Emerging Security Issues in VANETS for E-Business

Emerging Security Issues in VANETS for E-Business

S. S. Manvi (REVA Institute of Technology and Management, India) and M. S. Kakkasageri (Basaveshwar Engineering College, India)
DOI: 10.4018/978-1-60566-194-0.ch039
OnDemand PDF Download:


This chapter presents the emerging security issues in Vehicular Ad hoc Networks (VANETs) for e-business along with some of the solutions provided by the research community. The VANET will facilitate new applications for e-business that will revolutionize the driving experience, providing everything from instant, localized traffic updates to warning signals when the vehicle ahead abruptly brakes. In the emerging global economy, e-business has increasingly become a necessary component of business strategy and a strong catalyst for economic development. In near future, vehicles may be equipped with short-range radios capable of communicating with other vehicles and highway infrastructure using a VANET. However, providing security in VANETs for e-business raises privacy concerns that must be considered. The deployment of VANETs for e-business is rapidly approaching, and their success and safety will depend on viable security solutions acceptable to consumers, manufacturers and governments.
Chapter Preview


VANET is a form of Mobile Ad-hoc NETwork (MANET) that provides communications between vehicles and external network infrastructure. VANETs are expected to have great potential to improve both traffic safety and comfort in the future (Murat, 2005; Holgar, 2005; Sascha, 2006). E-business can be conducted over VANET to facilitate business activities among users traveling in the vehicles. It is a process that relies on an automated information system. E-business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.

VANET has become a promising field of research since the world is advancing towards the vision of Intelligent Transportation Systems (Sascha, 2004; Manvi, 2006; Manvi 2007).

Vehicles (or nodes) in VANET are assumed to be equipped with the following.

  • GPS (Global Positioning System) receiver enabling the vehicle to track its own location.

  • Onboard computing devices allowing the vehicle to perform simple calculations including encryption and other vehicle’s positions.

  • Communication devices (Direct Short Range Communication compliant) to propagate/receive information.

  • Equipment enabling to verify neighbor’s position and identify obstacles.

  • A set of sensors reporting crashes, engine statistics, weather conditions, etc.

  • Pre-stored digital maps.

  • Dedicated and secured memory.

  • Its own clock to obtain an accurate timestamp.

VANET enables communications between nearby vehicles (V2V communications) and the roadside infrastructure (V2I communications). While using mostly V2V communications, VANET does not entirely rely on a fixed infrastructure, but can harness it for improved performance and functionality when it is available. A typical VANET scenario is as shown in figure 1. Vehicle to vehicle and vehicle to roadside base station/gateway communication is required for providing safety and other information services to vehicle users. Group of vehicles together may form a cluster to disseminate information among themselves as well as to other clusters and base stations.

Figure 1.

A typical VANET scenario

Key Terms in this Chapter

Eavesdropping: Is a passive attack. An attacker listens to the communication and gets information about the content of the message.

Trust: Is based on a combination of judgment or opinion based on face-to-face meetings, or recommendations of colleagues, friends and business partners.

Confidentiality: Is the prevention of unauthorized disclosure of information concerns the content of a message. Only the sender and the receiver are supposed to know the content. Attacks include message interception (man-in-the-middle attacks), content release to other parties, etc.

Vehicular Ad hoc Network (VANET): Is a form of ad-hoc network that enables communications between nearby vehicles (V2V communications) and road-side infrastructure (V2I communications).

Integrity: Ensures that only authorized parties modify system assets and transmitted information. Modification includes writing, changing, changing status, deleting, creating, and the delaying or replaying of transmitted messages.

PKI (Public Key Infrastructure): Is the typical security architecture used for networks where the presence of online authorities is not always guaranteed.

Non-Repudiation: Ensures that a transferred information has been sent and received by the parties claiming to have sent and received the information.

Node Misbehavior: Is the intentional non-cooperative behavior of a node and is caused by two types of misbehavior: selfish behavior, e.g., nodes that want to save power, CPU cycles, and memory, and malicious behavior which is not primarily concerned with power or any other savings but interested in attacking and damaging the network.

