2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) 2020
DOI: 10.1109/upcon50219.2020.9376518
|View full text |Cite
|
Sign up to set email alerts
|

An Outline of the Security Challenges in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Moreover, in ITSs, it is crucially important to ensure data integrity regarding communication and computation between different system devices, such as vehicles, traffic controllers, and roadside infrastructures. There are different potential security risks against data integrity in ITSs, including spoofing attacks, timing attacks [105], Sybil attacks, man-in-the-middle attacks, attacks against machine learning with adversarial examples, data poisoning, and policy manipulation attacks.…”
Section: ) Smart Transportation Systems (Its)mentioning
confidence: 99%
“…Moreover, in ITSs, it is crucially important to ensure data integrity regarding communication and computation between different system devices, such as vehicles, traffic controllers, and roadside infrastructures. There are different potential security risks against data integrity in ITSs, including spoofing attacks, timing attacks [105], Sybil attacks, man-in-the-middle attacks, attacks against machine learning with adversarial examples, data poisoning, and policy manipulation attacks.…”
Section: ) Smart Transportation Systems (Its)mentioning
confidence: 99%
“…Since VANETs are used in so many monitoring and safety applications, they have a number of hardware and communication device characteristics [14] that affect VANET communication. The following is a list of the most significant characteristics that affect VANET communication [15]:…”
Section: Characteristics Of Vanetsmentioning
confidence: 99%
“…With Repudiation attacks, the attacker attempts to confuse the network by denying that they have received messages when there is any dispute over messages [ 61 ]. In platoons, it is believed that this can cause the system can assign the same identity to multiple vehicles [ 19 ].…”
Section: Platooning Communication Security Attacksmentioning
confidence: 99%