2015
DOI: 10.5120/ijca2015907563
|View full text |Cite
|
Sign up to set email alerts
|

An Analytic Study of Security Solutions for VANET

Abstract: Vehicular ad-hoc networks (VANETs) are renowned form of mobile ad-hoc networks. In VANET, wireless device sends information to nearby vehicles, and messages can be transmitted from one vehicle to another vehicle or roadside infrastructure. So, using VANET can increase safety and traffic optimization. Similar to other technologies, in VANET there are some important and noticeable issues. One of the most important of them is Security. Since the network is open and accessible from everywhere in the VANET radio ra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Existing message authentication and integrity procedures fail to secure networks from this attack because an attacker manipulates and deploys its own vehicle sensors to produce and transmit incorrect traffic information. [10,11] 4 Realization and simulation of the attacks Our task is to construct three types of network attacks in the vehicle environment, which will consist of several scenarios with different parameters. Subsequently, we evaluate the advantages and disadvantages of simulated attacks with a focus on QoS parameters (packet dropping, delay, throughput guarantee) and service availability.…”
Section: Attacks Focused On Integritymentioning
confidence: 99%
“…Existing message authentication and integrity procedures fail to secure networks from this attack because an attacker manipulates and deploys its own vehicle sensors to produce and transmit incorrect traffic information. [10,11] 4 Realization and simulation of the attacks Our task is to construct three types of network attacks in the vehicle environment, which will consist of several scenarios with different parameters. Subsequently, we evaluate the advantages and disadvantages of simulated attacks with a focus on QoS parameters (packet dropping, delay, throughput guarantee) and service availability.…”
Section: Attacks Focused On Integritymentioning
confidence: 99%