E-Business: Is defined as the transformation of an organization’s processes to deliver additional customer value through the application of technologies, philosophies and computing paradigm of the new economy.

Authentication: Is needed in order to be sure about the identity of the sender or receiver of a message. The attack is called masquerading, that is pretending to be somebody else.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
In Lee
Chapter 1
Walter Distaso, Paolo Lupi, Fabio M. Manenti
In this chapter the authors provide evidence of the effectiveness of European National Regulatory Authorities in applying the basic principles of... Sample PDF
Static and Dynamic Efficiency in the European Telecommunications Market: The Role of Regulation on the Incentives to Invest and the Ladder of Investment
Chapter 2
James E. Prieger, Daniel Heil
Regulatory policy in telecommunications must balance short-term efficiency (low prices) against the firms’ incentives to innovate, which have longer... Sample PDF
Is Regulation a Roadblock on the Information Highway?
Chapter 3
Claudio Feijóo, José Luis Gómez-Barroso, Asunción Mochón
Wireless/mobile technologies are absolutely necessary for any agent who wants to participate in the new information and communication technologies... Sample PDF
Reforms in Spectrum Management Policy
Chapter 4
Ricardo Gonçalves, Álvaro Nascimento
The deployment of Next Generation Access networks (NGAs) is likely to have a significant impact on the telecommunications’ value chain and... Sample PDF
Next Generation Access Networks and their Regulatory Implications
Chapter 5
Carol C. McDonough
The United States’ wireless telephone industry has evolved from a minor segment of the communications industry to a major provider of voice, and... Sample PDF
The Impact of Government on the Evolving Market Structure of the U.S. Wireless Telephony Industry
Chapter 6
Indrit Troshani, Sally Rao Hill
The adoption and diffusion of mobile services has achieved a spectacular growth in many countries around the world. However, regulators in these... Sample PDF
Shaping Regulation in the Australian Mobile Industry
Chapter 7
Stefan Hüsig
This chapter covers an important issue in the area of telecommunications planning and technology management: The ex ante analysis of potential... Sample PDF
Analyzing the Disruptive Potential in the Telecommunications Industry
Chapter 8
John B. Meisel, Timothy S. Sullivan
The local exchange telephone market is no longer considered to be a natural monopoly as a result of technological advancements. In particular, the... Sample PDF
Convergence of the Internet and Telecommunications
Chapter 9
Moon-Soo Kim
Since 1986, the Internet has developed into a global network enabling users worldwide to connect to each other to exchange information and data. The... Sample PDF
International Internet Interconnection Service in Asia-Pacific Region
Chapter 10
Dong Hee Shin
The purpose of this study is to examine cross-national data in order to identify possible factors related to the observable patterns of Mobile... Sample PDF
A Techno-Economic Analysis of Mobile Virtual Network Operators
Chapter 11
Riku Laanti, Fred McDougall, Georges Baume
This chapter focuses on the internationalisation processes of national telecommunications companies (telcos) from small and open economies (SMOPECs)... Sample PDF
Evolving Value Networks and Internationalisation of National Telecommunication Companies from Small and Open Economies
Chapter 12
Zulima Fernández, Belén Usero Sánchez
This chapter analyzes the role of non-market actions (NMAs) in the competitive position of firms in the European mobile telecommunications industry.... Sample PDF
The Effect of Non-Market Strategies in the Mobile Industry
Chapter 13
Barney Warf
Fiber optics forms the pivotal telecommunications technology of the contemporary global economy, offering greater speed and security than other... Sample PDF
Spatiality and Political Economy of the Global Fiber Optics Industry
Chapter 14
Hyun-Soo Han, Heesang Lee, Yeong -Wha Sawng
In South Korea, the home network industry has been the object of great expectations among the government and business community. Thus far, however... Sample PDF
