of the security challenges in VANET | It informs about security attacks and solutions. | Not defined | 6 | 2020 |
RV06 | Kohli et al. [42] | Future Trends of Security and Privacy in Next Generation VANET | It addresses security and privacy issues in next-generation VANET. It also presents solutions for those issues. | Not defined | 11 | 2020 |
RV07 | Mitsakis et al. [43] | Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review | It presents solutions to both the attacks and challenges in a VANET. | Not defined | 15 | 2020 |
RV08 | Mihai et al. [44] | Security Aspects of Communications in VANETs | It presents relevant proposals for privacy, authentication, and integrity in the context of vehicular networks. | Not defined | 12 | 2020 |
RV09 | Goyal et al. [45] | Security Attacks, Requirements, and Authentication Schemes in VANET | It provides a classification of attacks, security requirements, and authentication schemes | Not defined | 8 | 2019 |
N/A | Our review | Security in V2I Communications: A Systematic Literature Review | It informs the principal vulnerabilities and challenges in V2I communications, the tools and methods to mitigate those vulnerabilities, the evaluation metrics to measure the effectiveness of those tools and methods, and based on those metrics, the methods or tools that provide the best results. | Available | 47 | 2022 |
Table 6.
Comparative analysis among reviews.
ID | Protection against Attacks | Methods and Tools | Based on Technology | Simulators | Evaluation Metrics |
---|---|---|---|---|---|
RV01 | DoS | PKI | |||
Tampering | ECC | ||||
Sybil | IBPKC | ||||
Replay | |||||
Impersonation | |||||
RV02 | DoS | Blockchain | |||
Tampering | |||||
Impersonation | |||||
Sybil | |||||
Replay | |||||
Eavesdropping | |||||
MitM | |||||
RV03 | DoS | PKC | Cloud computing | SUMO | Computational cost |
Tampering | SKC | OMNET++ | Communication overhead | ||
MitM | IBPKC | NS-2 | |||
Eavesdropping | PKI | NS-3 | |||
Impersonation | Hash functions | Veins | |||
Replay | ECC | ||||
Sybil | |||||
RV04 | Tampering | ||||
Impersonation | |||||
Sybil | |||||
MitM | |||||
DoS | |||||
Eavesdropping | |||||
Replay | |||||
Bogus | |||||
RV05 | DoS | PKI | Blockchain | ||
Tampering | Hash functions | Fog computing | |||
Eavesdropping | |||||
Sybil | |||||
Replay | |||||
RV06 | DoS | PKI | |||
Bogus | |||||
Impersonation | |||||
Eavesdropping | |||||
RV07 | DoS | PKI | |||
Sybil | PKC | ||||
MitM | SKC | ||||
Tampering | |||||
Impersonation | |||||
Replay | |||||
RV08 | MitM | PKI | Blockchain | ||
Impersonation | IBPKC | ||||
Tampering | |||||
Eavesdropping | |||||
RV09 | Tampering | PKI | Computational cost | ||
Eavesdropping | ECC | Communication overhead | |||
SKC | Average delay | ||||
IBPKC | |||||
Our review | MitM | ECC | Blockchain | SUMO | Computational cost |
Replay | CBC | Edge computing | OMNet++ | Communication overhead | |
Modification | PKI | SDN | NS-3 | Transmission delay | |
Tampering | PKC | NFV | NS-2 | Propagation delay | |
DoS | SKC | Fog computing | Veins | Packet Delivery Ratio | |
Session Key Disclosure | IBPKC | Group Formation Criteria | SSGA | Packet Loss Ratio | |
Impersonation | Hash functions | Cloud computing | MOVE | Accuracy | |
Sybil | Pseudonyms | Trust Value | |||
Forgery | Data Receiving Rate | ||||
Bogus | Storage Cost | ||||
Eavesdropping | Storage Overhead | ||||
Plaintext | Roaming Latency | ||||
Key Leakage | Cyphertext Length | ||||
Chosen Message | Energy Consumption | ||||
Ciphertext | Throughput | ||||
Beacon Transmission Denial | Attack Detection Rate | ||||
Average Delay | |||||
False Accept Rate |
5. Discussion
The answers to the five research questions are presented as follows.
RQ01: What are the principal vulnerabilities in V2I communications?
Since wireless communications are easy to intercept, the principal vulnerability in this type of communication is the susceptibility to attacks. Thus, adversaries can compromise RSUs/vehicles and send false information to drivers putting their lives at risk. They can also send unnecessary alerts to distract them and control the communication links. Once it is done, the adversaries can easily modify session messages. Considering that fact, researchers have focused on proposing solutions that offer any attack resistance. From the results, the authors identified the attacks to which the solutions are resistant. They found the following attacks: MitM, Replay, Tampering, DoS, Repudiation, Session Key Disclosure, Impersonation, Sybil, Forgery, Eavesdropping, and Plaintext. The authors commonly offer solutions against Replay, Impersonation, MitM, Tampering, and Sybil attacks.
