0% found this document useful (0 votes)
27 views6 pages

VANET Security: Issues, Challenges and Solutions: Rashmi Mishra Akhilesh Singh Rakesh Kumar

Uploaded by

Yasmeen Ragab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views6 pages

VANET Security: Issues, Challenges and Solutions: Rashmi Mishra Akhilesh Singh Rakesh Kumar

Uploaded by

Yasmeen Ragab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016

VANET Security: Issues, Challenges and Solutions


Rashmi Mishra
Akhilesh Singh Rakesh Kumar
Department of Computer Science and
Department of Computer Science and Department of Computer Science and
Engineering
Engineering Engineering
Madan Mohan Malaviya University of
Madan Mohan Malaviya University of Madan Mohan Malaviya University of
Technology, Gorakhpur, India
Technology, Gorakhpur, India Technology,Gorakhpur, India
rashmi.mar30@gmail.com
akhilesh840@gmail.com rkiitr@gmail.com

Abstract—Vehicular Ad-hoc Network (VANET) is an • Large storage capacity


infrastructure less network. It provides enhancement in safety • Energy sufficiency (as work over battery of vehicle).
related techniques and comfort while driving. It enables vehicles
• Predictable movement of nodes (as vehicles are bound to
to share information regarding safety and traffic analysis. The
scope of VANET application has increased with the recent follow a certain path along the road).
advances in technology and development of smart cities across According to architecture of VANET, it has following
the world. VANET provide a self aware system that has major components;
impact in enhancement of traffic services and in reducing road Ad hoc environment: It consists of intelligent vehicles
accidents. Information shared in this system is time sensitive (nodes) that have basically two components:
and requires robust and quick forming network connections. On Board Unit: It has communicational capabilities.
VANET, being a wireless ad hoc network, serves this purpose Application Unit: work behind OBU and executes program
completely but is prone to security attacks. Highly dynamic that enable OBU to communicate.
connections, sensitive information sharing and time sensitivity of
this network, make it an eye-catching field for attackers. This
Infrastructure environment: It consists of Road Side Units
paper represents a literature survey on VANET with primary and Access network.
concern of the security issues and challenges with it. Features of Two type of communication occur in VANET:
VANET, architecture, security requisites, attacker type and V2V: Pure wireless communication between vehicles.
possible attacks in VANET are considered in this survey paper. V2I: Communication between mobile nodes and
infrastructure unit RSU.
Keywords—VANET, Architecture of VANET; Sybil; ARAN;
SEAD Main concern in VANET is spontaneous networking, use of
infrastructures like RSU or cellular network is less
I. INTRODUCTION concerned.
Vehicular Ad hoc network consist of mobile nodes Internet
(vehicles embedded with sensors), fixed infrastructure (Road Access n/w
Side Access Point) and wireless interconnection to allow
them to talk with each other. The most important service
provided by these networks is driving safety. Almost 1.3
million people die in road accidents and additional 20-50
millions are injured worldwide. Road Traffic crashes ranked
as 9th leading cause of death [1]. Some survey shows that
60% of accidents can be avoided if the driver gets the RSU RSU
Infrastructure
warning even before half a second of the accident [2].
VANET are subset of ad-hoc network working over vehicular V2I environment Hot
domain. VANET has emerged as a solution and become a spot
key component of Intelligent Transportation System (ITS).
v2v
Main objective of ITS is improving traffic efficiency and OBU OBU
providing better road safety. VANET serves the purpose by
sharing road safety information, information related to traffic AU AU
analysis, normal data (files, audio, video etc) using Ad-hoc
Vehicle Vehicle domain
uninterrupted internet connectivity.
VANET differs from other ad-hoc wireless networks of the Fig.1 Architecture of VANET
same class in these terms:
• High processing power