Digital Convergence and Home Network Services in Korea: Part 1 - Recent Progress and Policy Implications
Chapter 15
Hyun-Soo Han, Heesang Lee, Yeong -Wha Sawng
In this chapter, we proposed managerial implications and strategic alliance opportunities of the home network service providers in Korea. Based on... Sample PDF
Digital Convergence and Home Network Services in Korea: Part 2 – Business Models and Strategic Alliances
Chapter 16
Brian Low, Wesley J. Johnston
Despite massive investment, few foreign firms doing business in China’s telecommunication sector can claim success. Such failures can be explained... Sample PDF
Mixing and Matching Organizational Network Legitimacy Practices to China's Telecommunication Market
Chapter 17
Chin Wei Chong, Siong Choy Chong
This chapter aims to create a unified model capturing and generalising the different arrays of preliminary knowledge management (KM) implementation... Sample PDF
Preliminary Knowledge Management Implementation in the Telco Industry
Chapter 18
Maria Major, Trevor Hopper
This chapter examines an implementation of an Activity-based Costing (ABC) system in a Portuguese telecommunications firm called Marconi. It is... Sample PDF
Activity-Based Costing in the Portuguese Telecommunications Industry
Chapter 19
Antonios D. Kargas, Dimitris Varoutas
This chapter explains what organizational culture is and analyzes its importance for the management of any company. Organizational culture must not... Sample PDF
The Role of Organizational Culture to the Management of Telecommunication Companies: I. Background and Motivation
Chapter 20
Antonios D. Kargas, Dimitris Varoutas
This chapter analyzes the importance of organizational culture through a set of strategies and enterprising practices in order to emphasize the... Sample PDF
The Role of Organizational Culture to the Management of Telecommunication Companies: II. Applications and Case Studies
Chapter 21
Hannu Verkasalo
Many case examples in the mobile market have indicated that the success of mobile services (e.g. Internet browsing, email messaging or streaming... Sample PDF
Dynamics of Mobile Service Adoption
Chapter 22
Moon-Koo Kim, Myeong-Cheol Park, Jong-Hyun Park
In communications services, the continued competitiveness and growth of a company depends vitally on customer value. In Korea’s maturing mobile... Sample PDF
When Customer Satisfaction Isn't Good Enough: The Role of Switching Incentives and Barriers Affecting Customer Behavior in Korean Mobile Communications Services
Chapter 23
Jiayin Qi, Yajing Si, Jing Tan, Yangming Zhang
In the highly competitive environment, the real-time and dynamic customer demand analysis technology is required by the enterprise information... Sample PDF
Telecommunication Customer Demand Management
Chapter 24
Jiayin Qi, Yuanquan Li, Chen Li, Yingying Zhang
This chapter proposes an integrated methodological system of telecommunication customer detainment management, including telecommunication customer... Sample PDF
Telecommunication Customer Detainment Management
Chapter 25
Frédéric Morlot, Salah Eddine Elayoubi
We illustrate how a mobile data network operator can plan an upgrading investment to anticipate explosions of the demand, taking into account the... Sample PDF
How to Plan for an Upgrading Investment in a Data Network?
Chapter 26
Georgios N. Angelou, Anastasios A. Economides
Recognizing the inadequacy of traditional quantitative cost-benefits analysis for evaluating telecommunications investments, researchers suggest... Sample PDF
Telecommunication Investments Analysis: A Multi-Criteria Model
Chapter 27
Rebecca De Coster
Mobile networking refers to wireless technologies which provide communications between devices. Applications for mobile networking have a broad... Sample PDF
A Business Planning Framework for WiMAX Applications
Chapter 28
Nicoletta Corrocher, Roberto Fontana, Claudia Parlanti
We provide evidence on the determinants of diffusion of Voice over IP (VoIP) applications in a sample of public and private organizations in Italy.... Sample PDF
Adoption of VoIP Applications in Public and Private Organizations
Chapter 29
Richard A. Gershon
Today, innovation is much more about much than just developing new products. It is about reinventing business processes and building entirely new... Sample PDF
