2014
DOI: 10.1016/j.vehcom.2014.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Survey on VANET security challenges and possible cryptographic solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
293
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 417 publications
(294 citation statements)
references
References 12 publications
0
293
0
1
Order By: Relevance
“…The particularities of VANET make it a very interspersing domain which deserves in the last years several studies addressing different aspects, such as: applications [6,7], communication [8], security [9,10], routing protocols [11,12,13], access [14] and cloud computing in VANETs [15,16,17].…”
Section: Figure 1 Vanet Communication Architecturementioning
confidence: 99%
“…The particularities of VANET make it a very interspersing domain which deserves in the last years several studies addressing different aspects, such as: applications [6,7], communication [8], security [9,10], routing protocols [11,12,13], access [14] and cloud computing in VANETs [15,16,17].…”
Section: Figure 1 Vanet Communication Architecturementioning
confidence: 99%
“…Along with this, the On studying [1] and [2] which has a very detailed survey on the classification of intrusions and corresponding countermeasures and cryptographic solutions. Table -2 summarizes the variety of attacks, their targeted services and corresponding cryptographic solutions and proposals.…”
Section: Security Solution Using Cryptographymentioning
confidence: 99%
“…The malicious vehicles disrupt the functionality of geographic routing by either introducing false location claim or modifying the location claim of other vehicles [8][9][10]. Although, various techniques have been suggested to verify the location claim yet, the dependency of these techniques on cryptography reduces the applicability in vehicular traffic environments where majority of location based applications require real time response [11][12][13].…”
Section: Introductionmentioning
confidence: 99%