2017 International Conference on Information Technology (ICIT) 2017
DOI: 10.1109/icit.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Security Challenges in Vehicular Ad-Hoc Networks

Abstract: Vehicular Ad hoc Networks (VANET) is emerging as a promising technology of the Intelligent Transportation systems (ITS) due to its potential benefits for travel planning, notifying road hazards, cautioning of emergency scenarios, alleviating congestion, provisioning parking facilities and environmental predicaments. But, the security threats hinder its wide deployment and acceptability by users. This paper gives an overview of the security threats at the various layers of the VANET communication stack and disc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
(23 reference statements)
0
5
0
Order By: Relevance
“…However, these approaches are not sufficient for vehicular safety messages. 15,21 To address these issues, a solution is to replace the permanent vehicle identifier with temporary cryptographic identifier. These approaches not only secure location privacy but can also be used for authentication.…”
Section: Ta B L E 1 Acronym Tablementioning
confidence: 99%
See 3 more Smart Citations
“…However, these approaches are not sufficient for vehicular safety messages. 15,21 To address these issues, a solution is to replace the permanent vehicle identifier with temporary cryptographic identifier. These approaches not only secure location privacy but can also be used for authentication.…”
Section: Ta B L E 1 Acronym Tablementioning
confidence: 99%
“…The periodic pseudonym change strategy is not enough since they can be identified and tracked by attacker with a series of eavesdropped messages known as pseudonym linking attack. 21,24 Hence a systematic change in pseudonym for location privacy is required. The strength is measured by various metrics such as anonymity set 25 tracking uncertainty of adversary 26 and entropy.…”
Section: Ta B L E 1 Acronym Tablementioning
confidence: 99%
See 2 more Smart Citations
“…The Intelligent Transportation System (ITS) is approaching a level of maturity that gives confidence to many nations around the world to better control and manage the traffic flow across the cities. The ITS has a hierarchical structure with three layers [1], [2]. The bottom layer includes sensors/actuators (IoT devices), such as the mass airflow sensor, the engine speed sensor, oxygen sensor, manifold absolute pressure sensor, and voltage sensor.…”
Section: Introductionmentioning
confidence: 99%