2016
DOI: 10.14257/ijgdc.2016.9.11.02
|View full text |Cite
|
Sign up to set email alerts
|

Review of Vehicular Ad Hoc Network Security

Abstract: In the near future we know that vehicles will communicate with each other to make Vehicular ad hoc network and gives the concept of intelligent transportation system. In this paper we presented the review of security in VANET. Consequently, several researchers represented the attacks and solutions in vehicular communication We analyzed some of the security problems and proposed solutions to overcome it. We discussed the need for robust Vehicular Ad hoc networks, which is very strongly dependent on their securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…For the lack of security of the above proposal, the RSP-based message authentication proposed by Yein et al [8] can solve these problems through the use of public key identification and thus achieve privacy preservation, which is compatible with the scheme proposed by Li et al [9]. Oulhaci et al [10] and Kumar and Arora [11] have different solutions to enhance the privacy of the vehicle by the unicast communication in V2V (Vehicle to Vehicle) mode. However, they always have complex privacy protection protocols including traditional PKI (Public Key Infrastructure) distribution schemes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For the lack of security of the above proposal, the RSP-based message authentication proposed by Yein et al [8] can solve these problems through the use of public key identification and thus achieve privacy preservation, which is compatible with the scheme proposed by Li et al [9]. Oulhaci et al [10] and Kumar and Arora [11] have different solutions to enhance the privacy of the vehicle by the unicast communication in V2V (Vehicle to Vehicle) mode. However, they always have complex privacy protection protocols including traditional PKI (Public Key Infrastructure) distribution schemes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Rapid technology advances on electronic device and communication technologies, it has been probable to construct unmanned aerial vehicle (UAV) system, which can fly separately or can be manage slightly [10]. The small operating experience (adaptability, elasticity and easy equipment) usage of UAV assures the modern methods both military and civilian applications.…”
Section: Basic Concept Of Fanetmentioning
confidence: 99%