skip to main content
10.1145/3136825.3136890acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Network security architectures for VANET

Published: 13 October 2017 Publication History

Abstract

In recent years, cyber security oriented research is paying much close attention on Vehicular Adhoc NETworks (VANETs). However, existing vehicular networks do not meet current security requirements. Typically for dynamic networks, maximal decentralization and rapidly changing topology of moving hosts form a number of security issues associated with ensuring access control of hosts, security policy enforcement, and resistance of the routing methods. To solve these problems generally, the paper reviews SDN (software defined networks) based network security architectures of VANET. The following tasks are solved in our work: composing of network security architectures for SDN-VANET (architecture with the central control and shared security servers, decentralized (zoned) architecture, hierarchical architecture); implementation of these architectures in virtual modeling environment; and experimental study of effectiveness of the suggested architectures. With large-scale vehicular networks, architectures with multiple SDN controllers are most effective. In small networks, the architecture with the central control also significantly outperforms the traditional VANET architecture. For the suggested architectures, three control modes are discussed in the paper: central, distributed and hybrid modes. Unlike common architectures, all of the proposed security architectures allow us to establish a security policy in m2m-networks and increase resistance capabilities of self-organizing networks.

References

[1]
Sergio Marti, Kevin Lai, and Mary Baker. 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of the 6th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking, 255--265.
[2]
Mario Gerla, Eun-Kyu Lee, Giovanni Pau, and Uichin Lee. 2014. Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. IEEE World Forum on Internet of Things (WF-IoT), 241--246.
[3]
United States Government Accountability Office Report to Congressional Requesters. 2016. Vehicle Cybersecurity. 1--3.
[4]
Alexander Minin, and Maxim Kalinin. 2015. Information security in computer networks with dynamic topology. In Proceedings of 8th International Conference on Security of Information and Networks, ACM, 127--130.
[5]
Vinh Hoa and Ana Cavalli. 2014. Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey. International Journal on Ad, Hoc Networking Systems (IJANS), 4, 2 (2014), 1--20.
[6]
Bassem Mokhtar and Mohamed Azab. 2015. Survey on Security Issues in Vehicular Ad Hoc Networks. Alexandria Engineering Journal, 41 (2015), 1115--1126.
[7]
Charles Harsch, Andreas Festag, and Panos Papadimitratos. 2007. Secure position-based routing for VANETs. In Proceedings of IEEE 66th vehicular technology conference (VTC-2007), 26--30.
[8]
Maxim Kalinin, Peter Zegzhda, Dmitry Zegzhda, Yuri Vasiliev, and Viacheslav Belenko. 2016. Software Defined Security for Vehicular Ad Hoc Networks. In Proceedings of 7th International Conference on Information and Communication Technology Convergence (ICTC2016), 533--537.
[9]
Peter Dely, Andreas Kassler, and Nico Bayer. 2011. Openflow for wireless mesh networks. In Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), 1--6.
[10]
OpenStack. 2017. Open source software for creating private and public clouds. Retrieved June 2, 2017 from https://www.openstack.org/.
[11]
Ian Ku, You Lu, Mario Gerla, Francesco Ongaro, Rafael L. Gomes, and Eduardo Cerqueira. 2014. Towards Software-Defined VANET: Architectures and Services. Med-Hoc-Net 2014, Slovenia.
[12]
Nguyen B. Truong, Gyu Myoung Lee, and Yacine Ghamri-Doudane. 2015. Software defined networking-based vehicular adhoc network with fog computing. IEEE/IFIP International Workshop on Management of the Future Internet (ManFI2015), 1202--1207.
[13]
Nick McKeown. 2009. Software-defined networking. INFOCOM keynote talk, Apr, 2009.
[14]
Hyojoon Kim and Nick Feamster. 2013. Improving Network Management with Software Defined Networking. IEEE Communications Magazine, 2013.
[15]
Carlos J. Bernardos, Antonio De La Oliva, and Pablo Serrano. 2014. An architecture for software defined wireless networking. IEEE Wireless Communications Magazine, Jun. 2014.
[16]
Jonathan Vestin, Peter Dely, Andreas Kassler, and Nico Bayer. 2013. CloudMAC: towards software defined WLANs. ACM SIGMOBILE Mobile Computing and Communications Review, 16, 4 (2013), 42--45.
[17]
Marc Mendonca, Katia Obraczka, and Thierry Turletti. 2012. The Case for Software-Defined Networking in Heterogeneous Networked Environments. ACM converence on CoNEXT student workshop, 2012.
[18]
Diego Kreutz, Fernando M. V. Ramos, and Paulo Verissimo. 2013. Towards secure and dependable software-defined networks. HotSDN 2013, 55--60.
[19]
Flavio Bonomi. The Smart and Connected Vehicle and the Internet of Things. 2013. Invited Talk, Workshop on Synchronization in Telecommunication Systems.
[20]
NS-3. 2017. Open source network simulator. Retrieved June 2, 2017 from https://www.nsnam.org.
[21]
SUMO. 2017. Simulation of Urban Mobility. Retrieved June 2, 2017 from http://sumo-sim.org.
[22]
Mininet-WiFi. 2017. Emulator for Software-Defined Wireless Networks. Retrieved June 2, 2017 from https://github.com/intrig-unicamp/mininet-wifi.

