2021
DOI: 10.1002/dac.4905
|View full text |Cite
|
Sign up to set email alerts
|

A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions

Abstract: Summary Vehicular ad‐hoc network (VANET) is an emerging field of mobile ad‐hoc network (MANET) which facilitates intelligent transport system (ITS). It thus helps in enhancing the real‐time driving experience and road safety. Due to association of VANET with life‐critical applications, there is a dire need to understand each and every aspect of it in terms of architecture, security, applications, routing, and so forth, before bringing it into implementation. Although there exist numerous studies on VANETs, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 153 publications
0
7
0
Order By: Relevance
“…Attack on Availability. Data availability (vehicle information) is essential for VANETs to ensure that the network is operational and valuable information is always accessible; this is a necessity for VANETs to ensure the safety of users' lives [60,61]. Table 3 shows the list of some well-known (a) DoS (Denial of Service Attack).…”
Section: Location Privacy Attack Methods and Prevention For Iot In Vanetmentioning
confidence: 99%
“…Attack on Availability. Data availability (vehicle information) is essential for VANETs to ensure that the network is operational and valuable information is always accessible; this is a necessity for VANETs to ensure the safety of users' lives [60,61]. Table 3 shows the list of some well-known (a) DoS (Denial of Service Attack).…”
Section: Location Privacy Attack Methods and Prevention For Iot In Vanetmentioning
confidence: 99%
“…The impact on the operational performance of the V2X system or private information leakage can have severe security implications in safety-critical V2X scenarios. The level of severity for an attack is categorized as low, moderate, or high [108]. If an attack impacts heavily on the operational performance of the V2X system or breaches privacy, the severity of the attack is inferred as high.…”
Section: Attack Classificationmentioning
confidence: 99%
“…is directly connected to safety functions, such as collision avoidance and improper lane change detection [6], [7].…”
Section: Introductionmentioning
confidence: 99%