978-1-4673-9939-5/16/$31.00 ©2016 IEEE

1050
VANET has vast application area classified as Security • Authentication: Authentication gives us an assurance
based application(covering Collision Avoidance, traffic that the information/message is generated by a genuine
analysis and interactive driving.) and User based user. In VANET nodes respond according to the
application(covering entertainment domain, internet information received from the other end, so it is very
connectivity on roads and other road side services such as necessary that the information propagating in the system
providing restaurant or fuel pump information). is true and generated by a legitimate user.
For easy and effective communication VANET use two • Reliability:Data receive in communication should be
prominent technologies; correct and factual. Periodic verification of the system is
done to eliminate the factually incorrect information.
IEEE 802.16 (Wireless MAN/WiMAX): Wireless • Integrity: The information received should not be altered
communication standard for MAN, designed to enable by any unauthorised user. Such alteration can harm the
multimedia application over wireless connections ranging up system and can cause serious catastrophic casualties.
to 30 miles. • Anonymity: Most of the time owners are driving vehicles
IEEE 802.11p (WAVE): Specially used for wireless access in such environment. So security measure must ensure
in vehicular domain. It enable V2V and V2I communication privacy of all genuine nodes.
in the licensed ITS band of 5.9 GHz. • Availability: These system handle urgent data, so data
should be available to all authorised user easily and
VANET require quick establishment of network due to efficiently.
high dynamicity of node. WAVE allows vehicles to • Delay handling: Safety information is time sensitive, so
communicate directly without prior authentication and latency should be avoid and handled.
association. Security measures provided by 802.11 standards • Confidentiality: Sensitive data should not be accessed by
cannot be applied in such circumstances. For ensuring unauthorised user.
confidentiality and authentication of data and nodes in
VANET, a lot of research is going but it still requires more VANET has a set of various features that provides the base to
attention of research community. stand alone in the field of its class. But sometimes these
features create obstacle in deployment of VANET. Such
The remaining part of the paper is organized as follows: challenges are categorised as Technical challenges(covering
Section IIexplains the need for security in VANET, security management of dynamicity of network, latency management,
prerequisites of the system and security challenges of congestion and collision analysis, atmospheric impact and
VANET. Section IIIspecifically focuses on attackers and Security challenges) and Social and Economical Challenges
their classification, type of attacks in VANET and prevention (covering cost impact and social acceptance of VANET) [5].
measures. Section IV includes possible solutions for those VANET provides safety and traffic analysis measures, so the
attacks. Finally, section V concludes the paper. information communicated must stay secure and the network
II. SECURITY REQUISITES AND CHALLENGES needs to be robust [24].We have considered the security
challenges to attain an efficient and secure VANET system.
Insecure transmission of information through VANET Major securities challenges need to be conquered by security
communication may result into catastrophe. So these system of VANET are [6]:
information need to be accurate, efficient and reliable. Every • Consistency of data: Any malicious alteration in life
single work in domain of VANET has an objective to provide critical information can lead to accidents, to avoid
road safety efficiently through frequent sharing of malicious activity from authenticated and non-
information among nodes of the network. Any successful authenticated nodes that cause inconsistency in data, some
attack can lead to serious accidents, loss of life or economical mechanism need to be designed. Cross checking of
loss. received information from various nodes is done to avoid
Security isneeded in Vehicular Ad-hoc network for following such activities.
reasons [25]: • High Mobility: VANET are highly mobile network so
they need less complex algorithm for security in spite of
• Sensitive information is being broadcasted in VANET being capable of high processing and storing power.
which in turn attract various attackers. • Error Tolerance: Receive and response action in
• No authentication and association measures are provided VANET is very quick, so any mistake in protocols or
in WAVE standard due to fast network establishment algorithm can harm the system harshly. So protocols need
need. to be designed taking this issue in consideration.
• Easy to attack due to infrastructure less model. • Latency Control: Information shared in this network is
• Very high chances of threat to privacy. time sensitive. To achieve real time restraint,
• Connections intrusion is very easydue to frequently cryptographic and other algorithm used in security must
changing topology. be fast and efficient.
VANET focuses on improving transportation safety, collision • Key Management: All algorithms used in VANET
avoidance, traffic efficiency and providing entertainment.So, security are key dependent. So creation,maintenance and
some prerequisites must be ensured by the deployed security distribution of keys need to be handled specially.
system.

1051
III. ATTACKS IN VANET, THEIR CLASSIFICATION
AND PREVENTIVE MEASURES ATTACKERS
Different types of attacks are possible in ad-hoc
environment, especially in vehicular domain. Impact of these
attacks over the system primarily depends over the intensions
of the attackers behind it.Attackers canposses’ malicious Basis of Basis of Basis of
behaviour for several reasons such that to get benefit of the
system facilities for which he is not a legitimate user, to get membership activity intensions
confidential data of the system or just to disturb the efficient Internal Active Rational
functionality of the network.These attackers can be classified
[2]:
External Passive Malicious
On the basis of Membership: Any authorised or
unauthorised node can perform malicious activity in the
network.Membership function highly affects the impact of Fig.2: Classification of attackers.
the attack and its prevention. There are two types of attackers
on this basis; Application Attack (AA): These types of attacks are
primarily concerned with the information being shared and
• Internal Attackers (Im):These are the authorised member with the application being served. Bogus information,
nodes that perform malicious activity to gain personal eavesdropping are the example of this class.
benefit or just to disturb the network. These attackers put
stronger impact than the external one. Timing Attacks (TA): These attacks perform alteration in
• External Attackers (Em): They are the intruders who try time slots of messages to add some delay.
to enter in network either by impersonation or other Social Attacks (SA): All such messages or attacks that create
attacks. emotional imbalance in other drivers come into this category.
On the basis of Activity: Whether an attacker is active and In this class of attacks unethical messages are sent to vehicles
makes frequent changes to network or not, the attackers are that disturb the driver and hence results into driving
classified as: disruption, loss of other prerequisites of security system.

