2014
DOI: 10.1080/02564602.2014.890844
|View full text |Cite
|
Sign up to set email alerts
|

Security Models in Vehicular Ad-hoc Networks: A Survey

Abstract: Abstract-The security and privacy issues of vehicular ad-hoc networks (VANETs) must be addressed before they are implemented. For this purpose, several academic and industrial proposals have been developed. Given that several of them are intended to co-exist, it is necessary that they consider compatible security models. This paper presents a survey on the underlying security models of 41 recent proposals. Four key aspects in VANET security are studied, namely trust on vehicles, trust on infrastructure entitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 42 publications
0
11
0
Order By: Relevance
“…Safety services require excellence in terms of quality of service. Security issues are also a major concern in data transmission [1]. Bounded transmission delays and low access delays are to be maintained at a threshold and provide possible level of safety.…”
Section: G Multichannel Operationmentioning
confidence: 99%
See 2 more Smart Citations
“…Safety services require excellence in terms of quality of service. Security issues are also a major concern in data transmission [1]. Bounded transmission delays and low access delays are to be maintained at a threshold and provide possible level of safety.…”
Section: G Multichannel Operationmentioning
confidence: 99%
“…Transmission of data happens between vehicles, hybrid connectivity: where an infrastructure relay or vehicle relay is present and between an infrastructure and vehicles [1,2]. The three main services involved in vehicular networks are the safety services, traffic management and user-oriented services.…”
Section: G Multichannel Operationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is because of the realization of smart Intelligent Transport System (ITS) applications, and architectural similarity between Mobile Cloud Computing (MCC) and Vehicular Ad-hoc Networks (VANETs) [1][2][3]. Cloud Computing in VANETs (CC-V) has been investigated into two major dimensions of research in the area.…”
Section: Introductionmentioning
confidence: 99%
“…Position based routing protocols uses the position of the destination node to send the data packets without using the network address, source forwards the packet by placing the destination node's location in the header of the packet without requiring the route discovery, topology of the network and maintenance of the route [14]. Requirement of security protocols and privacy assurance in VANETs will be fulfilled to assure the acceptance by users and can be used in a successful manner [15].GPS or any other location service system is required to know the location of the moving nodes, moreover some of the techniques has an premise that while using the GPS positioning services there may not be recurrence in node trajectories [16]. The participative and dynamic nature of…”
Section: Introductionmentioning
confidence: 99%