RQ02: What methods, technologies, or tools can mitigate those vulnerabilities?
The proposals were grouped using the following categories. The Network Communication Security category for routing protocols, communication schemes, messages exchange security, and privacy protection; the Malicious Node Detection category for intrusion detection systems, trust management schemes, and intrusion prevention systems; and the Authentication Scheme category. According to Figure 4, eight of every ten proposals are about Authentication Schemes, one is about Network Communication Security, and less than one is about Malicious Node Detection.
Figure 4.
Types of solutions based on the frequency of occurrence.
Regarding technologies, The authors observed that there are several solutions based on PKC/ECC with Blockchain. This technology is gaining attentions in various study fields. This interest must be due to its key features such as decentralization, anonymity, and immutability [46,47]. Regarding simulators, authors have used both network and traffic ones. Figure 5 presents the use of simulators in studies based on the frequency of occurrence. According to it, they use OMNeT++, NS-3, and NS-2 to a greater extent and Veins, SSGA, and MOVE to a lesser extent, and the only traffic simulator is SUMO.
Figure 5.
Use of network simulators based on the frequency of occurrence.
RQ03: What evaluation metrics are available to measure the effectiveness of those methods or tools?
Researchers have used the following evaluation metrics to measure the performance of their solutions. Metrics such as computational cost/time/overhead, communication cost/overhead, storage cost/overhead, transmission delay, propagation delay, packet delivery ratio, packet drop ratio, accuracy, trust value, data receiving rate, roaming latency, cyphertext length, energy consumption, and false success rate. The more common metrics in order of occurrence are computational cost, communication overhead, transmission delay, and packet delivery rate. Because of the use of emerging technologies to solve certain obstacles and limitations, more researchers are focusing on evaluation metrics such as computational cost and communication overhead to measure the effectiveness of their solutions.
RQ04: What methods, technologies, or tools provide the best results based on those evaluation metrics?
From the results, the authors could establish that the solutions that offer better results are the ones in which the use of emerging technologies to overcome certain limits and obstacles are present. Thus, considering metrics such as computational cost and overhead, the solutions based on Fog/Edge/Cloud computing present better results than the others. The following comparative analysis (Table 7) reinforces this assumption.
Table 7.
Comparative analysis of emerging technologies in relation to some performance metrics.
Blockchain | Fog | Edge | Cloud | Cloudlets | |
---|---|---|---|---|---|
Computing | |||||
Latency | Low | Medium | Low | High | Low |
Scalibility | Low | High | High | Medium | Low |
Energy Consumption | High | Medium | Low | High | Medium |
Interoperability | Low | High | Low | High | Low |
From the main methods (Figure 6), there is a slight trend of using Elliptic Curve Cryptography (ECC) instead of traditional cryptography (PKC); however, the evaluation metrics present good results for both cases. In this case, it is necessary for further research to determine the best method based on the evaluation metrics. Apart from the methods, researchers have also used network and traffic simulators, map tools, security tools, programming languages, platforms, and libraries. Figure 7 presents the distribution of the tools used in the proposals. The most used map tool is Open Street. About security tools, the most common are MIRACL and Avispa. The most used programming languages are C and Python, and among libraries, OpenSSL.
Figure 6.
Use of methods based on the frequency of occurrence.
Figure 7.
Use of tools based on the frequency of occurrence.
RQ05: What are the principal challenges for mitigating vulnerabilities in VANETs?
Since vehicles with limited computing resources must interact with communication infrastructure at high speed, the great challenge in vehicular networks is to dispose of a safe and reliable communication channel and suitable device performance. When a vehicle enters the coverage of a new roadside unit, the computational overhead can lower the quality of communications and driving safety. Not all attacks in vehicular networks are protected with security mechanisms such as cryptography techniques, digital signatures, or message verification technique, and there are others as the bogus attack that requires a solution. Counting with a secure channel to transmit authentication information is still a paradigm considering that some security schemes must be applied to resource-limited and time-critical devices.
6. Conclusions and Future Work
The capacity of modern vehicles to connect to an external infrastructure makes them vulnerable to cyber-attacks. Counting with a secure channel to transmit authentication information is still a paradigm considering that some security schemes must be applied to resource-limited and time-critical devices. V2I communications offer more advantages and benefits to users than V2V communications. Hence, the reasons for studying the state-of-the-art of security in V2I communications.
In the present review, the authors found that the principal attacks to which solutions are resistant are multiple and varied. The attackers could intrude on a network to intercept and manipulate the messages using MitM, Replay, Repudiation, Eavesdropping, or Tampering; shut down a machine making it inaccessible with DoS; pretend to be someone else to access information through impersonation and Sybil attack; tricks a web browser into executing unwanted actions using Forgery; obtain the key with plaintext attacks where the attacker knows the plaintext and its corresponding encrypted ciphertext or with Exploitation of the session control mechanisms with Session Key disclosure; among others fraudulent techniques.