• Active Attacker (Aa): These types of attackers try to alter Monitoring Attacks (MA): In these attacks, attacker silently
the network information and generate malicious packets monitors and tracks the whole system and can perform
and signals. Attacks made by them are more effective malicious activities based on those observations. All passive
than that made by passive attackers. attacks come into this category. Impersonation and session
hijacking can also be counted under this class.
• Passive Attackers (Pa): These types of attackers do not
alter the network information. They silently sense the Major attacks in VANET with some general prevention
network. schemes are as follows:
On the basis of Intensions: Any attack is associated with the Sybil: In this attack the compromised node declares itself as
intension of the attacker, i.e. main objective of the attacker several node, i.e. the vehicle announce its various position at
behind that attack. Following type of attackers are identified the same time or with frequent interval of time. It possibly
on this basis: creates confusion and security risk in network. Sybil attacks
harm network topology and can cause bandwidth
• Rational Attackers (Ri): These attackers seek personal
consumption [8].
benefit from the attacks and hence are more predictable.
• Malicious Attackers (Mi): These attackers not gain Network can be secured by this attack through [9]:
personal benefit from attacks. Their main motive is to
• Registration: Register vehicles in network with unique id
create obstacle in proper network functionality.
associated with it.
VANET operates over life critical and sensitive information. • Position Verification: Position of vehicles verified to
This information seems attractive to attackers; so this ensure that each node represent only one id.
network serves as a fertile region for such malicious
attackers. We are classifying VANET networks in five Table 1: Classification of attacks and their impact
different classes as follows [7];
Classes of attacks Prerequisites compromised
Network Attacks (NA): These are the most serious attacks.
The whole network got affected from this. They are the direct MONITORING ATTACKS authentication, anonymity
attacks over functionality of network and nodes. Attacks like SOCIAL ATTACKS all requisites may affected
DoS, Sybil etc are the example of this class. TIMING ATTACKS delay handling
APPLICATION ATTACKS authentication,reliability,
confidentiality, integrity
NETWORK ATTACKS authentication, availability, integrity

