Review on Security Issues in Vehicular Adhoc Networks (VANETS)

Jayant Vats, Gaurav Tejpal, Sonal Sharma

Abstract


Primary intent behind this article is to develop an extensive understanding of VANETs; second to classify various types of existing attacks like gray hole attack, black hole attack, phony details attacks Sybil attacks and DOS to classified routing protocols. This article seeks to go over briefly the challenges faced in imparting the many routing attacks.


Keywords


Architecture, Attacks in Vanets, Security requirements

Full Text:

PDF

References


Sun X, Xia-miao L. Study of the feasibility of VANET and its routing protocols. International Conference on Wireless Communications, Networking and Mobile Computing, China. 2008. pp. 1-4. DOI: 10.1109/WiCom.2008.1021.

Sabahi F. The security of Vehicular Ad hoc Networks. International Conference on Computational Intelligence, Communication Systems and Networks, 2011. pp. 337-342

Chowdhury SI, Won-Il L, Youn-Sang C, et al. Performance Evaluation of reactive routing protocols in VANET. Asia-Pacific Conference on Communications, Malaysia. 2011. pp. 559-564. DOI: 10.1109/APCC.2011.6152871.

Saeed Al-kahtani M. Survey on security attacks in Vehicular Ad hoc Networks (VANETs). International Conference on Signal Processing and Communication Systems, Australia. 2012. DOI: 10.1109/ICSPCS.2012.6507953.

Hanshi SM, Kadhum MM. Geographic routing protocol issues in Vehicular Ad Hoc Networks. International Conference on RFID Technologies and Applications, Malaysia. 2013. DOI: 10.1109/RFID-TA.2013.6694538.

Soni P, Sharma A. Sybil node detection and prevention approach on physical location in VANETS. International Journal of Advanced Research in Computer Science and Software Engineering 2015; 5(7): 1161-4.

Newlin Rajkumar M, Nithya M, Hemalatha P. Overview of VANET with its features and security attacks. International Research Journal of Engineering and Technology 2016; 3(1): 137-42.

Senthil Ganesh N, Ranjani S. Security threats on Vehicular Ad Hoc Networks (VANET): a review paper. National Conference on Recent Trends in Computer Science and Technology 2013; 4(6): 196-200.

Kumar R, Dave M. A comparative study of various routing protocols in VANET. International Journal of Computer Science Issues 2011; 8(4): 643-8.

Nema M, Stalin S, Lokhande V. Analysis of attacks and challenges in VANET. International Journal of Emerging Technology and Advanced Engineering 2014; 4(7): 831-5.

Porwal V, Patel R, Kapoor RK. Review of internal security attacks in Vehicular Ad hoc Networks (VANETs). International Journal of Engineering Research and Technology 2014; 3(8): 633-9.

Bharat M, Santhi Sree K, Mahesh Kumar T. Authentication solution for security attacks in VANETs. International Journal of Advanced Research

in Computer and Communication Engineering 2014; 3(8): 7661-4.

Sari A, Onursal O, Akkaya M. Review of the security issues in Vehicular Ad Hoc Networks (VANET). International Journal of Computer Network and Security 2015; 8: 552-66.

Safinejhad Y, Abdali M. Various types of attacks in VANETs. International Journal of Computer and Information Technologies 2015; 3(4): 808-13.

Sirola P, Joshi A, Purohit KC. An analytical study of routing attacks in Vehicular Ad-hoc Networks (VANETs). International Journal of Computer Science Engineering 2014; 3(4): 210-8.


Refbacks

  • There are currently no refbacks.