Diverse methods and tools are developed to mitigate these vulnerabilities. They grouped them into solutions for authentication/trust management/network communication schemes for privacy preserving, IDS and IPS models to alert and act over a security incident, and routing protocol management to protect the devices. To evaluate the effectiveness of the methods and tools used to mitigate the vulnerabilities that measure computational cost through communication overhead, transmission delay, and data delivery reliability. The authors observed that researchers must address their future work toward using emerging technologies to reduce computational overhead and save computational costs. They observed a slight trend in using ECC instead of traditional cryptography. However, it is too soon to establish if ECC will become the dominant choice in cryptography in a few years. What is certain is that the use of emerging technologies such as Fog/Edge/Cloud computing, Cloudlets, Blockchain, Software-Defined Networking, and Network Functions Virtualization has suffered a rapid expansion. In fact, the inclusion of emerging technologies in proposals has contributed to reducing the computational overhead and saving the computational costs.
After conducting a simplified review of reviews, the authors observed that the number of analyzed articles in almost all reviews is insufficient, and the lack of a search strategy is surprising. The reviews vaguely mentioned evaluation metrics and emerging technologies as possible solutions to overcome certain limitations. Concerning the methods used to build solutions, the other authors mentioned at least the most common ones. Finally, the list of threats/attacks proposed in the reviews is relatively small compared to the list in the present review.
On the other hand, the authors identified coincidences in the presentation of information on fundamentals, security requirements, threats/attacks, solutions, and challenges. However, the present review stands out because it presents, for instance, a comparative analysis of emerging technologies in relation to some performance metrics, some graphics related to the percentage of occurrence in solutions of the methods, tools, and simulators used by researchers to build solutions against vulnerabilities, and also one representing the percentage of occurrence about the types of solutions presented in the present review. Not to mention the valuable information the authors obtained from a review of review articles.
Acknowledgments
Our recognition to the Research and Social Projection Department of Escuela Politécnica Nacional.
Appendix A
Table A1.
Quality instrument.
Title | Score |
---|---|
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks | 1 |
A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs | 1 |
A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs | 1 |
A low computation message delivery and authentication VANET protocol | 1 |
A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET | 1 |
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs | 1 |
A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure | 0 |
A Strong Secure V2I Authentication Scheme from PKI and Accumulator | 1 |
A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs | 1 |
A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs | 1 |
A trust infrastructure based authentication method for clustered vehicular ad hoc networks | 1 |
An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System | 1 |
An efficient V2I authentication scheme for VANETs | 1 |
An Improved Secure and Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs | 1 |
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs | 1 |
Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks | 1 |
CIAS: A comprehensive identity authentication scheme for providing security in VANET | 1 |
Continuous authentication for VANET | 1 |
Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention | 1 |
Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs | 1 |
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET | 1 |
Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-Correlation and Random Inspections | 1 |
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping | 1 |
ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications | 1 |
eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication | 1 |
Enhancing Beaconing Efficiency via Grouping for Vehicular Communications | 1 |
Formal Validation of a Security Mechanism against the RSU Compromise Attack | 0 |
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories | 1 |
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs | 1 |
IFAL: Issue First Activate Later Certificates for V2X | 0 |
Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks | 1 |
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication | 1 |
Low-Latency Secure Roaming in V2I Networks | 1 |
LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network | 1 |
LVAP: Lightweight V2I authentication protocol using group communication in VANETs | 1 |
Machine learning approach for detecting location spoofing in VANET | 0 |
MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles | 1 |
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications | 0 |
Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems | 0 |
PLVA: privacy-preserving and lightweight V2I authentication protocol | 1 |
Practical V2I Secure Communication Schemes for Heterogeneous VANETs | 1 |
Privacy-preserving authentication scheme with full aggregation in VANET | 1 |
Privacy-preserving vehicular rogue node detection scheme for fog computing | 1 |
Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs | 1 |
Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks | 1 |
Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology | 1 |
Roadside Unit Allocation for Fog-Based Information Sharing in Vehicular Networks | 0 |
SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems | 0 |
Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud | 1 |
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System | 1 |
Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets | 1 |
Securing V2X Communications for the Future: Can PKI Systems Offer the Answer? | 0 |
Smart Certificate Revocation List Exchange in VANET | 0 |
Strong privacy preserving authentication scheme for unmanned cars | 1 |
Token-based lightweight authentication scheme for vehicle to infrastructure communications | 1 |
Track me if you can? Query based dual location privacy in VANETs for V2V and V2I | 1 |
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs | 0 |
Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication | 1 |
Table A2.
Primary studies.