1052
• Radio Resource Testing: This approach works on puzzle compromised node get stronger position than other node
and assumes that computational resources are limited to and can perform attack like DoS, replay etc.
node and hence any Sybil attacker node will get too many
For prevention cryptographic techniques, hashing and digital
puzzles and not be able to solve them and get identified
signature are used.
[8].
Eavesdropping: This is a threat to confidentiality and is
This is not an effective measure as in VANET node can have
often occurred. The main objective of these attacks is getting
additional computational resource. The second approach has
confidential and sensitive data for which attacker is not a
assumption that ‘there is only one radio in each node’ and ‘a
legitimate person. These attacks fall in category of passive
radio can send or receive only on one channel at a time’. So
attacks where attacker silently sense the channel and get the
Sybil node working over different channel gets identified
information and further use that information for his own
[10].
benefit.
Impersonation: In impersonation attack, the attacker
These attacks can be prevented by encryption of sensitive and
represents itself as an authorised node. These attacks can
confidential data.
have objective of either to disturb the network or to gain
access to network privileges. These attacks are possible Location Trailing:These attacks directly target the privacy.
through identity theft or false attribute possession. In this attack position or path followed by the vehicle is
illegally trailed to trace the vehicle and to get private
Impersonation attacks can be avoided by using Trust
information about the driver.
Authority (TA) and a Public Key Infrastructure (PKI) [11].
TA knows the real identity of all the nodes. Whenever a For prevention of such attacks ID-based security systems can
vehicle communicates to any new RSU it first verifies its be used [13].
identity through TA and then shares the key to vehicle.
Replay Attacks: In these attacks the attacker imitates itself
Bogus Information: Attacker sends false information in the as legitimate user or as RSU and replay the transmission of a
network for personal benefit. For example a malicious node previously captured packet. Replay attacks target the
can send false information of heavy traffic due to an accident authenticity and confidentiality of the system.
over road and can make its route clear.
By using timestamps and global clock for all the nodes,
Hashing and asymmetric cryptography is used for their system can be prevented from these attacks.
handling.
Session Hijacking:In this attack the attacker get the unique
Denial of Service attacks:DoS attacks have serious impact Session Identifier (SID) assigned for each new session and
in any network. These attacks make the victim node through that get the control over the session. Network layer
unavailable to other legitimate user. This can be performed session hijacking has an advantage that at network layer only
by Jamming, SYN flooding or distributed DoS attacks. one time authentication is performed. After generation and
assignment of the SID, no authentication is done and hence
Prevention to these attacks can be done through IP-CHOCK
this attack takes advantage of this feature [14].
model. In this OBU analyse and update theIP information and
on finding any duplicate IP it identifies the chances of DoS Encryption, dual authentication, random SID generation etc
attacks [12]. are some preventive measures for these types of attacks [14].
Routing Attacks:These attacks exploit the routing protocol’s Timing Attacks: In this attack the malicious node when
loopholes and their vulnerability. Major attacks of this receive any data packet, it just not forward it but it alter the
category are: timeslot of the packet to create delay. As a result of it
neighbour of the compromised node get the message after the
• Blackhole Attack: In this attack, the compromised node time they suppose to receive it. Since information traversed
send false route with lower hop count to the source in in the network may be a sensitive information, especially in
order to attract it and when source node send data packet VANET information are time critical, so any latency can
to that route, the compromised node drops the packet. result into major accidents and casualty and serious traffic
• Grayhole Attacks: This attack is similar to black hole issues.
attack in term of dropping the packets but differ in a
context that these dropping are selected; i.e. only some Use of cryptographic solution such as TPM (Trusted Platform
selected type of packets are dropped and this selection is Module) can be used to prevent such attacks [15].
made according to need and intensions of the attacker. Table 2 represents the summarized view of attacks, attacker
• Wormhole Attack: The compromised nodes (two or types, attack class, their preventive measures in the basis of
more nodes are evolved to make tunnels) receive the properties violated.
packets at one end and tunnel it to the other end of the
network. Through tunnelling, hop count of the route Attacker type defined here, as (membership, activity and
containing the compromised node decreased and hence intensions) function (as explained in section III).Parameter
the route attracts packets toward it. In this way ‘both’ represents the fact that both type of attacker of that
class are capable of doing attack.

