2008
DOI: 10.1109/vetecs.2008.610
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure and Application-Oriented VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 124 publications
(59 citation statements)
references
References 10 publications
0
58
0
Order By: Relevance
“…These integrity detection schemes are for V2V and V2I communication in VANETs. In VANETs, an attack is happened when sensor or other OBU and RSU are manipulated by a malicious node [41]. Replay and fabrication/alteration are well-known attacks in VANETs as far as integrity is concerned [24].…”
Section: Secure Communication In Vanetmentioning
confidence: 99%
“…These integrity detection schemes are for V2V and V2I communication in VANETs. In VANETs, an attack is happened when sensor or other OBU and RSU are manipulated by a malicious node [41]. Replay and fabrication/alteration are well-known attacks in VANETs as far as integrity is concerned [24].…”
Section: Secure Communication In Vanetmentioning
confidence: 99%
“…Challenges that face vehicular networks represent additional requirements that should be considered once the network is in operation. Di Felice, Ghandour, Artail and Bononi (2012), Jakubiak (2008), Qian and Moayeri (2008), and Karagiannis et al (2011) have shown that the most relevant challenges are the following:…”
Section: Related Workmentioning
confidence: 99%
“…In a vehicular network, they become more prominent because they can potentially change life critical message or broadcast a wrong message to other users of the network. Security is an important factor and confidentiality, integrity, availability (CIA) are the major security requirements in vehicular network [3,4]. It is required that all components [users, vehicle, and road side unit (RSU)] of vehicular network should be secure and work properly to serve the users and achieve the security goals.…”
Section: Introductionmentioning
confidence: 99%