ID | Authors | Title | Year | Type |
---|---|---|---|---|
PS01 | Yu et al. [48] | A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks | 2021 | Conference |
PS02 | Ali et al. [49] | A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs | 2019 | Journal |
PS03 | Moni et al. [50] | A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs | 2022 | Conference |
PS04 | Ahmed et al. [51] | A low computation message delivery and authentication VANET protocol | 2017 | Conference |
PS05 | Alharthi et al. [52] | A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET | 2021 | Journal |
PS06 | Lai et al. [53] | A Secure Blockchain-Based Group Mobility Management Scheme in VANETs | 2019 | Conference |
PS07 | Heng et al. [54] | A Strong Secure V2I Authentication Scheme from PKI and Accumulator | 2022 | Conference |
PS08 | Zheng et al. [55] | A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs | 2019 | Journal |
PS09 | Liu et al. [56] | A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs | 2018 | Conference |
PS10 | Mirsadeghi et al. [57] | A trust infrastructure based authentication method for clustered vehicular ad hoc networks | 2021 | Journal |
PS11 | Jagriti et al. [58] | An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System | 2021 | Conference |
PS12 | Zhou et al. [59] | An efficient V2I authentication scheme for VANETs | 2018 | Journal |
PS13 | Wang et al. [60] | An Improved Secure and Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs | 2020 | Conference |
PS14 | Wang et al. [61] | B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs | 2020 | Journal |
PS15 | Hathal et al. [62] | Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks | 2020 | Journal |
PS16 | Malik et al. [63] | CIAS: A comprehensive identity authentication scheme for providing security in VANET | 2018 | Journal |
PS17 | Palaniswamy et al. [64] | Continuous authentication for VANET | 2020 | Journal |
PS18 | Islam et al. [65] | Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention | 2018 | Journal |
PS19 | Tangade et al. [66] | Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs | 2018 | Journal |
PS20 | Son et al. [67] | Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET | 2022 | Journal |
PS21 | Sultana et al. [68] | Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-Correlation and Random Inspections | 2019 | Conference |
PS22 | Jie et al. [69] | Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping | 2018 | Journal |
PS23 | Ali et al. [70] | ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications | 2021 | Journal |
PS24 | Han et al. [71] | eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication | 2021 | Journal |
PS25 | Feng et al. [72] | Enhancing Beaconing Efficiency via Grouping for Vehicular Communications | 2019 | Conference |
PS26 | Vaas et al. [73] | Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories | 2018 | Conference |
PS27 | Wang et al. [74] | HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs | 2020 | Journal |
PS28 | Rekik et al. [75] | Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks | 2017 | Conference |
PS29 | Dharminder et al. [76] | LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication | 2021 | Journal |
PS30 | Richa et al. [77] | Low-Latency Secure Roaming in V2I Networks | 2018 | Conference |
PS31 | Al-Shareeda et al. [78] | LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network | 2020 | Journal |
PS32 | Liu et al. [79] | LVAP: Lightweight V2I authentication protocol using group communication in VANETs | 2017 | Journal |
PS33 | Limbasiya et al. [80] | MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles | 2021 | Journal |
PS34 | Lv et al. [81] | PLVA: privacy-preserving and lightweight V2I authentication protocol | 2021 | Journal |
PS35 | Zhou et al. [2] | Practical V2I Secure Communication Schemes for Heterogeneous VANETs | 2019 | Journal |
PS36 | Zhong et al. [82] | Privacy-preserving authentication scheme with full aggregation in VANET | 2019 | Journal |
PS37 | Al-Otaibi et al. [83] | Privacy-preserving vehicular rogue node detection scheme for fog computing | 2019 | Journal |
PS38 | Wei et al. [84] | Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs | 2021 | Journal |
PS39 | Singh et al. [85] | Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks | 2019 | Conference |
PS40 | Al-Ali et al. [86] | Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology | 2020 | Conference |
PS41 | Limbasiya et al. [87] | Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud | 2019 | Conference |
PS42 | Jolfaei et al. [88] | Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System | 2019 | Conference |
PS43 | Gupta et al. [89] | Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets | 2020 | Conference |
PS44 | Jeon et al. [90] | Strong privacy preserving authentication scheme for unmanned cars | 2018 | Conference |
PS45 | Hathal et al. [91] | Token-based lightweight authentication scheme for vehicle to infrastructure communications | 2019 | Conference |
PS46 | Arif et al. [92] | Track me if you can? Query based dual location privacy in VANETs for V2V and V2I | 2018 | Journal |
PS47 | Celes et al. [93] | Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication | 2018 | Conference |
Author Contributions
Conceptualization, P.M.; methodology, P.M. and D.T.-U.; investigation, P.M. and D.T.-U.; writing—original draft preparation, P.M.; writing—review and editing, P.M., Á.L.V.C., and M.H.-Á.; supervision, Á.L.V.C. and M.H.-Á. All authors have read and agreed to the published version of the manuscript.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
Funding Statement
The publication of this research was funded by the Research and Social Projection Department of Escuela Politécnica Nacional.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Placek M. Connected Cars Worldwide-Statistics & Facts. [(accessed on 30 October 2022)]. Available online: https://www.statista.com/topics/1918/connected-cars/
- 2.Zhou F., Li Y., Ding Y. Practical V2I Secure Communication Schemes for Heterogeneous VANETs. Appl. Sci. 2019;9:3131. doi: 10.3390/app9153131. [DOI] [Google Scholar]
- 3.Park Y., Sur C., Rhee K.H. Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J. Ambient. Intell. Humaniz. Comput. 2016;7:661–671. doi: 10.1007/s12652-015-0309-4. [DOI] [Google Scholar]
- 4.Abassi R. VANET security and forensics: Challenges and opportunities. Wiley Interdiscip. Rev. Forensic Sci. 2019;1:e1324. doi: 10.1002/wfs2.1324. [DOI] [Google Scholar]
- 5.Kitchenham B. Procedures for performing systematic reviews. Keele Univ. Tech. Rep. TR/SE-0401. 2004;33:1–26. [Google Scholar]
- 6.Kitchenham B., Brereton O.P., Budgen D., Turner M., Bailey J., Linkman S. Systematic literature reviews in software engineering—A systematic literature review. Inf. Softw. Technol. 2009;51:7–15. doi: 10.1016/j.infsof.2008.09.009. [DOI] [Google Scholar]
- 7.Legion of the Bouncy Castle The Legion of the Bouncy Castle. [(accessed on 22 September 2022)]. Available online: https://www.bouncycastle.org/
- 8.CISPA Helmholtz Center for Information Security The Scyther Tool. [(accessed on 22 September 2022)]. Available online: https://github.com/cascremers/scyther.
