2014 International Conference on Computer and Information Sciences (ICCOINS) 2014
DOI: 10.1109/iccoins.2014.6868376
|View full text |Cite
|
Sign up to set email alerts
|

Effects of attackers and attacks on availability requirement in vehicular network: A survey

Abstract: Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…But, if the network is not available for communication then the main goal of the network has become useless. All possible attacks related to availability are given below through different scenarios [7,8,13]. …”
Section: Attacks On Availability In Vanetmentioning
confidence: 99%
“…But, if the network is not available for communication then the main goal of the network has become useless. All possible attacks related to availability are given below through different scenarios [7,8,13]. …”
Section: Attacks On Availability In Vanetmentioning
confidence: 99%
“…For instance, an attacker could try to shutdown/disrupt the network established by RSUs and stop communication between vehicles and/or RSUs [57]. In a distributed DoS (DDoS) attack [59] malicious nodes launch attacks from different locations thus making it harder to detect. In the physical layer, an important type of DoS attack is the jamming attack [60] (refer to the related work [61] for detailed classification) where the attacker disrupts the communication channel (e.g., by electromagnatic interference) and can filter/limit incoming messages.…”
Section: B V2x Attack Classificationsmentioning
confidence: 99%
“…Due to its importance, dependability evaluation is an issue widely addressed in the literature, especially on WSNs. Several papers can be founded surveying some aspect of dependability on WSNs [ 10 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 ], while some others papers survey WVSNs [ 26 , 27 , 28 , 29 , 30 , 31 ] as their main research areas. However, just a few works have discussed dependability aspects of WVSNs, with emphasis on the availability assessment [ 14 , 32 , 33 , 34 , 35 ].…”
Section: Related Workmentioning
confidence: 99%