2018 4th International Conference on Computing Communication and Automation (ICCCA) 2018
DOI: 10.1109/ccaa.2018.8777538
|View full text |Cite
|
Sign up to set email alerts
|

An Overview: Various Attacks in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(28 citation statements)
references
References 17 publications
0
28
0
Order By: Relevance
“…e authentic user will receive the same data packets from various vehicles because the illusion is always created in a network and believes its node will alter the route. is decision goes in favour of the attacker, while the route becomes clear, thus the attacker enjoys the trip [29,41]. Figure 7 represents a Sybil assault in which an assailant in Car C creates numerous identities and sends those data packets with false identities to other users, which creates an illusion that the road has enormous traffic.…”
Section: Sybil Assaultmentioning
confidence: 99%
See 1 more Smart Citation
“…e authentic user will receive the same data packets from various vehicles because the illusion is always created in a network and believes its node will alter the route. is decision goes in favour of the attacker, while the route becomes clear, thus the attacker enjoys the trip [29,41]. Figure 7 represents a Sybil assault in which an assailant in Car C creates numerous identities and sends those data packets with false identities to other users, which creates an illusion that the road has enormous traffic.…”
Section: Sybil Assaultmentioning
confidence: 99%
“…Furthermore, it assures transmitting data through it by presenting the shortest path to the receiver node [29,46]. e victim node chooses that shortest path and sends the data packet; any malicious node may drop the message or misuse the message for its own [41,47,48]. Figure 9 depicts that Car K desires to submit messages to Car P and Car Q, but it has no routing path for those nodes.…”
Section: Black Hole Assaultmentioning
confidence: 99%
“…In a passive attack, the malicious vehicle can spy on the communication channel between two authorized vehicles on the network. In an active attack, the malicious vehicle can discard, delay, or change the contents of the data packet, changing the location of the source/destination node and the content of the message [2], [31]. Many VANETs attacks are variants of the Man-in-the-middle attack, such as the black hole, or the DoS attack.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
“…The authors also reviewed security protocols and enlisted advantages, disadvantages and issues of VANET. The authors Zaidi and Faisal (7) broadly elaborated the working of VANET components and discussed the potential attacks possible over VANET.…”
Section: Introductionmentioning
confidence: 99%