2021
DOI: 10.11591/eei.v10i5.3127
|View full text |Cite
|
Sign up to set email alerts
|

A review on various security attacks in vehicular ad hoc networks

Abstract: Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security sol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…The other optimal path selection algorithms which are used in the earlier researches are adaptive PSO [14], butterfly optimization algorithm (BOA) [15], quasi oppositional butterfly optimization algorithm (QOBOA) [16], ACO [17], grey wolf optimization (GWO) [18], the fruit fly optimization algorithm (FFOA) [19]. Some of the review works show about the security services such as confidentiality, authentication, integrity, and availableness [20], [21].…”
Section: Earlier Methodsmentioning
confidence: 99%
“…The other optimal path selection algorithms which are used in the earlier researches are adaptive PSO [14], butterfly optimization algorithm (BOA) [15], quasi oppositional butterfly optimization algorithm (QOBOA) [16], ACO [17], grey wolf optimization (GWO) [18], the fruit fly optimization algorithm (FFOA) [19]. Some of the review works show about the security services such as confidentiality, authentication, integrity, and availableness [20], [21].…”
Section: Earlier Methodsmentioning
confidence: 99%
“…Figure 3 presents a graphical representation of this attack. Many other methods have been studied and developed to increase the security of information, the way it is transmitted, and the detection of possible attacks on this information [22]- [24]. Over the past 20 years, several academics have developed fresh approaches for solving the issues that relate to the wireless ad hoc networks [25]- [29].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…The number of blocks is denoted by (𝑖, 𝑗), where 𝑖 and 𝑗 define the row and column for each standard block. The expression is in (5).…”
Section: Sk = Csgeneratekey()mentioning
confidence: 99%