2021
DOI: 10.1007/978-981-16-2937-2_25
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study of Security Attack on VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 51 publications
0
6
0
Order By: Relevance
“…The most effective signal transmission model that best combines the receiver should also be selected if efficient jamming is accomplished in a VANET. researchers, including [17,65], examined some strategies to minimize the impact of jamming on ad hoc mobile networks.…”
Section: Location Privacy Attack Methods and Prevention For Iot In Vanetmentioning
confidence: 99%
See 2 more Smart Citations
“…The most effective signal transmission model that best combines the receiver should also be selected if efficient jamming is accomplished in a VANET. researchers, including [17,65], examined some strategies to minimize the impact of jamming on ad hoc mobile networks.…”
Section: Location Privacy Attack Methods and Prevention For Iot In Vanetmentioning
confidence: 99%
“…The offender is trying to render and insert fake security warnings in the network in this type of attack. The proper security messages can be withheld from legitimate users, and network security can be seriously affected [17]. This kind of assault is usually probable for a legal node.…”
Section: Location Privacy Attack Methods and Prevention For Iot In Vanetmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Sensor Attack [217] occurs when an attacker attempts to disable the GPS by hacking the sensor installed on the car. An attack on VANET [218] is done when a hacker employs brute force to get access to a vehicle's confidential data (i.e., passwords or keys). The V2X attack [219] is held when the attacker attack any gadget (i.e., smartphone) through which a vehicle communicates to an external network by WiFi, Global System for Mobile or Bluetooth.…”
Section: Data Privacy Threats In Acsmentioning
confidence: 99%
“…operates in a similar way as DoS attacks. However, in this attack, multiple entities or mediums are used to target the legitimate node or network operations [18]. • Sybil attack: Sybil attacks are used in peer-to-peer networks when a single hostile attacker has control over several nodes.…”
Section: • Distributed Denial Of Service Attack (Ddos): a Distributed...mentioning
confidence: 99%