Vanet Security and Privacy – An Overview
DOI:
https://doi.org/10.26438/ijcse/v7i7.105108Keywords:
VANETs, Attacks, SECURITY AND PRIVACY REQUIREMENTSAbstract
Nearly 1.5 million people die from vehicles accidents per year and nearly 20 million are injured or physically disabled. we can be avoided 60 percent of accidents by using sufficient warnings system. For increasing safety in vehicles, we have Vehicular Ad hoc networks (VANETs) system. This System Designed to increase safety, driving efficiency and make the driving experience more reliable. VANETs connect vehicle into a huge mobile ad hoc network share data on a bigger scale. However, communicating in a free environment makes security and privacy issue an actual challenge, which may disrupt the VANETs system. Researchers have found a resolution to this problem. In this paper, I talked about the different techniques and security parameter which may reflect security and privacy in VANET system.
References
[1]. Zing Zhu, Sumit Roy, "MAC(Media Access Control) for DSRC (Dedicated Short Range Communication) in Intelligent Transport System", IEEE Commun. Mag., vol. 41, no. 12, pp. 60-67, Dec. 2003.
[2].G. Samara, Wafaa A.H. Al-Salihy, R. Sures" study of a security review of vehicular ad hoc networks (VANET)" National Advanced IPv6 Centre, Universitiy Sains Malaysia, 2010.
[3].K. B.Sahare and DR.L.G.Malik, " Review- Method for Detection of Attacks in VANET", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014.
[4]. M. Elsa Mathew and A.Raj Kumar p." threat examination and safety mechanisms in Vanet" international journal of advanced research in computer science and software engineering volume 3, issue 1, Jan 2013.
[5]. Ajmal, S., Rasheed, A., Qayyum, A., Hasan, A.: Classification of VANET MAC, Routing and approaches a detailed survey. J. UCS 20(4), 462–487 (2014).
[6]. Rasheed, A., Zia, H., Hashmi, F., Hadi, U., Naim, Warda, Ajmal, Sana: Fleet & convoy management using VANET. J. Comput. Netw. 1(1), 1–9 (2013).
[7]. Sajjad Akbar, M., Rasheed, A., Qayyum, A.: VANET architectures and protocol stacks: a survey. In: InternationalWorkshop on Communication Technologies for Vehicles, pp. 95–105. Springer, Berlin, Heidelberg (2011).
[8]. Liang, W., Li, Z., Zhang, H., Wang, S., Bie, Rongfang: Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. Int. J. Distrib. Sens. Netw. 2015, 17(2015).
[9]. Da Cunha, F.D., Boukerche, A., Villas, L., Carneiro Viana, A., Loureiro, Antonio AF.: Data communication in VANETs: a survey, challenges and applications. Ph.D. diss., INRIA Saclay; INRIA (2014).
[10]. Ajmal, Sana, Jabeen, Samra, Rasheed, Asim, Hasan, Aamir: An intelligent hybrid spread spectrum MAC for interference management in mobile ad hoc networks. Comput. Commun. 72, 116–129 (2015)
[11]. Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4 1British University in Egypt, Cairo, Egypt 2,3Computer and Systems Engineering Department, Ain Shams University, Cairo, Egypt 4Avelabs, Cairo, Egypt – Munich, Germany.
[12].A. Yusri Dak, "A Literature Survey on Security Difficulties in VANETs", International Journal of Computer Theory And Engineering, Volume 4, No. 6, December 2012.
[13]. You Lu, Biao Zhou, Fei Jia, and M. Gerla, "Group-based Secure Source Authentication(GSA) Protocol for VANETs", IEEE Globecom 2010 Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks.
[14]. Road Safety Facts — Association for Safe International Road Travel.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
