2018 Majan International Conference (MIC) 2018
DOI: 10.1109/mintc.2018.8363152
|View full text |Cite
|
Sign up to set email alerts
|

Review of potential security attacks in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…The following security aspects are considered and summarized as shown in Figure 2. The following important security aspects 64‐66 are considered and much needed to protect an EV dynamic charging system: Confidentiality: Collecting vital information from users who are transferring data between vehicles, or between vehicles and infrastructures. While certain data in the EV dynamic charging system must be made public, the data protection of EVs or dynamic charging stations is the most essential paradigm.…”
Section: Security Requirements In Ev Dynamic Charging Systemmentioning
confidence: 99%
“…The following security aspects are considered and summarized as shown in Figure 2. The following important security aspects 64‐66 are considered and much needed to protect an EV dynamic charging system: Confidentiality: Collecting vital information from users who are transferring data between vehicles, or between vehicles and infrastructures. While certain data in the EV dynamic charging system must be made public, the data protection of EVs or dynamic charging stations is the most essential paradigm.…”
Section: Security Requirements In Ev Dynamic Charging Systemmentioning
confidence: 99%
“…There could be different types of attackers like active, passive, malicious, rational, local or outsider. Ultimately, each attacker who get a chance to involve in the network affects the legibility of the network [10], [13], [14]. In the following some of the potential attacks and threats are discussed that are possible in the IoV environment.…”
Section: Security Threats and Attacks In Iov Environmentmentioning
confidence: 99%
“…Hence, security issues such as key distribution or trust management will be affected and must find new solutions to deal with that. Computing capacity: Unlike MANETs, VANETs do not suffer from limited computing capacity or storage. Network size: Network size in VANET has no geographical boundaries. It can consist of town, cities, provinces, or even countries (Shahid, Jaekel, Ezeife, Al‐Ajmi, & Saini, ). Hence, in dense urban areas millions of vehicles would constitute the network which may lead to network congestion or information overloading. Wireless link use: like MANETs, VANETs use wireless links to communicate which may lead to some severe security breaches.…”
Section: Vanets Characteristicsmentioning
confidence: 99%
“…When addressing security issues of VANETs, it is interesting to specify the network attackers' profiles. Attackers in VANETs were widely investigated and classified by researchers (La & Cavalli, ; Mokthar & Azab, ; Shahid et al, ). Attack method (passive vs. active), attack membership (internal vs. external), attack motivation (rational vs. malicious), attack scope (local vs. extended), and attack target (wireless interface, sensors, hardware, infrastructure) are among the most used classes for VANETs attackers.…”
Section: Vanets Security Challengesmentioning
confidence: 99%
See 1 more Smart Citation