- 9.MIRACL UK Ltd. MIRACL. [(accessed on 22 September 2022)]. Available online: https://github.com/miracl/MIRACL.
- 10.Crypto++ Community Crypto++ [(accessed on 22 September 2022)]. Available online: https://www.cryptopp.com.
- 11.NSNAM NS-2. [(accessed on 22 September 2022)]. Available online: http://nsnam.sourceforge.net/wiki/index.php/Main_Page.
- 12.OMNeT OMNeT++ [(accessed on 22 September 2022)]. Available online: https://omnetpp.org.
- 13.Eclipse Foundation SUMO. [(accessed on 22 September 2022)]. Available online: https://www.eclipse.org/sumo/
- 14.Google GO. [(accessed on 22 September 2022)]. Available online: https://go.dev.
- 15.Angelo De Caro and Vincenzo Iovino The Java Pairing Based Cryptography Library (JPBC) [(accessed on 22 September 2022)]. Available online: http://gas.dia.unisa.it/projects/jpbc.
- 16.MathWorks MATLAB. [(accessed on 22 September 2022)]. Available online: https://www.mathworks.com/products/matlab.html.
- 17.TEPLA Project TEPLA. [(accessed on 22 September 2022)]. Available online: https://github.com/TEPLA/tepla-library.
- 18.Free Software Foundation GMP. [(accessed on 22 September 2022)]. Available online: https://gmplib.org/
- 19.Ben Lynn PBC Library. [(accessed on 22 September 2022)]. Available online: https://crypto.stanford.edu/pbc/
- 20.NSNAM NS-3 Network Simulator. [(accessed on 22 September 2022)]. Available online: https://www.nsnam.org.
- 21.Basin D., Cremers C., Dreier J., Meier S., Sasse R., Schmidt B. Tamarin Prover. [(accessed on 22 September 2022)]. Available online: https://tamarin-prover.github.io.
- 22.Python SOftware Foundation pycrypto. [(accessed on 22 September 2022)]. Available online: https://pypi.org/project/pycrypto/
- 23.U.S. Department of Transportation Stop Sign Gap Assist (SSGA) [(accessed on 22 September 2022)]. Available online: https://local.iteris.com/cvria/html/applications/app70.html.
- 24.Karnadi F., Mo Z., Lan K.C. MOVE: A MObility model generator for VEhicular network; Proceedings of the International Conference on Mobile Computing and Networking (MobiCom05); Cologne, Germany. 28 August–2 September 2005; p. 5. [Google Scholar]
- 25.Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuéllar J., Drielsma P.H., Héam P.C., Kouchnarenko O., Mantovani J., et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications; Proceedings of the International Conference on Computer Aided Verification (CAV); Edinburgh, Scotland. 6–10 July 2005; pp. 281–285. [Google Scholar]
- 26.OpenStreetMap Foundation OpenStreetMap. [(accessed on 22 September 2022)]. Available online: https://www.openstreetmap.org.
- 27.OpenSSL Project OpenSSL. [(accessed on 22 September 2022)]. Available online: https://www.openssl.org.
- 28.Marchetto A., Pantazopoulos P., Varádi A., Capato S., Amditis A. CVS: Design, Implementation, Validation and Implications of a Real-world V2I Prototype Testbed; Proceedings of the IEEE Conference on Vehicular Technology (VTC); Virtual. 25–28 May 2020; pp. 1–5. [Google Scholar]
- 29.Christoph Sommer Veins. [(accessed on 22 September 2022)]. Available online: https://veins.car2x.org.
