CFP last date
20 December 2024
Reseach Article

Analysis of Security Attack on VANET

Published on November 2015 by Priti R. Londhe
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 2
November 2015
Authors: Priti R. Londhe
750275c2-0f27-44c8-9f19-0c03285b61c8

Priti R. Londhe . Analysis of Security Attack on VANET. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 2 (November 2015), 23-27.

@article{
author = { Priti R. Londhe },
title = { Analysis of Security Attack on VANET },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 2 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/ncrmc2015/number2/23320-2918/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A Priti R. Londhe
%T Analysis of Security Attack on VANET
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 2
%P 23-27
%D 2015
%I International Journal of Computer Applications
Abstract

Vehicular Ad Hoc Networks(VANET) has basically picked up the consideration of today's examination endeavors ,while ebb and flow answers for accomplish secure VANET, to shield the system from foe assaults still insufficient ,attempting to achieve an acceptable level, for the driver and maker to accomplish wellbeing of life and infotainment. The requirement for a vigorous VANET systems is unequivocally reliant on their security and protection highlight s, which will be circle utilized as a part of this paper . In this paper a different kind of security issues and difficulties of VANET been examined and talked about; more additionally talk about an arrangement of arrangements present to explain these.

References
  1. M Raya, P Papadimitratos, JP Hubaux, "Securing Vehicular Communications", IEEE Wireless Communications, Vol 13, October 2006 .
  2. H Fussler, S Schnaufer, M Transier , W Effelsberg ,"Vehicular Ad-Hoc Networks: From Vision to Reality and Back", Proc. Of IEEE Wireless on Demand Network Systems and Services, 2007.
  3. GMT Abdalla, SM Senouci "Current Trends in Vehicular Ad Hoc Networks", Proceedings of UBIROADS workshop, 2007.
  4. M Raya, D Jungels, P Papadimitratos, I Aad, JP Hubaux,"Certificate Revocation in Vehicular Networks " , Laboratory for PC Communications and Applications (LCA) School of Computer and Communication Sciences ,EPFL, Switzerland, 2006 .
  5. B. Parno and A. Perrig, "Challenges in Securing Vehicular Networks", Proc. of HotNets-IV, 2005.
  6. I Aad, JP Hubaux, EW Knightly, "Effect of Denial of Service Attacks on Ad Hoc Networks", Networking, IEEE/ACM Transactions on Volume 16, August, 2008.
  7. M Raya, J Pierre Hubaux," The security of VANETs", Proceedings of the second ACM universal workshop on Vehicular impromptu systems, 2005.
  8. J. Douceur," the Sybil Attack", First International Workshop on Peer-to-Peer Systems, first ed, USA, Springer, 2003.
  9. F. Karnadi, Z. Mo, "Quick Generation of Realistic Mobility Models for VANET ", proc. IEEE Wireless Communications and Networking Conference, 2007.
  10. X Lin, R Lu, C Zhang, H Zhu, P Ho,and X Shen. "Security in Vehicular Ad Hoc Networks ", IEEE Communications Magazine, vol. 4, April 2008.
  11. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and JP Hubaux, "Eviction of Misbehaving and Faulty Nodes in Vehicular Networks ", IEEE Magazine, vol. 10, October 2007.
  12. R. Lind et al, . The system vehicle. A look into the eventual fate of portable media, IEEE Aerosp. Electron. Syst. Mag. , 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Vanet ivc rvc fcc