2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) 2011
DOI: 10.1109/siecpc.2011.5876939
|View full text |Cite
|
Sign up to set email alerts
|

Classes of attacks in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 69 publications
(44 citation statements)
references
References 8 publications
0
44
0
Order By: Relevance
“…Following are the most common routing attacks in the VANET [11] - [12]: Black Hole attack: In this attack, a malicious node pretends to have an optimum route for the destination node and indicates that packet should route through this node after transmitting the fake routing information. The impact of this attack is that the malicious node can either drop or misuse the intercepted packets without forwarding them.…”
Section: (Iv) Routing Attackmentioning
confidence: 99%
“…Following are the most common routing attacks in the VANET [11] - [12]: Black Hole attack: In this attack, a malicious node pretends to have an optimum route for the destination node and indicates that packet should route through this node after transmitting the fake routing information. The impact of this attack is that the malicious node can either drop or misuse the intercepted packets without forwarding them.…”
Section: (Iv) Routing Attackmentioning
confidence: 99%
“…This leads to attaining a lower signal-to-noise ratio (SNR) and makes the vehicles unable to communicate with other vehicles and RSU stations [54]. The effects of jamming can be detected using specific techniques [53,55] and can be mitigated, for example, by randomizing the frequency hopping spread spectrum (FHSS) mechanism of the orthogonal frequency-division multiplexing (OFDM) standard [56], using efficient pseudo-random generator algorithms; • Flooding attacks: This type of attack consists of flooding the network with a huge volume of dummy messages that are intentionally generated by malicious nodes [57], making thus the OBUs and RSUs unable to communicate over the wireless channel.…”
Section: Attacks On Availability and Countermeasuresmentioning
confidence: 99%
“…These vehicles may communicate for a very small fraction of time to share important information regarding the traffic, road assistance, map sharing, weather related information and many entertainment based media files [2]. For participating in VANET a vehicle must have on board unit (OBU) [3] that operates in a dedicated short range communication (DSRC) channel [4]. Depending on the type of communication a vehicle adapts for sharing information among other participants in the network, VANET is classifies three modes of communications namely vehicle to vehicle (V2V) [5], vehicle to roadside infrastructure (V2I) and hybrid communication that is combination of both V2V and V2I [6].…”
Section: Introductionmentioning
confidence: 99%