2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7754846
|View full text |Cite
|
Sign up to set email alerts
|

VANET security: Issues, challenges and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
82
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(84 citation statements)
references
References 16 publications
0
82
0
2
Order By: Relevance
“…The secret aspect of messages exchanged between the nodes of a vehicular network is especially weak in comparison to techniques like the illegitimate collecting of messages through eavesdropping and the accumulation of location-related information available through the transmission of broadcast messages [8]. In the case of eavesdropping, the assailant can gather and make use of information about drivers without their authorization.…”
Section: Attacks On Confidentialitymentioning
confidence: 99%
“…The secret aspect of messages exchanged between the nodes of a vehicular network is especially weak in comparison to techniques like the illegitimate collecting of messages through eavesdropping and the accumulation of location-related information available through the transmission of broadcast messages [8]. In the case of eavesdropping, the assailant can gather and make use of information about drivers without their authorization.…”
Section: Attacks On Confidentialitymentioning
confidence: 99%
“…It has the mobile nodes, usually vehicles having sensors, static infrastructure, fixed roadside access points (RSAP) and different wireless interconnections such as vehicle‐to‐vehicle (V2V), a vehicle‐to‐infrastructure access point (V2I), and access point‐to‐a vehicle (I2V). This wireless communication system consists of the combination of global positioning system (GPS) and cellular communication system using either one‐ or multi‐hop mode depending on the coverage requirements . One of the major services of this technology is to help the drivers for safety so that the road accidents can be minimized.…”
Section: Introductionmentioning
confidence: 99%
“…At each intermediate node, hashing is applied to ensure the authenticity of routes. 21,47,54 18. ARIADNE: ARIADNE (is another protocol which is an extension of DSR with the concepts of symmetric key cryptography.…”
mentioning
confidence: 99%
“…Each intermediate node in the network has the ability to decide whether to reply to the source node or not, depending on the queue length and threshold conditions. 47 It is basically used to protect the VANET against routing attacks, impersonation, and bogus information. 20.…”
mentioning
confidence: 99%
See 1 more Smart Citation