Security attacks and solutions for vehicular ad hoc networks

被引:131
作者
Isaac, J. T. [1 ]
Zeadally, S. [2 ]
Camara, J. S. [3 ]
机构
[1] Univ Carabobo, Comp Sci Dept FACYT, Sect Barbula, Valencia, Venezuela
[2] Univ Dist Columbia, Dept Comp Sci & Informat Engn, Washington, DC USA
[3] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
10.1049/iet-com.2009.0191
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years. They have become a fundamental component of many intelligent transportation systems and VANETs are being used to improve road safety and enable a wide variety of value-added services. Many forms of attacks against VANETs have emerged recently that attempt to compromise the security of such networks. Such security attacks on VANETs may lead to catastrophic results such as the loss of lives or loss of revenue for those value-added services. Therefore making VANETs secure has become a key objective for VANET designers. To develop and deploy secure VANET infrastructures remains a significant challenge. The authors discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to thwart those attacks.
引用
收藏
页码:894 / 903
页数:10
相关论文
共 16 条
[1]  
[Anonymous], 4 WORKSH HOT TOP NET
[2]  
[Anonymous], 5 IEEE CONS COMM NET
[3]  
BERTHOLD O, 2000, 10 C COMP FREED PRIV, P57
[4]   Strengthening Privacy Protection in VANETs [J].
Burmester, Mike ;
Magkos, Emmanouil ;
Chrissikopoulos, Vassilis .
2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, :508-513
[5]   A mechanism to enforce privacy in vehicle-to-infrastructure communication [J].
Cencioni, Paolo ;
Di Pietro, Roberto .
COMPUTER COMMUNICATIONS, 2008, 31 (12) :2790-2802
[6]  
FLORIAN D, 2005, INT C WORLD WIR MOB, P454
[7]   Key management in vehicular ad-hoc networks [J].
Langley, Christopher ;
Lucas, Raul ;
Fu, Huirong .
2008 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2008, :223-226
[8]  
Leinmuller T., 2006, The 3rd international workshop on Vehicular ad hoc networks, P57
[9]   Probabilistic isolation of malicious vehicles in pseudonym changing VANETs [J].
Liu, Bisheng ;
Zhong, Yiping ;
Zhang, Shiyong .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :967-972
[10]  
Lo NW, 2007, IEEE GLOBE WORK, P69