Survey and taxonomy of information-centric vehicular networking security attacks
Information Centric Networks (ICNs) overcome the current IP-based networks weakness and aim to ensure efficient data distribution. The Main ICN features are location-independent naming, in-network caching, name-based routing, built-in security, and high mobility. ICN vehicular networks stratify the ICN architecture on the Vehicular Ad hoc Networks (VANETs) to reinforce a massive amount of data transmission and handle the critical time interests inside the vehicular networks while taking into consideration the vehicles’ high mobility. Original Equipment Manufacturers (OEMs) gather the real-time data from the vehicular networks to build their own platforms and figure out new features serving autonomous vehicles, vehicle safety, and traffic management. This introduces new vulnerabilities through the vehicles’ interaction with the outside networks. Accordingly, it is important to understand the VANETs’ attacks to fulfill the security goals. In this paper, we survey the different attacks on VANETs and ICN, and focus on the newly introduced attacks in the integrated platform between ICN and VANETs. We propose a taxonomy for ICN vehicular attacks. In addition, evaluate the attacks and identify their security levels. © 2021 Elsevier B.V.