1053
Table 2: Summary of various attacks in VANET Ariadne: This protocol works over on-demand routing
protocol DSR [19]. Symmetric cryptographic operations
Property Attacks Attack Attacker Preventive work very efficiently in this protocol. One way hash function
Violated Class Measures and MAC are used for authentication and are communicated
Privacy Location MA (both, ID based system
Trailing both, Pi) between nodes using shared key. TESLA broadcast
Avail- DoS NA (both, Ma, IP info. Handling authentication technology is basis of this protocol. In route
ability Ai) discovery and authentication process TESLA time interval
Routing NA (Im,Ma, Ai) Cryptography, are used.
Attacks hashing etc.
Integrity Eavesdropp NA, (Im, both, Creation of Cipher SAODV: This protocol was proposed to embed security
and ing AA both) measures in AODV protocol [20]. All routing messages are
Confident Replay NA, (both, Time-stamping
iality AA, both, Ai)
digitally signed to insure authenticity and to protect hop
SA count hash functions are used. In this approach intermediate
Bogus Info. AA (Im, Ra, Ai) Hashing, node cannot send route reply even if the fresh route is known
asymmetric to them. Through Double Signature this problem can be
crypto.
solved but it increases the complexity of the system.
Authentici Sybil NA (Im, both, Registration,
ty Ai) Position A-SAODV: This protocol is an extension to SAODV that has
Verification,
Radio Resource an experimental feature of adaptive reply decision. Each
Testing etc. intermediate node can decide whether to send reply to source
Impersonati NA, (both, Trust Authority, node or not, depending on the queue length and threshold
on MA both, Ai) PKI conditions [21].
Timing TA (Im, Ma, Ai) Encryption
attack solution (TPM) One Time Cookie: Generally for session management,
session NA, (both, Encryption, cookies are assigned per session. But to prevent the system
hijacking MA both, Ai) Random SID
generation from session hijacking and theft of SID, this protocol gives
the concept of OTC (one time cookie) [22]. OTC generate
IV. VANET SECURITY SOLUTION token for each request and these token are tied to request
As discussed above, VANET are susceptible to various using HMAC to prevent the re-use of the token.
kinds of attacks. Since research in this field has new and Table 3: Summary of security solutions
interesting scope, various effective works has been done to
provide security solution in VANET. In this section some Solution Technology Attack
solution are being discussed for VANET security. ARAN Cryptographic Replay attack
ARAN: This routing protocol, named as Authenticated Technique Impersonation
Routing for Ad-hoc Network (ARAN), is an AODV based Eavesdropping
protocol [16]. In this approach, a third party CA is present
SEAD One way hash function DoS
that provide signed certificate to nodes. Each node coming
technique Routing attack
into the network need to sent request certificate to CA. Public
Impersonation
key of CA is known to all authorised nodes. Asymmetric
cryptographic technique is used for authenticated secure route Ariadne Symmetric DoS
discovery and timestamps are used for freshness of route. cryptography Routing attack
technique, MAC Replay attack
ARAN basically has 5 steps [16]; SAODV Digital signature, hash Routing attack
function Impersonation
• Certification
Bogus
• Authenticated Route Discovery
information
• Authenticated Route Setup
A-SAODV Digital signature, hash Routing attack
• Route Maintenance function Impersonation
• Key Revocation Bogus info.
Route authentication process is done at each step, through One Time Random cookie Session
addition of sign and certificate of each intermediate node, so Cookie generation hijacking
Impersonation problems are solved by this protocol. ECDSA Elliptical curve Bogus
parameter, digital information
SEAD: Secure and Efficient Ad hoc Distance vector protocol signature Impersonation
work over DSDV. It uses one way hash function for RobSAD Motion pattern analysis Sybil Attack
authentication process. This protocol protects against
incorrect routing. It uses destination-sequence number to Holistic ID Registration Impersonation
ensure freshness of the route and to avoid long lived route. At Protocol Technique
each intermediate node hashing is applied to ensure the
authenticity of routes.