Intelligent Networking and Business Process Innovation: A Case Study Analysis of Home Box Office and Dell Computers
Chapter 30
Stan Kurkovsky
Mobile commerce is a special area of electronic commerce that utilizes mobile wireless devices to conduct commercial transactions. Unique features... Sample PDF
Can M-Commerce Benefit from Pervasive Computing?
Chapter 31
Katalin Tarnay
The purpose of this chapter is to provide a simple understandable approach to the basics of telecommunications management. This chapter is composed... Sample PDF
Basics of Telecommunication Management
Chapter 32
Katalin Tarnay
In this chapter, the fundamentals of communication protocols are presented, and then a special application area, the telecommunications management... Sample PDF
Telecommunication Management Protocols
Chapter 33
Marc St-Hilaire, Samuel Pierre
The cellular industry is evolving at a very fast pace. In fact, cellular networks have experienced significant changes over the last few years. In... Sample PDF
Cellular Network Planning: Evolution from 2G to 4G
Chapter 34
Faouzi Kamoun
IP network connectivity is becoming so important for business that it is being compared today to basic utilities, such as water and electricity. As... Sample PDF
IP Address Management: Challenges, Solutions and Future Perspectives
Chapter 35
Ran Wei, Zizhong Zhao
This chapter focuses on digital cable TV networks as a convergent network with telecommunications networks and the Internet that provides... Sample PDF
Digital Cable TV Networks: Converging Technologies, Value-Added Services and Business Strategies
Chapter 36
Tobias Kollmann, Christoph Stöckmann, Carsten Schröer
The diffusion of a Web 2.0 product or services is, unlike to traditional consumer or industrial goods, not only based on purchase. Full acceptance... Sample PDF
Diffusion and Oscillation of Telecommunications Services: The Case of Web 2.0 Platforms
Chapter 37
Phillip Olla
A fundamental goal of the wireless industry is to economically offer ubiquitous broadband access to a large number of people in diverse geographical... Sample PDF
The Diffusion of WiMax Technology: Hurdles and Opportunities
Chapter 38
David Bell, Sunil Hazari
VoIP is the use of Internet protocols to provide telephone services that have previously been delivered over traditional telephone networks.... Sample PDF
VoIP Quality and Security Issues for Consumers and Small Businesses
Chapter 39
S. S. Manvi, M. S. Kakkasageri
This chapter presents the emerging security issues in Vehicular Ad hoc Networks (VANETs) for e-business along with some of the solutions provided by... Sample PDF
Emerging Security Issues in VANETS for E-Business
Chapter 40
Sotirios K. Goudos, Angeliki Z. Agorogianni, Zaharias D. Zaharis
Network planning and management in a large organization such as a university, is a complex task. A large university is an inherently demanding... Sample PDF
Telecommunications Network Planning and Operations Management in an Academic Environment: The Case Study of the Aristotle University of Thessaloniki
Chapter 41
Károly Farkas, Csaba A. Szabó, Zoltán Horváth
The objective of this chapter is to discuss the applications, state-of-the-art technologies, planning methods and business models for wireless... Sample PDF
Planning of Wireless Community Networks
Chapter 42
David Golightly
Technology has to be fit for purpose in order to deliver its promised business impact. An important component of this is making sure technology... Sample PDF
Human Factors for Business Mobile Systems
Chapter 43
Mohamed Boucadair, Pierre Levis, Pierrick Morand
IP networks are the federative transport networks for a large set of emerging services. These services demand hard guarantees in term of the service... Sample PDF
Towards QoS-Inferred Internet
Chapter 44
Mirko Luca Lobina, Luigi Atzori, Fabrizio Boi
IP Telephony provides a way for an enterprise to extend consistent communication services to all employees, whether they are in main campus... Sample PDF
The Playout Control Management: An Issue for the IP Telephony Service Providers
Chapter 45
Nikolaos D. Tselikas, Georgia M. Kapitsaki, Dimitrios G. Makris, Iakovos S. Venieris
The role of open Application Programming Interfaces (APIs) and protocols for advanced service provisioning and the corresponding state of the art... Sample PDF
