2013
DOI: 10.1007/s11277-013-1161-5
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of DoS Attacks in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 81 publications
(38 citation statements)
references
References 31 publications
0
38
0
Order By: Relevance
“…For protecting and detecting these possible threats, an intrusion detection and prevention system must be used by the wireless networks. Intrusion detection system solution is also important for the organizations which do not have a WLAN due to the dangerous wireless threats [1, 18,22,24,25,26]. A misbehaving Wireless Access Point (WAP) is introduced into the wireless networks 802.11which attacks and collects the sensitive data from the WLAN.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
See 1 more Smart Citation
“…For protecting and detecting these possible threats, an intrusion detection and prevention system must be used by the wireless networks. Intrusion detection system solution is also important for the organizations which do not have a WLAN due to the dangerous wireless threats [1, 18,22,24,25,26]. A misbehaving Wireless Access Point (WAP) is introduced into the wireless networks 802.11which attacks and collects the sensitive data from the WLAN.…”
Section: Threats To Wireless Lanmentioning
confidence: 99%
“…This approach decrease the risk of wormhole attacks and does not need any location information and clock synchronization. Recently, many researchers have proposed intrusion detection techniques for wireless sensor networks [3,16,[21][22][23][24].…”
Section: Ddos (Distributed Denial Of Service) Attacksmentioning
confidence: 99%
“…The mobility generators take into consideration both the micro as well as macro mobility behaviour of the nodes. Various examples of mobility generators are SUMO [16], MOVE [17], CityMob [18], FreeSim [19] STRAW [20]. The comparison of these all is shown in Table 1.1.…”
Section: Simulators For Vanetmentioning
confidence: 99%
“…Denial of Service (DoS) [2], [3], [25], [34] is always one of the most serious level attacks in every network. The scenarios to perform are very diverse.…”
Section: Denial Of Service (Dos) and Distributed Denial Of Service (Dmentioning
confidence: 99%
“…There is a processing unit that has the role to suggest to the OBU to switch channel, technology, or to use frequency hopping technique or multiple transceiver in the case of DoS attack [34]. The work in [34] present a distributed and robust defense against DoS attacks where a malicious node forges a large number of fake identities, i.e., Internet Protocol (IP) addresses in order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In the proposed approach, these fake identities are analyzed through the medium of the consistent existing IP address information.…”
Section: Denial Of Service (Dos) and Distributed Denial Of Service (Dmentioning
confidence: 99%