Role of Cryptography, Blockchain, and Digital Forensics in Vehicular Networks

Role of Cryptography, Blockchain, and Digital Forensics in Vehicular Networks

Aradhana Behura
DOI: 10.4018/979-8-3693-1186-8.ch020
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Secure routing is challenging due to its dynamic topology change, energy consumption, connectivity, delay, high velocity, and congestion of vehicles. The essential features, for example, security, device heterogeneity, bandwidth, multihop routes, congestion, and malicious node detection, are the critical constraints in planning the secure QoS (quality of service) based schemes for VANET. The author explained a detailed review regarding types of outliers that may be possible in the vehicular network. It is a comprehensive review of cryptography, blockchain, and digital forensics role in VANETs. In this review, some features, applications, protocols, challenges, performance analyses and limitations of various technologies are carried out, and the future direction of the existing routing protocols, which will help to compare results with the proposed new algorithm. This chapter demonstrates how these existing methods have suggestively enriched the performance and provided technical direction for vehicular researchers.
Chapter Preview
Top

1. Introduction

Vehicle ad hoc networks (VANETs), which give information to provide safety and comfort to passengers and drivers, are quickly becoming the most intriguing research area in intelligent transportation systems. Trust, security, and privacy management are important topics in the design of VANETs. This survey paper begins with the essential background knowledge of the vehicular network, followed by complete security services, symmetric, asymmetric, group signature, identity-based signature, pseudonym-based schemes, certificate less service, blockchain, and digital forensics-based techniques. Next, we focus on the comprehensive review regarding authentication outlines, simulators, advantages, disadvantages, and the tradeoff between trust, privacy, and security. Due to the estimated dynamics of vehicular nodes, anonymity is essential but not necessary to thwart tracking an intruder attack that goals at the vehicle drivers' zone profiles. Thus, many privacy protection techniques based on cutting-edge technology are explained to protect automobiles' confidentiality and provide quality service. We also present a comprehensive study on several trust management prototypes in VANETs. During verification, the vehicular network may be alert of the location and time of a particular user. Malicious automobiles could track the directed driver's movements using the information provided during authentication (Alam et al., 2016).

Overall, security in vehicular routing is crucial to maintain the trustworthiness, privacy, and reliability of the communication infrastructure in intelligent transportation systems. It helps create a robust and secure environment for vehicular networks, ensuring the safety and efficiency of transportation for all road users.

The VANETs deal with three components: a vehicle, a trusted third party, and roadside infrastructures (Baza et al., 2020). A trusted third party, also known as a TTP, maintains the credentials and identities of all vehicles and discloses the true identities of vehicular nodes whose documentation has been revoked. TTP are trusted administrations with adequate storage and computational resources where all automobiles register and receive their certificates for vehicular network usage. Furthermore, they are in charge of RSU. There are numerous TTP, each in order of a different geographical area. There should be one TTP assigned to each vehicle and RSU. TTP has complete control over RSUs, and facilities are mounted to the roadside. We should only have minimal faith in RSUs because they are highly insecure and readily accessible to attackers. RSUs could interact directly with TTP for increased security, and if TTP determines that a particular RSU has been conceded, it may rescind the access of RSUs. Vehicular nodes are the network's moving sensor nodes fitted with an OBU and a tamper-proof device (TPD).

Complete Chapter List

Search this Book:
Reset