A Survey: Engineering Challenges to Implement VANET Security

被引:0
|
作者
Onishi, Hirofumi [1 ]
机构
[1] Alpine Elect Res Amer Inc, Torrance, CA 90501 USA
关键词
VANET(Vehicle Ad-hoc Network); V2V(Vehicle-to-vehicle) communication; CA(Certification Authority); certificate; DLT(Distributed Ledger Technologies); Blockchain; consensus process;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
VANET (Vehicle Ad-hoc Network, i.e., V2V (Vehicle-to-Vehicle) communication) with short communication latency and not needing an infrastructure could play important roles in future road safety, to implement crash warning applications. VANET could be useful for awareness of vehicles in drivers' blind spots in situations that cannot be detected by cameras or radars. However, VANET has additional security difficulties to detect and exclude vehicles that are malicious nodes from the network, besides wireless communication's inherent security vulnerabilities, such as jamming, eavesdropping, and tampering, because nodes are communicating with each other directly and not through a base station or a server. On the other hand, DLT (Distributed Ledger Technologies) typified by blockchain is planned to take important roles even in the auto industry, for example, to record/control the information of a huge number of components or maintenance/inspection histories. However, these technologies still have technical limitations to cover time sensitive safety-related applications provided by VANET. Hence, this report first introduces VANET and its security risks, then addresses blockchain's opportunities in the automotive industry. Finally, this report concludes by discussing technical challenges on blockchain to be applied for VANET, for example, the consensus process to create a new block and 51% issue.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] eHealth Cloud Security Challenges: A Survey
    Al-Issa, Yazan
    Ottom, Mohammad Ashraf
    Tamrawi, Ahmed
    JOURNAL OF HEALTHCARE ENGINEERING, 2019, 2019
  • [22] A survey of DeFi security: Challenges and opportunities
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Peng, Hongli
    Niu, Yuanzheng
    Zhang, Yuqing
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10378 - 10404
  • [23] Smart Grid Security: Survey and Challenges
    Lieskovan, Tomas
    Hajny, Jan
    Cika, Petr
    2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2019,
  • [24] A Survey of Security Challenges in Cloud Computing
    El Moctar, Cheikh Brahim Ould Mohamed
    Konate, Karim
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 843 - 849
  • [25] Survey on Security Challenges for Swarm Robotics
    Higgins, Fiona
    Tomlinson, Allan
    Martin, Keith M.
    ICAS: 2009 FIFTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS, 2009, : 307 - 312
  • [26] Survey of Security Challenges in Grid Environment
    Malik, Usman Ahmad
    Hussain, Mureed
    Hafeez, Mehnaz
    Asghar, Sajjad
    DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 741 - +
  • [27] Cloud security issues and challenges: A survey
    Singh, Ashish
    Chatterjee, Kakali
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 : 88 - 115
  • [28] A Survey on Cloud Security Issues and Challenges
    Popli, Madhvi
    Gagandeep
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 230 - 235
  • [29] Security challenges in Internet of Things: survey
    Ghorbani, H. Reza
    Ahmadzadegan, M. Hossein
    2017 IEEE CONFERENCE ON WIRELESS SENSORS (ICWISE), 2017, : 6 - 11
  • [30] Survey and analysis on Security Requirements Engineering
    Salini, P.
    Kanmani, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (06) : 1785 - 1797