- 30.Socket.IO Socket.IO. [(accessed on 22 September 2022)]. Available online: https://socket.io/
- 31.The OpenJS Foundation Node.js. [(accessed on 22 September 2022)]. Available online: https://nodejs.org.
- 32.Google Google Maps. [(accessed on 22 September 2022)]. Available online: https://www.google.com/maps.
- 33.Bruno Blanchet and Vincent Cheval ProVerif: Cryptographic Protocol Verifier in the Formal Model. [(accessed on 22 September 2022)]. Available online: https://bblanche.gitlabpages.inria.fr/proverif/
- 34.Amazon AWS IoT. [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/iot/
- 35.Amazon AWS IoT Greengrass. [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/greengrass/
- 36.AWS AWS SDK for Python (Boto3) [(accessed on 22 September 2022)]. Available online: https://aws.amazon.com/sdk-for-python/
- 37.Islam A., Ranjan S., Rawat A.P., Maity S. A Comprehensive Survey on Attacks and Security Protocols for VANETs. Innov. Comput. Sci. Eng. 2021:583–595. [Google Scholar]
- 38.Hamdi M.M., Audah L., Abood M.S., Rashid S.A., Mustafa A.S., Mahdi H., Al-Hiti A.S. A review on various security attacks in vehicular ad hoc networks. Bull. Electr. Eng. Informatics. 2021;10:2627–2635. doi: 10.11591/eei.v10i5.3127. [DOI] [Google Scholar]
- 39.Sheikh M.S., Liang J., Wang W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs) Sensors. 2019;19:3589. doi: 10.3390/s19163589. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 40.Singh K., Sharma S. Advanced security attacks on vehicular ad hoc network (VANET) Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2019;9:3057–3064. doi: 10.35940/ijitee.B7687.129219. [DOI] [Google Scholar]
- 41.Azam F., Kumar S., Yadav K., Priyadarshi N., Padmanaban S. An Outline of the Security Challenges in VANET; Proceedings of the IEEE UP Section Conference on Electrical Computer and Electronics (UPCON); Prayagraj, India. 27–29 November 2020; pp. 1–6. [Google Scholar]
- 42.Kohli P., Painuly S., Matta P., Sharma S. Future Trends of Security and Privacy in Next Generation VANET; Proceedings of the International Conference on Intelligent Sustainable Systems (ICISS); Thoothukudi, India. 3–5 December 2020; pp. 1372–1375. [Google Scholar]
- 43.Mitsakis E., Anapali I.S. Recent Developments on Security and Privacy of V2V & V2I Communications: A Literature Review. Period. Polytech. Transp. Eng. 2020;48:377–383. [Google Scholar]
- 44.Mihai S., Dokuz N., Ali M.S., Shah P., Trestian R. Security Aspects of Communications in VANETs; Proceedings of the International Conference on Communications (COMM); Bucharest, Romania. 18–20 June 2020; pp. 277–282. [Google Scholar]
- 45.Goyal A.K., Tripathi A.K., Agarwal G. Security Attacks, Requirements and Authentication Schemes in VANET; Proceedings of the International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT); Ghaziabad, India. 27–28 September 2019; pp. 1–5. [Google Scholar]
- 46.Pradhan N.R., Singh A.P., Verma S., Wozniak M., Shafi J., Ijaz M.F. A blockchain based lightweight peer-to-peer energy trading framework for secured high throughput micro-transactions. Sci. Rep. 2022;12:1–15. doi: 10.1038/s41598-022-18603-z. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 47.Wadhwa S., Rani S., Verma S., Shafi J., Wozniak M. Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing. Sensors. 2022;22:3733. doi: 10.3390/s22103733. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 48.Yu F., Ma M., Li X. A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks; Proceedings of the IEEE International Conference on Communications (ICC); Montreal, QC, Canada. 14–23 June 2021; pp. 1–6. [Google Scholar]
- 49.Ali I., Gervais M., Ahene E., Li F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst. Archit. 2019;99:101636. doi: 10.1016/j.sysarc.2019.101636. [DOI] [Google Scholar]
- 50.Moni S.S., Manivannan D. A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs; Proceedings of the Consumer Communications & Networking Conference (CCNC); Las Vegas, NV, USA. 8–11 January 2022; pp. 815–820. [Google Scholar]
- 51.Ahmed I.Z., Mohamed T.M., Sadek R.A. A low computation message delivery and authentication VANET protocol; Proceedings of the International Conference on Computer Engineering and Systems (ICCES); Cairo, Egypt. 19–20 December 2017; pp. 204–211. [Google Scholar]
- 52.Alharthi A., Ni Q., Jiang R. privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access. 2021;9:87299–87309. doi: 10.1109/ACCESS.2021.3086225. [DOI] [Google Scholar]
