2016
DOI: 10.1007/978-81-322-2656-7_60
|View full text |Cite
|
Sign up to set email alerts
|

Review on Security Attacks and Mechanism in VANET and MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…There exist numerous articles presenting a classification of attacks in VANETs based on the stack of network layers. On the basis of the layer used by attackers, that attack is classified . For instance, the eavesdropping vehicle, by physical and data link layers, can jam the communicating channel through transmitting unimportant messages that congest the traffic and gain high load over that channel.…”
Section: The Proposed Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…There exist numerous articles presenting a classification of attacks in VANETs based on the stack of network layers. On the basis of the layer used by attackers, that attack is classified . For instance, the eavesdropping vehicle, by physical and data link layers, can jam the communicating channel through transmitting unimportant messages that congest the traffic and gain high load over that channel.…”
Section: The Proposed Algorithmmentioning
confidence: 99%
“…In Figure 1, the defender strategies of a defender node are shown. On the other side, the attacker player can select its strategy from S attacker = 36 where A j can be any of the attacks in VANET. Figure 2 illustrates the attacker strategies.…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacker observes the target vehicle and sends harmful message to it. When it is overwhelmed with virus will take location of the vehicle and route of the vehicle in time constraint [9,14,18].…”
Section: Attack On Privacymentioning
confidence: 99%
“…Even if there are some connections to the nodes, they will not affect the decisions of the network management. On the other hand, due to the unpredictable environment of vehicles, all the traditional routing protocols which are applied for MANETs cannot be applied to VANETs [3] [4]. Hence, during the recent years, many new routing protocols have been proposed explicitly for VANETs which deals with its unique characteristics and also aim at routing the information within vehicular as well as road-side nodes.…”
Section: Introductionmentioning
confidence: 99%