2018
DOI: 10.1007/978-981-10-8228-3_42
|View full text |Cite
|
Sign up to set email alerts
|

VANET: Security Attacks, Solution and Simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 6 publications
0
10
0
1
Order By: Relevance
“…X and Y in equation (3) represent the random variables, and the entropy of a random variable X is written as H (X).…”
Section: Data Pre-processingmentioning
confidence: 99%
See 1 more Smart Citation
“…X and Y in equation (3) represent the random variables, and the entropy of a random variable X is written as H (X).…”
Section: Data Pre-processingmentioning
confidence: 99%
“…The vehicles’ nodes communicate with each other and with the road side units (RSUs) through a communication unit in each vehicle called the on-board unit (OBU), which in turn is connected to the application unit (AU) to provide an application interface. 3 VANET supports both safety and non-safety applications. The main goal of its safety applications is to minimize accidents and improve driving safety by alerting drivers regarding collision avoidance, road sign notifications, and alarms for incident management.…”
Section: Introductionmentioning
confidence: 99%
“…Vehicle Ad-hoc Networks (VANETs) make use of a number of wireless inter-vehicle networking, such as dedicated short range communications (DSRCs), long-term evolutionary vehicle (LTE-V), and Worldwide Interoperability for Microwave Access (WiMAX) [34]. With the increasing movement toward vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-third-party devices (V2X) communication [36,37], security and privacy challenges correspondingly increase [34,38].…”
Section: Automotive Communicationmentioning
confidence: 99%
“…Through a vehicle's telematics system, such as General Motors' OnStar® or Hyundai's Blue Link®, "white hat hackers" 2 have shown the ability to attack using only an Internet connection [41]. With more outward-facing communication (e.g., V2V, V2I, and V2X), there is increasing risk for malicious actors to inject malware through VANETs [37,38,42,43].…”
Section: Degree Of Accessmentioning
confidence: 99%
“…Due to the opening wireless channel, VANETs faces various attacks (eg, the message replay attack, the denial of service attack, the tracing attacks etc [8][9][10] ) which make it urgent to verify the vehicles validity and messages integrity. On account of the messages complexity, it is also vital to increase the processing speed of RSUs.…”
Section: F I G U R Ementioning
confidence: 99%