Jordanian Journal of Informatics and Computing

Vehicular Ad-hoc Networks (VANETs): A Key Enabler for Smart Transportation Systems and Challenges

by 

Haitham Albinhamad ;

Abdullah Alotibi ;

Ali Alagnam ;

Mohammed Almaiah ;

Said Salloum

PDF logoPDF

Published: 2025/02/17

Abstract

Vehicular Ad-hoc Networks (VANETs) are a specialized subset of Mobile Ad-hoc Networks (MANETs) designed to facilitate data exchange between vehicles and infrastructure. These networks operate in two primary modes: Vehicle-to-Vehicle (V2V) communication, which is decentralized and mobile, and Vehicle-to-Infrastructure (V2I) communication, which is centralized and relies on Road Side Units (RSUs). VANETs play a crucial role in Smart City applications, particularly in Intelligent Transportation Systems (ITS), which enhance road safety, reduce traffic congestion, and minimize environmental impact by leveraging real-time data collected from vehicle sensors. The unique characteristics of VANETs, such as high mobility and dynamic topology, enable critical functionalities like collision detection, traffic management, and emergency response coordination. Public service entities, including traffic police, ambulances, and firefighters, benefit significantly from VANETs by receiving real-time alerts and optimizing response times. However, several challenges hinder the widespread deployment of VANETs, including high vehicle speeds, data transmission delays, and cybersecurity concerns. Addressing these challenges is essential to fully realizing the potential of VANETs as a transformative technology in modern transportation systems.

Keywords

Vehicular Ad-hoc Networks (VANETs)Mobile Ad-hoc Networks (MANETs)Intelligent Transportation Systems (ITS)

References

  1. Campolo, C., Molinaro, A., & Scopigno, R. (2015). Vehicular ad hoc Networks Standards, Solutions, and Research. Cham: Springer International Publishing.
  2. Artimy, M. M., Robertson, W., & Phillips, W. J. (2008). Vehicular ad hoc networks: An emerging technology toward safe and efficient transportation. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks, 405-432. doi:10.1002/9780470396384.ch14
  3. Su, D., & Ahn, S. (2016). Autonomous platoon formation for VANET- ENABLED vehicles. 2016 International Conference on Information and Communication Technology Convergence (ICTC). doi:10.1109/ictc.2016.7763478
  4. Balasem Al-Isawi, University of Babylon(oct,2021) wireless sensor network performance analysis under sinkhole attacks.( https://www.researchgate.net/publication/355615212)
  5. Reza Fotohi1 Somayyeh Firoozi Bari2 Mehdi Yusefi3 (27.nov,2020) Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol (arxiv.org).
  6. Zhang Huanan*, Xing Suping, Wang Jiannan (2020) Security and application of wireless sensor network, at www.sciencedirect.com.
  7. Tin yang and outhers (2021) Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs , https://www.sciencedirect.com
  8. Shariq Aziz Butt (19 th 2019) IoT Smart Health Security Threats, www.researchgate.net
  9. Waleed Kh. Alzubaidi (2018) Methods of Secure Routing Protocol in Wireless Sensor Networks, http://qu.edu.iq
  10. Reza Fotohi and outhrers (2020) Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol, arxiv.org.
  11. Almaiah, M. A., Hajjej, F., Ali, A., Pasha, M. F., & Almomani, O. (2022). A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors, 22(4), 1448.
  12. Almaiah, M. A., Ali, A., Hajjej, F., Pasha, M. F., & Alohali, M. A. (2022). A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors, 22(6), 2112.
  13. HUDA A. BABAEER and others( 29 may 2020) Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking, https://ieeexplore.ieee.org/
  14. WATEEN A. ALIADY and others(July 12 ,2019) Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks, https://ieeexplore.ieee.org/.
  15. Stalin David and 2 T. Joseph George (2020) Identity-Based Sybil Attack Detection and Localization, Artech Journals.
  16. JINGZE DING and others (February 5,2021) The DPC-Based Scheme for Detecting Selective Forwarding in Clustered Wireless Sensor Networks, https://ieeexplore.ieee.org/.
  17. Mukaram Safaldin and others (13 june ,2020) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks, https://doi.org/10.1007/s12652-020-02228-z.
  18. Suresh Kumar Jha and others (13 august2021) Security Threat Analysis and Countermeasures on Consensus Based Time Synchronization Algorithms for Wireless Sensor Network, https://link.springer.com/
  19. Akashah Arshad and others (September 22,2021) A survey of Sybil attack countermeasures in IoT-based wireless sensor networks, arxiv.org.
  20. Golden Julie and others (march 25 ,2021) FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks, https://orcid.org/0000-0002-3905-2460
  21. Shailesh Pramod Bendale and others (2018) Security Threats and Challenges in Future Mobile Wireless Networks , https://ieeexplore.ieee.org/
  22. Chundong Wang and others (march 15, 2018) Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information, mdpi.com
  23. Opeyemi Osanaiye anf others (24 may 2018) A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks
  24. Guang Yang and others (13 Nov 2018) Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks, mdpi.com
  25. Muhammad Adil and others (18 Apr 2018) An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
  26. Salmah Fattah and others ( 21 September 2020) A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges, ; https://doi.org/10.3390/s20185393.
  27. Mubashir Ali (2020) Detection and Isolation Technique for Sinkhole Attack in WSN, , arxiv.org.
  28. Xintao Huan and others(2021) NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks, https://ieeexplore.ieee.org/.
  29. YALI YUAN and others (June 5, 2018) Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks, https://ieeexplore.ieee.org/.
  30. OHIDA RUFAI AHUTU (April 15,2020) Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks, https://ieeexplore.ieee.org/
  31. MUHAMMAD NUMAN and others (march 1,2020) A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks, , https://ieeexplore.ieee.org/
  32. Guiyun Liu and others (3 jul 2020) Differential Games of Rechargeable Wireless Sensor Networks against Malicious Programs Based on SILRD Propagation Mode, https://doi.org/10.1155/2020/5686413.
  33. Hitesh Mohapatra and others (5 may , 2020) Handling of Man-In-The-Middle Attack in WSN Through Intrusion Detection System, http://www.warse.org/IJETER/static/pdf/file/ijeter05852020.pdf
  34. Ruby Bhatt and others( 5 September 2019) implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN), https://doi.org/10.1016/j.comcom.2019.09.007.
  35. Guiyun Liu and others ( 14 sep 2020) Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling, https://doi.org/10.1155/2020/3680518.
  36. Altulaihan, E., Almaiah, M. A., & Aljughaiman, A. (2024). Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms. Sensors, 24(2), 713.
  37. Bangashand others (2017) Security Issues and Challenges in Wireless Sensor Network,
  38. Periyanayagi and others (2018) Swarm-based defense technique for tampering and cheating attack in WSN using CPHS , https://link.springer.com/
  39. Da-WenHuang (2021) Data tampering attacks diagnosis in dynamic wireless sensor networks, https://www.sciencedirect.com.
  40. Ali, A., Almaiah, M. A., Hajjej, F., Pasha, M. F., Fang, O. H., Khan, R., ... & Zakarya, M. (2022). An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors, 22(2), 572.