2018
DOI: 10.5121/ijnsa.2018.10202
|View full text |Cite
|
Sign up to set email alerts
|

VANET Security and Privacy - An Overview

Abstract: Even though vehicular ad-hoc networks (VANETs) bring tremendous benefits to society, yet they raise many challenges where the security and privacy concerns are the most critical ones. In this paper, we provide a detailed overview of the state-of-the-art security and privacy requirements in VANET. Also, a brief of the approachesthat are proposed in the literature to fulfil these requirements is given in this paper. Besides that, a classification of the various VANET attacks based on the communication system lay… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(31 citation statements)
references
References 50 publications
(70 reference statements)
0
31
0
Order By: Relevance
“…Marvy B. Mansour et al (2018) presented an outlook on the importance of Security and Privacy in the VANETs. The authors have also given the categorization of attacks that can be carried out on these kinds of networks.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Marvy B. Mansour et al (2018) presented an outlook on the importance of Security and Privacy in the VANETs. The authors have also given the categorization of attacks that can be carried out on these kinds of networks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Perennially varying Topology, elevated Mobility, and Self-Administration are exceptional traits of Vehicular Ad-Hoc Networks (VANETs) (Mansour et al, 2018). Despite having these remarkable qualities, they also possess some confrontations (Jadhao and Chaudhari, 2018;Li, Song, 2015) .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…He sends the traffic jam messages or false messages to other vehicles. The purpose is to direct vehicles on road to go away from other route for the favor of attacker [11][12][13][14].…”
Section: Attack On Identification and Authenticationmentioning
confidence: 99%
“…The attacker observes the target vehicle and sends harmful message to it. When it is overwhelmed with virus will take location of the vehicle and route of the vehicle in time constraint [9,14,18].…”
Section: Attack On Privacymentioning
confidence: 99%