Open APIs and Protocols for Services and Applications in Telecoms
Chapter 46
Lisandro Zambenedetti Granville, Ricardo Neisse, Ricardo Lemos Vianna, Tiago Fioreze
The management of telecommunication and data networks has been based on standards defined in historical contexts quite different than the current... Sample PDF
On the Management Performance of Networked Environments Using Web Services Technologies
Chapter 47
Raquel Barco, Pedro Lázaro
In the near future, several radio access technologies will coexist in Beyond 3G mobile networks (B3G) and they will be eventually transformed into... Sample PDF
Automated Fault Management in Wireless Networks
Chapter 48
Cajetan M. Akujuobi, Nana K. Ampah
Most of the existing networks (e.g., telecommunications, industrial control, enterprise networks etc.) have been globally connected to open computer... Sample PDF
Modeling Intrusion Detection with Self Similar Traffic in Enterprise Networks
Chapter 49
Dimitris Kanellopoulos
This chapter presents high-speed networking technologies and standards such as Asynchronous Transfer Mode (ATM), Fast Ethernet, 10 Gigabit Ethernet... Sample PDF
High-Speed Multimedia Networks: Critical Issues and Trends
Chapter 50
J. Joaquín Escudero-Garzás, Ana García-Armada
The goal of this chapter is to introduce the novel concept of cognitive radio (CR) for wireless telecommunications. Cognitive radios are a new type... Sample PDF
Emerging Telecommunications Technologies: Cognitive Radio
Chapter 51
J. Joaquín Escudero-Garzás, Ana García-Armada
The aim of this chapter is to address the role of a novel concept in wireless telecommunications: Game theory. Game theory is a branch of applied... Sample PDF
Game Theory for PHY Layer and MAC Sublayer in Wireless Telecommunications
Chapter 52
S. S. Manvi, L. B. Bhajantri
This chapter brings out various issues in M-Commerce and describes various agent-based product negotiation models in mobile commerce environment.... Sample PDF
Agent Based Product Negotiation Models in Mobile Commerce
Chapter 53
James M. McKinion
Precision agriculture has been made possible by the confluence of several technologies: geographic positioning systems, geographic information... Sample PDF
Role of Telecommunications in Precision Agriculture
Chapter 54
Franz Hartleb, Gerhard Haßlinger, Sebastian Kempken
An ongoing challenge in telecommunication is the integration of a variety of services on broadband access platforms at increasing transmission... Sample PDF
Network Planning and Dimensioning for Broadband Access to the Internet Regarding Quality of Service Demands
Chapter 55
Gerhard Haßlinger
Service and content delivery over the Internet is currently supported by overlay architectures of different types. There is a trend towards... Sample PDF
Overlay Networks: New Techniques for Global Service and Network Provisioning
Chapter 56
James Salter, Nick Antonopoulos
Distributed Hash Tables (DHTs) have been used in Peer-to-Peer networks to provide query lookups in typically O(log n) messages whilst requiring... Sample PDF
Optimising P2P Networks by Adaptive Overlay Construction
Chapter 57
Susan J. Chinburg, George Scheets
The network carrier must utilize the full potential of existing physical infrastructure before any new investments can be considered. Much work has... Sample PDF
Designing a New Service Overlay on a Carrier Network Using the Efficient Frontier
Chapter 58
Mohamed Zaki, Salah Ramadan
The cellular principle is an effective way to guarantee efficient utilization of the offered radio band. Although PCS networks use the cellular... Sample PDF
Combining Small and Large Scale Roaming Parameters to Optimize the Design of PCS
Chapter 59
Kaiqi Xiong, Harry Perros
This chapter considers a set of computer resources used by a service provider to host enterprise applications for customer services subject to a... Sample PDF
Secure Resource Optimization in Distributed Service Computing
Chapter 60
Jadranka Skorin-Kapov, Darko Skorin-Kapov
Due to the enormous proliferation of internet traffic, including video on demand and transfer of datarich documents, the use of optical networking... Sample PDF
Trends, Optimization and Management of Optical Networks
About the Contributors