- 53.Lai C., Ding Y. A Secure Blockchain-Based Group Mobility Management Scheme in VANETs; Proceedings of the IEEE International Conference on Communications in China (ICCC); Changchun, China. 11–13 August 2019; pp. 340–345. [Google Scholar]
- 54.Heng X., Qin S., Xiao Y., Wang J., Tao Y., Zhang R. A Strong Secure V2I Authentication Scheme from PKI and Accumulator; Proceedings of the International Conference on Consumer Electronics and Computer Engineering (ICCECE); Guangzhou, China. 14–16 January 2022; pp. 98–103. [Google Scholar]
- 55.Zheng D., Jing C., Guo R., Gao S., Wang L. A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access. 2019;7:117716–117726. doi: 10.1109/ACCESS.2019.2936575. [DOI] [Google Scholar]
- 56.Liu J., Hu Q., Li C., Sun R., Du X., Guizani M. A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs; Proceedings of the IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM); Abu Dhabi, United Arab Emirates. 9–13 December 2018; pp. 1–6. [Google Scholar]
- 57.Mirsadeghi F., Rafsanjani M.K., Gupta B.B. A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 2021;14:2537–2553. doi: 10.1007/s12083-020-01010-4. [DOI] [Google Scholar]
- 58.Jagriti J., Lobiyal D. An Efficient and Anonymous Authentication Key Agreement Protocol for Smart Transportation System; Proceedings of the International Conference on Computational Performance Evaluation (ComPE); Shillong, India. 1–3 December 2021; pp. 190–194. [Google Scholar]
- 59.Zhou Y., Liu S., Xiao M., Deng S., Wang X. An Efficient V2I Authentication Scheme for VANETs. Mob. Inf. Syst. 2018;2018:4070283. doi: 10.1155/2018/4070283. [DOI] [Google Scholar]
- 60.Wang X., Jia W., Qin H. An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs; Proceedings of the International Conference on Cyberspace Innovation of Advanced Technologies; Guangzhou, China. 4–6 December 2020; pp. 496–503. [Google Scholar]
- 61.Wang C., Shen J., Lai J.F., Liu J. B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 2020;9:1386–1396. doi: 10.1109/TETC.2020.2978866. [DOI] [Google Scholar]
- 62.Hathal W., Cruickshank H., Sun Z., Maple C. Certificateless and Lightweight Authentication Scheme for Vehicular Communication Networks. IEEE Trans. Veh. Technol. 2020;69:16110–16125. doi: 10.1109/TVT.2020.3042431. [DOI] [Google Scholar]
- 63.Malik A., Pandey B. CIAS: A comprehensive identity authentication scheme for providing security in VANET. Int. J. Inf. Secur. Priv. (IJISP) 2018;12:29–41. doi: 10.4018/IJISP.2018010103. [DOI] [Google Scholar]
- 64.Palaniswamy B., Camtepe S., Foo E., Simpson L., Baee M.A.R., Pieprzyk J. Continuous authentication for VANET. Veh. Commun. 2020;25:100255. doi: 10.1016/j.vehcom.2020.100255. [DOI] [Google Scholar]
- 65.Islam M., Chowdhury M., Li H., Hu H. Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention. Transp. Res. Rec. 2018;2672:66–78. doi: 10.1177/0361198118799012. [DOI] [Google Scholar]
- 66.Tangade S., Manvi S.S., Lorenz P. Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Trans. Veh. Technol. 2018;67:8647–8655. doi: 10.1109/TVT.2018.2839979. [DOI] [Google Scholar]
- 67.Son S., Lee J., Park Y., Park Y., Das A.K. Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022 doi: 10.1109/TNSE.2022.3142287. [DOI] [Google Scholar]
- 68.Sultana S., Altaf F., Aditia M.K., Burra M.S., Maurya C., Maity S. Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections; Proceedings of the ICDCN ’19: International Conference on Distributed Computing and Networking; Bangalore, India. 4–7 January 2019; pp. 317–326. [Google Scholar]
- 69.Jie Y., Li M., Guo C., Chen L. Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping. IEEE Access. 2018;6:51374–51383. doi: 10.1109/ACCESS.2018.2869399. [DOI] [Google Scholar]
- 70.Ali I., Chen Y., Pan C., Zhou A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2021;9:4435–4450. doi: 10.1109/JIOT.2021.3104010. [DOI] [Google Scholar]
- 71.Han Y., Song W., Zhou Z., Wang H., Yuan B. eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication. IEEE Syst. J. 2021;16:1637–1648. doi: 10.1109/JSYST.2021.3116029. [DOI] [Google Scholar]
- 72.Feng Y., Al-Shareeda S., Koksal C.E., Özgüner F. Enhancing Beaconing Efficiency via Grouping for Vehicular Communications; Proceedings of the IEEE Middle East and North Africa Communications Conference (MENACOMM); Manama, Bahrain. 19–21 November 2019; pp. 1–6. [Google Scholar]
- 73.Vaas C., Juuti M., Asokan N., Martinovic I. Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories; Proceedings of the IEEE European Symposium on Security and Privacy (EuroS & P); London UK. 24–26 April 2018; pp. 199–213. [Google Scholar]
