2014
DOI: 10.1007/978-981-287-158-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey

Abstract: In recent years, the VANET has received a greater attention among researchers in academia and industry due to its potential safety application and nonsafety application. Malicious users are one of the types of attackers in VANET and create the security problems. Confidentiality, integrity and availability (CIA) are major components of security goals. The increasing research interest, potential applications, and security problem in VANET lead to the needs to review the attacks on security goals. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(21 citation statements)
references
References 10 publications
0
20
0
1
Order By: Relevance
“…Consequently, Raya et al [6] proposed the use of many transceivers at varying frequency bands as a feasible complement [6]. According to Sumra et al [3], attacks (e.g., DoS attacks) that severely impact the network functions -availability attacks -are more consequential/have more priority over other attacks on the remaining security goals of integrity, and confidentiality [3].…”
Section: Background and Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…Consequently, Raya et al [6] proposed the use of many transceivers at varying frequency bands as a feasible complement [6]. According to Sumra et al [3], attacks (e.g., DoS attacks) that severely impact the network functions -availability attacks -are more consequential/have more priority over other attacks on the remaining security goals of integrity, and confidentiality [3].…”
Section: Background and Related Workmentioning
confidence: 98%
“…As a privacy-preserving approach, Raya et al [6] proposed the use of dynamic, anonymous, and preloaded keys that change according to a vehicles travel speed. Authorized personnel -after a judicial approval from a judge -can, however, circumvent a vehicle drivers anonymity by reconstructing key information using the uniquely identifiable electronic license plate (ELP) in order to prove liability [ [24], broadcast tampering attack [3], malware attack [3], spamming attack [3], blackhole attack [3], and Sybil attacks [7]. Attacks against availability -jamming attack in the physical layer for example -can be mitigated by periodically switching the communication channel, and/or the communication technology used [5].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) Data confidentiality: Confidentiality is one of the major security requirements in VANET [30]. The vehicles which do not have security keys satisfying the access policy of the messages must be prevented from accessing in VANET.…”
Section: Security Requirementsmentioning
confidence: 99%
“…1. Different from the Delay-tolerant networks [2][3][4], the characteristics of fast and dynamic topology, autonomous movement and the influence of traffic rules, road and weather conditions bring many security threats to VANET [5,6]. To deal with these threats, many applications of VANET give each vehicle a unique identity, and take some security rules and methods with these identities.…”
Section: Introductionmentioning
confidence: 99%