Cloud and IoT‐Based Vehicular Ad Hoc Networks 2021
DOI: 10.1002/9781119761846.ch8
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study on Security and Privacy Issues in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The protection of privacy information mainly relies on the communication authentication protocols in VANETs. Therefore, a secure and reliable authentication protocol needs to be constructed to ensure the confidentiality of private keys and route privacy in VANETs [11][12][13][14][15]. In terms of key management, to address the problems of complex and variable topologies that cause keys to be constantly updated every moment, as well as interference with regular V2I data exchanges, Tan et al [16] proposed a secure authentication and key management scheme to solve the above problems.…”
Section: Related Workmentioning
confidence: 99%
“…The protection of privacy information mainly relies on the communication authentication protocols in VANETs. Therefore, a secure and reliable authentication protocol needs to be constructed to ensure the confidentiality of private keys and route privacy in VANETs [11][12][13][14][15]. In terms of key management, to address the problems of complex and variable topologies that cause keys to be constantly updated every moment, as well as interference with regular V2I data exchanges, Tan et al [16] proposed a secure authentication and key management scheme to solve the above problems.…”
Section: Related Workmentioning
confidence: 99%
“…Security is a critical responsibility in VANETs that must be maintained to avoid assaults in vehicle-to-vehicle (V2V) communication. Strong authentication mechanisms are essential to prevent attackers from joining the vehicle group and engaging in harmful behaviors that cause collisions [17]. In order to protect VANET networks against attack, VANET designs must fundamentally provide on security for services in terms of information, availability, integrity, authentication, non-repudiation and confidentiality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nevertheless, VANETs' highly dynamic structure, frequent node mobility, and broadcast wireless communication make them unique properties, make protecting sensitive vehicle and driver data challenging [3]. Secured routing in VANETs uses methods and protocols to ensure the impervious transmission of routing data and communication between vehicles in everchanging and potentially hostile environments The main features of secure routing are message integrity, authenticity, and privacy while mitigating various attacks that could compromise vehicular communication effectiveness and reliability in the road scenario [4]. VANETs raise privacy concerns because adversaries can track vehicles' movements and behaviors during the road, resulting in a range of hazards, including violations of location privacy and unauthorized entry to confidential data [5].…”
Section: Introductionmentioning
confidence: 99%