Have a personal or library account? Click to login
State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks Cover

State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks

Open Access
|Aug 2024

Figures & Tables

Figure 1.

Intelligent transportation system structure
Intelligent transportation system structure

Survey of the Trust Establishment Approach

Ref. No.DescriptionAlgorithmPerformance/Limitations
[36]It is working as middle layer to build trust between two nodesSAT architecture (Situation Dari Awareness Trust)Performance: Controlled policy and Trust enhancement network
[37]Uses watchdog algorithm for intrusion detectionIntrusion detection using Watchdog algorithmIncreased Latency in area coverage, False negative & false positive
[38]Dynamic Trust Token provides trust on Real Time basisDynamic Trust TokenDegrade latency and Integrity
[39]ECDSA- used for authentication and verification of data transferProxy Signature-based on IDDepends on Message transfer through trusted RSU
[40]Prevents internal attacks by quickly transfer opinion about messagesRABTM (Beacon based trust system using RSU)Compromise to Location privacy of vehicles
[41]Identification of malevolent and self-centered nodes which node broadcast bogus information.TRIPTry to identify fraud node vehicle which dispersal wrong information
[42]Uses generation and piggybacking opinion about node reputationVSRP algorithmIt do Event Modification, false event generation, data aggregation and data

Communication ranges of Vehicle to Everything

V2X connection linkCommunication range
V2S10 − 100 m
V2P170 m (lower transmission power = 12 dBm) [5]
V2G350 m (transmission power = 23 dBm) [6]
V2V350 m (transmission power = 23 dBm) [6]
V2I2000 m [7]

Survey Summaries of Existing Studies on Error Recovery Techniques for Vehicular Networks

Ref. No.Traffic AreaType of AlgorithmPerformance Parameters
[1]Urban-Varying densities of VehiclesSafety message disseminationReception Failure Channel Probability
[2]Highway-Varying densities of VehiclesWarning/Periodic messages for Safety-BroadcastCollision, Latency, Reception Rate
[3]Highway-Varying densities of VehiclesReal-time transfer of Safety messageRate of Packet Receiving
[4]Highway / Urban-Varying densities of VehiclesWarning/Periodic messages for Safety-BroadcastDelay, Probability of Successful Delivery
[5]HighwayPeriodic messages for Safety-BroadcastDelay, Rate of collision, Data Reception rate
[6]Highway Varying densities of VehiclesSafety message-BroadcastAverage delay rate, Successful delivery Probability
[7]HighwaySafety and Reliable messageProbability of frame failure
[8]HighwaySafety-critical message-ReliablePDR, Throughput

Algorithms for present security attacks

Ref. No.Paper overviewSecurity dimensionsLimitations of used technology
[9]“Gives an overview of various attacks”Replay attacks, DOS, Routing attacks, fake information attacks.Privacy problem
[10]“Overview of security issues in vehicular ad-hoc networks”Eavesdropping, Tracking of Location, ID revealing, attribute-based DOS attackNot addressed privacy problems
[11]“Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET”.Fake attackGives a solution for Fake attacks only.
[15]“Security Analysis of Vehicular Ad-Hoc Network (VANETs)”Replay attack, DoS attack Fabrication attack, alteration attack, replay attack, messageNo solution for other attacks
[16]“Security challenges, Issues and their solutions on VANETs”
  • Replay Attack, DoS, Attack in Routing, Masquerade attack

  • DOS

  • Node Impersonate

No solution for confidentiality.
[51]“signature-based authentication” in VANETs”DOSNot so effective
[19]“Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks”Node ImpersonateNo solution for other attacks
[20]“Outlier detection in ad hoc networks using dempster-shafer theory”Node ImpersonateNo solution for other attacks
[12]“Detection and localization of Sybil nodes in VANETs”Sybil AttackNo solution for other attacks
[13]“P2DAP Sybil attacks detection in vehicular ad hoc networks”Sybil Attack, Sending false info, ID DisclosureNo solution for other attacks
[14]“Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks”Sybil Attack, Sending false info, ID DisclosureNo solution for other attacks
[18]“Anovelsecure communication scheme in vehicular ad hoc networks”Sending false info, ID DisclosureNo solution for other attacks
[21]“A group signature based secure and privacy-preserving vehicular communication framework”Sending false info, ID DisclosureNo solution for other attacks
[6]“Defence against Sybil attack in vehicular ad-hoc network - based on roadside units support”Sybil AttackNo solution for other attacks
[22]“Privacy Technique”Node Impersonate, Sending false infoNo solution for other attacks
[23]“Distributed misbehavior detection in VANETs”Sending false infoNo solution for other attacks
[25]DoS Detection algorithmIt records the information of the vehicle for any unusual behaviorTime-Consuming
[26]DoS detection algorithm Using Malicious and Irrelevant Packet Detection AlgorithmCalculate the time of packet generation and detect malicious nodesComputing the vehicle position in RSU takes maximum time
[27]Mitigating the effect of DoS Attack in VANETs using Multiple Malicious Nodes detection techniqueTo detect the multiple malicious node in the network by entropy and bandwidthLess detection rate of malicious node.
[28]Greedy Behavior Attack Detection AlgorithmIt analyses network traffic by greedy nodes behaviourThe false positive rate is maximum in case of increased greedy nodes
[29]Dempster Shafer Theory based Denial of Services Attack detectionPrepare trace file for self-organized map (based in machine learning)Detection of misbehavior rate is low
[30]Extenuation of DoS attack in VANETsIt detects fraud nodes by matching signature based authentication schemeMethod will not work in case if False information sent by attacker
[31]Denial of Service (DoS) attacks detection in VANETIt uses Bloom filter to detect malevolent vehicleThis method is not suitable for high traffic environment.
[32]Port hopping based Dynamic Defence Strategy for VANETIt manages vulnerable service port number for V2V and V2I communicationIt fails to handle the issue of hopping frequency
[33]Detection and Extenuation of DDoS Attack in VANETThis technique isolates fraud node from other victim nodesHigh bandwidth consumption and difficult to manage the control packet
[34]Multivariant approach to mitigate DDoS attacksUsing payload tracing and frequency assessment track and detect the malicious nodesIt reduces the packet latency but not guaranteed
[35]Machine Learning Techniques to Detect DDoS Attacks on VANET System: A SurveyUsing SVM it analyses the misbehavior nodeThe false positive rate is maximum
DOI: https://doi.org/10.2478/ias-2024-0001 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 1 - 14
Published on: Aug 31, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2024 Wajid Ali, Shalini Z. Ninoria, Gulista Khan, Kamal Kumar Gola, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.