2015
DOI: 10.1016/j.aej.2015.07.011
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Security Issues in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
102
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 195 publications
(102 citation statements)
references
References 34 publications
0
102
0
Order By: Relevance
“…Past literature has made quite important cases about existing vulnerabilities and their successful exploitation, in specific sectors of this ecosystem, such as Al-Kahtani [9], Mejri et al [47], Al-Sultan et al [10], di Pietro et al [22], and Mokhtar and Azab [49]. Further studies can now draw on those very useful contributions, in the context of our threat model, to assess the likelihood and impact of successful attacks through specific threat vectors, and how these risks can be mitigated by the solutions we propose, drafted under the perspective of attacks being performed by both casual and highly-skilled adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…Past literature has made quite important cases about existing vulnerabilities and their successful exploitation, in specific sectors of this ecosystem, such as Al-Kahtani [9], Mejri et al [47], Al-Sultan et al [10], di Pietro et al [22], and Mokhtar and Azab [49]. Further studies can now draw on those very useful contributions, in the context of our threat model, to assess the likelihood and impact of successful attacks through specific threat vectors, and how these risks can be mitigated by the solutions we propose, drafted under the perspective of attacks being performed by both casual and highly-skilled adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, different intrusion detection techniques can be used for protecting the communication of heterogeneous 5G mobile networks as discussed in a recent survey paper [135]. [136].…”
Section: (Zero Day) Malware Protectionmentioning
confidence: 99%
“…The nodes disclose their ID and their location with the attacker nodes. This type of attack can be encountered by using Public Key Infrastructure technique [13].…”
Section: Possible Attacks In Vanetmentioning
confidence: 99%
“…The actual work of the network is disrupted due to passage of this false information by the attackers for their own reasons. This type of attack can be encountered by using password technique for each message by which each receiving node will check for the authentication of the message [13].…”
Section: Possible Attacks In Vanetmentioning
confidence: 99%
See 1 more Smart Citation