2020
DOI: 10.11591/ijece.v10i6.pp6039-6044
|View full text |Cite
|
Sign up to set email alerts
|

A risk and security assessment of VANET availability using attack tree concept

Abstract: The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Researchers and interested authorities have therefore paid more attention to this issue. Therefore, robust approaches to protect this network's security and privacy against adversaries and attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…That being said securing the VANET is very essential through authentication and privacy schemes; authentication is a process that verifies an entity before they are permitted to access a particular network's or system's resources [13]. In this case the identity of the vehicles will be verified and once authenticated that particular vehicle will be given access to the network resources [14], [15]. Authentication will be the initial step to prevent malicious vehicles from accessing the VANET and this will prevent the malicious vehicles from transmitting messages because they have not been given access to the network [16], [17].…”
mentioning
confidence: 99%
“…That being said securing the VANET is very essential through authentication and privacy schemes; authentication is a process that verifies an entity before they are permitted to access a particular network's or system's resources [13]. In this case the identity of the vehicles will be verified and once authenticated that particular vehicle will be given access to the network resources [14], [15]. Authentication will be the initial step to prevent malicious vehicles from accessing the VANET and this will prevent the malicious vehicles from transmitting messages because they have not been given access to the network [16], [17].…”
mentioning
confidence: 99%