2018
DOI: 10.1002/spy2.39
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review on security issues in vehicular ad hoc network

Abstract: Vehicular ad hoc networks (VANETs) have been widely used in intelligent transportation system to provide safety and security alongwith reduction in traffic jam using vehicle‐to‐vehicle (V2V) and vehicle‐to‐roadside (V2R) unit communications. However, one of the major concerns in VANETs is to maintain the privacy and security of the sensitive information shared between vehicles and end‐users, as information leakage can influence any implemented solution in this environment. Keeping view on the above‐mentioned p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
2

Relationship

5
4

Authors

Journals

citations
Cited by 74 publications
(41 citation statements)
references
References 97 publications
0
31
0
Order By: Relevance
“…This rise of smart vehicles leads to road congestion and an increase of toxic emissions. The smart vehicles in a vehicular network could predict intelligent routes to lower the toxic emissions in VANET [52]. However, there may be malicious vehicles whose intent is to send false messages in the network leading to road congestion, accidents, and other catastrophic issues.…”
Section: A Overview Of Itmentioning
confidence: 99%
“…This rise of smart vehicles leads to road congestion and an increase of toxic emissions. The smart vehicles in a vehicular network could predict intelligent routes to lower the toxic emissions in VANET [52]. However, there may be malicious vehicles whose intent is to send false messages in the network leading to road congestion, accidents, and other catastrophic issues.…”
Section: A Overview Of Itmentioning
confidence: 99%
“…In recent years, security breaches are increased by cyber criminals constantly exploring new ways to by‐pass security solutions to get prohibited access to data and systems [17]. Some of the security breaches are as follows: Spamming: In this technique, unsolicited bulk messages are sent to multiple receivers [18]. Access filtering, computing, and content are major anti‐spam techniques used to handle this issue.…”
Section: Background For Bd Streamingmentioning
confidence: 99%
“…These functions are distributed to all available nodes by the ad-hoc networks since the ambiance causes the nodes to be easily captured and compromised. Hence, it is essential to provide security measures [2,3]. Therefore, security in MANET is a crucial consideration.…”
Section: Introductionmentioning
confidence: 99%