- 74.Wang P., Chen C.M., Kumari S., Shojafar M., Tafazolli R., Liu Y.N. HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2020;22:5071–5080. doi: 10.1109/TITS.2020.3013928. [DOI] [Google Scholar]
- 75.Rekik M., Meddeb-Makhlouf A., Zarai F., Obaidat M.S. Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks; Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA); Hammamet, Tunisia. 30 October–3 November 2017; pp. 1133–1140. [Google Scholar]
- 76.Dharminder D., Mishra D. LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication. Trans. Emerg. Telecommun. Technol. 2020;31:e3810. doi: 10.1002/ett.3810. [DOI] [Google Scholar]
- 77.Richa C.H., Fröhlich A.A. Low-Latency Secure Roaming in V2I Networks; Proceedings of the Brazilian Symposium on Computing System Engineering (SBESC); Salvador, Brazil. 6–9 November 2018; pp. 31–37. [Google Scholar]
- 78.Al-Shareeda M.A., Anbar M., Alazzawi M.A., Manickam S., Al-Hiti A.S. LSWBVM: A lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access. 2020;8:170507–170518. doi: 10.1109/ACCESS.2020.3024587. [DOI] [Google Scholar]
- 79.Liu Y., Guo W., Zhong Q., Yao G. LVAP: Lightweight V2I authentication protocol using group communication in VANET s. Int. J. Commun. Syst. 2017;30:e3317. doi: 10.1002/dac.3317. [DOI] [Google Scholar]
- 80.Limbasiya T., Das D., Das S.K. MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles. IEEE/ACM Trans. Netw. 2021;29:1349–1361. doi: 10.1109/TNET.2021.3062766. [DOI] [Google Scholar]
- 81.Lv S., Liu Y. PLVA: Privacy-Preserving and Lightweight V2I Authentication Protocol. IEEE Trans. Intell. Transp. Syst. 2021;23:6633–6639. doi: 10.1109/TITS.2021.3059638. [DOI] [Google Scholar]
- 82.Zhong H., Han S., Cui J., Zhang J., Xu Y. Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 2019;476:211–221. doi: 10.1016/j.ins.2018.10.021. [DOI] [Google Scholar]
- 83.Al-Otaibi B., Al-Nabhan N., Tian Y. Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing. Sensors. 2019;19:965. doi: 10.3390/s19040965. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 84.Wei L., Cui J., Zhong H., Xu Y., Liu L. Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs. IEEE Trans. Mob. Comput. 2021;21:3280–3297. doi: 10.1109/TMC.2021.3056712. [DOI] [Google Scholar]
- 85.Singh M., Limbasiya T., Das D. Pseudo-identity Based Secure Communication Scheme for Vehicular Ad-hoc Networks; Proceedings of the International Symposium on Advanced Networks and Telecommunication Systems (ANTS); Goa, India. 16–19 December 2019; pp. 1–6. [Google Scholar]
- 86.Al-Ali M.S., Al-Mohammed H.A., Alkaeed M. Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain Technology; Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT); Doha, Qatar. 2–5 February 2020; pp. 451–456. [Google Scholar]
- 87.Limbasiya T., Das D., Sahay S.K. Secure communication protocol for smart transportation based on vehicular cloud; Proceedings of the UbiComp ’19: The 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing; London, UK. 9–13 September 2019; pp. 372–376. [Google Scholar]
- 88.Jolfaei A., Kant K., Shafei H. Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System; Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Rotorua, New Zealand. 5–8 August 2019; pp. 793–798. [Google Scholar]
- 89.Gupta M., Benson J., Patwa F., Sandhu R. Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets. IEEE Trans. Serv. Comput. 2020;15:1912–1925. doi: 10.1109/TSC.2020.3025993. [DOI] [Google Scholar]
- 90.Jeon S., Noh J., Kim J., Cho S. Strong privacy preserving authentication scheme for unmanned cars; Proceedings of the IEEE International Conference on Consumer Electronics (ICCE); Las Vegas, NV, USA. 12–14 January 2018; pp. 1–4. [Google Scholar]
- 91.Hathal W.S., Cruickshank H., Asuquo P., Sun Z., Bao S. Token-based lightweight authentication scheme for vehicle to infrastructure communications; Proceedings of the Living in the Internet of Things (IoT 2019), IET; London, UK. 1–2 May 2019. [Google Scholar]
- 92.Arif M., Wang G., Peng T. Track me if you can? Query based dual location privacy in VANETs for V2V and V2I; Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); New York, NY, USA. 1–3 August 2018; pp. 1091–1096. [Google Scholar]
- 93.Celes A.A., Elizabeth N.E. Verification based authentication scheme for bogus attacks in VANETs for secure communication; Proceedings of the International Conference on Communication and Signal Processing (ICCSP); Chennai, India. 3–5 April 2018; pp. 0388–0392. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.