2016
DOI: 10.17485/ijst/2016/v9i44/97105
|View full text |Cite
|
Sign up to set email alerts
|

VANET and its Security Aspects: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…However, a bilinear pairing operation is used here to create the group certificates and public key, which adds complex processing to memory-constrained devices in vehicular ad hoc networks. The cost of one pairing operation is three times greater than that of a one-point multiplication operation [3]. Thus, the pairing operation adds an additional burden, increasing the processing time and memory requirements of the entities of the network.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, a bilinear pairing operation is used here to create the group certificates and public key, which adds complex processing to memory-constrained devices in vehicular ad hoc networks. The cost of one pairing operation is three times greater than that of a one-point multiplication operation [3]. Thus, the pairing operation adds an additional burden, increasing the processing time and memory requirements of the entities of the network.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 1 expresses the general architecture of the VANET environment. According to a survey [3], by the end of 2027, almost 100% of vehicles will be equipped with OBUs. The medium through which these elements in the network communicate with each other is either through dedicated short-range communication (DSRC) or wireless access for the vehicular environment (WAVE).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Also for security requirement proper routing performs a vital role. Table 4.appearances the actual design considering AODSD2V2 protocol [42]. By mingling different technologies defiantly we accomplish good concert of security.…”
Section: Opnet Modelermentioning
confidence: 99%
“…VCs have been classified in three classes as function of their scale, infrastructure support and communication sensitivity [30]: (a) Safe mobility: contains safety‐of‐life communications to notify drivers of dangerous situations. Such applications are localised, and are very sensitive to transmission impairments, delay and loss.…”
Section: Vehicular Communicationsmentioning
confidence: 99%