Mobile Ad-Hoc Networks: Applications 2011
DOI: 10.5772/12865
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
9
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 55 publications
0
9
0
Order By: Relevance
“…Vehicular networks comprise of self-organizing nodes whose mobility is constrained by the roads and traffic patterns with dynamic and unstable links between the peers. VANET communications can be either between Vehicle-to-Vehicle (V2V) also known as Inter Vehicular Communication or Vehicle-to-Infrastructure (V2I) [1]. A short to medium range communication service named Dedicated Short Range Communications (DSRC) supports this V2V and V2I communication.…”
Section: Introductionmentioning
confidence: 99%
“…Vehicular networks comprise of self-organizing nodes whose mobility is constrained by the roads and traffic patterns with dynamic and unstable links between the peers. VANET communications can be either between Vehicle-to-Vehicle (V2V) also known as Inter Vehicular Communication or Vehicle-to-Infrastructure (V2I) [1]. A short to medium range communication service named Dedicated Short Range Communications (DSRC) supports this V2V and V2I communication.…”
Section: Introductionmentioning
confidence: 99%
“…Vehicles in a VANET authenticate each other by signing every message with their private key, in addition to attaching their certificate before message transmission; receiving vehicles validate this key(s) before it is accepted. To streamline this process, one efficient method that minimize the security overhead is the use of Elliptical Curve Cryptography (ECC) [6] [10]. Nonetheless, as the number of nodes (vehicles, OBUs, RSUs, and traffic lights, etc.)…”
mentioning
confidence: 99%
“…2] [4] [5] [6] [7][10]. Although the use of pseudonyms enhances privacy, a complementary privacy preserving measure is to only reveal enough information to other nodes as absolutely necessary to prevent tracking, and/or inference linking [2][7].Attacks on availability manifests in the form of DoS: high frequency signals can be used to jam the communication channel in order to overwhelm it or deplete other network resources[3] [21][22] [23][24], including DDoS[3] …”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Beyond the ad-hoc network nature and the requirements of authentication and security, the scheme adds further challenges like ensuring timeliness of data, since delayed, fraudulent or tampered data can result in misguiding commands to the user [159,160]. Moreover, the lack of suitable security features at gateways can be exploited, resulting in loss of controllability and damage to property and life.…”
Section: System-level Challenges : Security and Functional Validationmentioning
confidence: 99%