1054
ECDSA: Elliptical Curve Digital Signature Algorithm [23], [8] J. Douceur, “The Sybil Attack”, in First International Workshop on
Peer-to-Peer Systems, 2002, pp. 251-260.
as the name suggests this algorithm use digital signature.
[9] Bin Xiao, Bo Yu, Chuanshan Gao, “Detection and localization of
With hash function and asymmetric cryptographic operations
Sybil nodes in VANETs”, in DIWANS ’06, pp. 1-8.
authenticity and security is provided in this system. Both the
[10] J. Newsome, E. Shi, D. Song, A. Perrig, “Loc & Defenses”, in
sender and receiver need to be agreed upon elliptical curve International symposium on information processing in sensor
domain parameters. networks, 2004, pp. 259-268.
[11] T.W. Chima, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li, “SPECS:
RobSAD: Robust method for Sybil Attack Detection [17], Secure and privacy enhancingcommunications schemes for
the main concept behind this method is that two different VANETs”, in Journal of Ad Hoc Networks 9, 2011, pp. 189-203.
vehicles cannot have same motion pattern while driven by [12] Karan Verma, Halabi Hasbullah, Ashok Kumar, “Prevention of DoS
different drivers, since each person drive according to his Attacks in VANET”, in Wireless Personal Communications,
comfort and need. Identification of Sybil node is done by November 2013, Volume 73, Issue 1, pp 95-126.
finding two or more nodes having same motion trajectories. [13] Jinyuan Sun, Chi Zhang; Yanchao Zhang; Yuguang Fang, "An
Identity Based Security System for User Privacy in Vehicular Ad Hoc
Holistic Protocol: This protocol defines the authentication Networks," Parallel and Distributed Systems, IEEE Transactions on,
technique by registering vehicle by RSU [3]. In vol.21, no.9, pp.1227, 1239.
registrationphase vehicle send Hello message to RSU then in [14] Rashmi Mishra, Sweta Singh, Akhilesh Singh, “Session Seizure:
Hijacking” in National Conference on Contemporary Computing and
response RSU prepares Registration id (consisting licence Informatics, May 8, 9 2015, pp 227-229.
number and vehicle registration number) and send to vehicle. [15] G. Guett, C. Bryce, “Using TPMs to Secure Vehicular Ad-Hoc
Further the authentication is done through certificate Networks (VANETs) ”, in IFIP 2008, WISTP 2008, LNCS 5019,
provided by RSU. If the node is authenticated then only data 2008, pp.106-116.
is shared with it otherwise the node is blocked. [16] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding-Royer,
"A Secure Routing Protocol for Ad Hoc Networks", Proceeding of
V. CONCLUSION IEEE ICNP 2002, pp 78-87, Nov 2002.
[17] I. Chen Chen, Xin Wang, Weili Han, Binyu Zang, “A Robust
VANET being a safety information sharing medium, Detection of the Sybil Attack in Urban VANETs ”, in Distributed
needs secure and safe environment. VANET has very wide Computing Systems Workshop, ICDCS Workshops ’09. 29th IEEE
scopefor attacks due to its highly dynamic nature, wireless International Conference, 2009, pp. 270-276, 2009.
medium of communication and frequently changing [18] Y. C. Hu, D. B. Johnson, A. Perrig, "SEAD: Secure efficient distance
topology.Security issues and challenges related to VANET vector routing for mobile wireless ad hoc networks", Elsevier B. V.,pp
175-192, 2003.
have very high impact on efficient functionality of the
[19] Y. C. Hu,A. Perrig, D. B. Johnson, "Ariadne: A Secure On-Demand
system.Today, VANET are being widely deployed due to its Routing Protocol for Ad Hoc Networks", MobiCom'02, pp. 23-26,
enhancing features of providing safe, secure and comfort 2002.
driving.VANET, features of VANET, need of security in [20] M. Guerrero, N. Asokan, “Securing Ad hoc Routing Protocols,” Proc.
VANET are the hot topics related to the current scenario. In 1st ACM Wksp. Wireless Sec., Sept. 2002, pp. 1–10.
this paper, we have done a literature survey about various [21] Davide Cerri, Alessandro Ghioni, CEFRIEL — Politecnico di Milano,
types of attacks, their preventive measures, type of attackers “Securing AODV: The A-SAODV Secure Routing Prototype”, in
IEEE Communication Magazine, Feb 2008.
and some existing security solution for attacks in VANET.
[22] Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick
Traynor, "One-Time Cookies: Preventing Session Hijacking Attacks
References with Stateless Authentication Tokens" in Converging Infrastructure
Security (CISEC) Laboratory Georgia Institute of Technology.
[1] Road Crash Statistics- Association for Safe International Road Travel.
Available: [23] S. S. Manvi, M. S. Kakkasageri, D. G. Adiga, “Message
Authentication in Vehicular Ad hoc Networks: ECDSA Based
http://asirt.org/initiatives/informing-road-users/road-safety-facts/road- Approach”, in International Conference on Future Computer and
crash-statistics Communication, 2009, pp. 16-20.
[2] Maxim Raya et al., “The Security of Vehicular Ad Hoc Networks”, [24] S. Yousefi, M. S. Mousavi, M. Fathy, “Vehicular Ad Hoc Networks
SASN’05, Nov 7 2005, Alexandria, Virginia, USA, pp. 11-21 (VANETs): Challenges and Perspectives”, in ITS
[3] K. S. Tamil Selvan, R. Rajendiran, “A Holistic Protocol for Secure Telecommunications Proceedings’06, pp. 761-766, 2006.
Data Transmission in VANET ”, in International Journal of Advanced
[25] M. Feiri, J. Petit, R. K. Schmidt, F. Kargl, “The impact of security on
Research in Computer and Communication Engineering, 2013, pp.
cooperative awareness in VANET”, Vehicular Networking
4840-4846.
Conference (VNC), 2013 IEEE, pp. 127-134, Dec 2013.
[4] Yaseer Toor, Paul Miihlethaler, Anis Laouiti, Arnaud De La Fortelle,
“Vehicle Ad Hoc Networks: Applications and Related Technical
issues”, IEEECommunications surveys & Tutorials, 3rd quarter 2008,
vol 10, No 3, pp. 74-88.
[5] Hannes Hartenstein, K. P. Laberteaux, “A tutorial survey on vehicular
Ad Hoc Networks”, IEEE Communication Magazine, June 2008, pp.
164-171.
[6] H. Moustafa, Y. Zhang,“Vehicular networks: Techniques, Standards,
and Applications”. CRC Press, (2009).
[7] Irshad Ahmed, Iftikhar Ahmad, Halabi Hasbullah, Jamalul-lail bin Ab
Manan, “Classes of attacks in VANET”, in Tenth International
Conference on Wireless and Optical Communications Networks
(WOCN), pp 1 - 5, 2013.

1055

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy