A Review on VANET Security Attacks and Their Countermeasure

被引:0
作者
Deeksha [1 ]
Kumar, Ajay [1 ]
Bansal, Manu [1 ]
机构
[1] Thapar Univ, Elect & Commun Dept, Patiala, Punjab, India
来源
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17) | 2017年
关键词
Authentication; Attacks; Cryptography; DSRC; ECDSA; MANETs; Privacy; Security; VANETs; V2V communication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the development of smart cities across the world VANET plays a vital role for optimized route between source and destination. The VANETs is based on infrastructure less network. It facilitates vehicles to give information about safety through vehicle to vehicle communication (V2V) or vehicle to infrastructure communication (V2I). In VANETs wireless communication between vehicles so attackers violate authenticity, confidentiality and privacy properties which further effect security. The VANET technology is encircled with security challenges these days. This paper presents overview on VANETs architecture, a related survey on VANET with major concern of the security issues. Further, prevention measures of those issues, and comparative analysis is done. From the survey, found out that encryption and authentication plays an important role in VANETS also some research direction defined for future work.
引用
收藏
页码:580 / 585
页数:6
相关论文
共 20 条
[1]  
Al Hasan A. S., 2016, C ADV COMP COMM INF, P21
[2]  
[Anonymous], 2010, P INT C NETW APPL PR
[3]  
[Anonymous], P IEEE GLOB TEL C
[4]  
Bariah L., 2015, Recent advances in VANET security: a survey, P1
[5]  
Barskar R., 2015, International Journal of Computer Applications, V123
[6]  
Bhardwaj I., 2015, INT J COMPUTER APPL, V132
[7]   Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety [J].
Biswas, S ;
Tatchikou, R ;
Dion, F .
IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (01) :74-82
[8]  
Bittl S, 2015, IEEE CONF COMM NETW, P344, DOI 10.1109/CNS.2015.7346845
[9]  
Chen L, 2013, PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), P134
[10]  
Chetan V. S., 2013, 4 INT C COMP COMM NE, P1