Cited By

View all
  • (2024)A Cyberattack Detection-Isolation Algorithm for CAV Under Changing Driving EnvironmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.347595225:12(19646-19657)Online publication date: Dec-2024
  • (2024)ABAUS: Active Bundle AUthentication Solution Based on SDN for Vehicular NetworksIEEE Access10.1109/ACCESS.2024.337421612(38112-38122)Online publication date: 2024
  • (2023)Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network TopologyAutomatic Control and Computer Sciences10.3103/S014641162208013256:8(906-915)Online publication date: 28-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
October 2017
321 pages
ISBN:9781450353038
DOI:10.1145/3136825
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SDN
  2. VANET
  3. architecture
  4. centralization
  5. control
  6. decentralization
  7. dynamic topology
  8. security
  9. software-defined network

Qualifiers

  • Research-article

Conference

SIN '17
SIN '17: Security of Information and Networks
October 13 - 15, 2017
Jaipur, India

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Cyberattack Detection-Isolation Algorithm for CAV Under Changing Driving EnvironmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.347595225:12(19646-19657)Online publication date: Dec-2024
  • (2024)ABAUS: Active Bundle AUthentication Solution Based on SDN for Vehicular NetworksIEEE Access10.1109/ACCESS.2024.337421612(38112-38122)Online publication date: 2024
  • (2023)Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network TopologyAutomatic Control and Computer Sciences10.3103/S014641162208013256:8(906-915)Online publication date: 28-Feb-2023
  • (2021)Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly ProblemAutomatic Control and Computer Sciences10.3103/S014641162008035054:8(813-821)Online publication date: 18-Feb-2021
  • (2021)Analysis of Safety Methods for a New Generation of AutomobilesAutomatic Control and Computer Sciences10.3103/S014641162008034954:8(915-921)Online publication date: 18-Feb-2021
  • (2021)Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANETAutomatic Control and Computer Sciences10.3103/S014641162008026X54:8(822-828)Online publication date: 18-Feb-2021
  • (2021)Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic ApproachAutomatic Control and Computer Sciences10.3103/S014641162008021054:8(937-943)Online publication date: 18-Feb-2021
  • (2021)A General Scheme for the Pre-Distribution of KeysAutomatic Control and Computer Sciences10.3103/S014641162008008854:8(860-863)Online publication date: 18-Feb-2021
  • (2021)Specification-Based Classification of Network Protocol VulnerabilitiesAutomatic Control and Computer Sciences10.3103/S014641162008004054:8(922-929)Online publication date: 18-Feb-2021
  • (2021)Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of ThingsAutomatic Control and Computer Sciences10.3103/S014641162008003954:8(888-895)Online publication date: 18-Feb-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media