A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions

04/09/2019
by   Wafa Ben Jaballah, et al.
0

In this paper, first we survey the state-of-the-art SDN based Vehicular ad-hoc Network (SDVN) architectures for their networking infrastructure design, functionalities, benefits, and challenges. Then we discuss these SDVN architectures against major security threats that violate the key security services such as availability, confidentiality, authentication, and data integrity. We also propose different countermeasures to these threats. Finally, we discuss the lessons learned with the directions of future research work towards provisioning stringent security and privacy solutions in future SDVN architectures. To the best of our knowledge, this is the first comprehensive work that presents such a survey and analysis on SDVNs in the era of future generation networks (e.g., 5G, and Information centric networking) and applications (e.g., intelligent transportation system, and IoT-enabled advertising in VANETs).

READ FULL TEXT
research
04/06/2023

SDN enabled Mobility Management in Multi Radio Access Technology 5G networks: A Survey

This paper presents a survey of the state of the art in research related...
research
09/30/2021

High-Availability Clusters: A Taxonomy, Survey, and Future Directions

The delivery of key services in domains ranging from finance and manufac...
research
01/26/2022

Metropolitan Optical Networks: A Survey on New Architectures and Future Trends

Metropolitan optical networks are undergoing major transformations to co...
research
08/03/2022

On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives

Blockchain (BC) and Software-Defined Networking (SDN) are leading techno...
research
11/09/2017

ANCHOR: logically-centralized security for Software-Defined Networks

While the logical centralization of functional properties of the network...
research
07/16/2020

A Framework for Threats Analysis Using Software-Defined Networking

The ability to analyze network threats is very important in security res...

Please sign up or login with your details

Forgot password? Click here to reset