A review on various security attacks in vehicular ad hoc networks

التفاصيل البيبلوغرافية
العنوان: A review on various security attacks in vehicular ad hoc networks
المؤلفون: Sami Abduljabbar Rashid, Ahmed Shamil Mustafa, Mohammed Salah Abood, Hussain Falih Mahdi, Lukman Audah, Mustafa Maad Hamdi, Ahmed Shakir Al-Hiti
المصدر: Bulletin of Electrical Engineering and Informatics. 10:2627-2635
بيانات النشر: Institute of Advanced Engineering and Science, 2021.
سنة النشر: 2021
مصطلحات موضوعية: Authentication, Control and Optimization, Vehicular ad hoc network, Computer Networks and Communications, Wireless ad hoc network, business.industry, Computer science, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Mobile ad hoc network, Computer security, computer.software_genre, Encryption, Field (computer science), Critical infrastructure, Hardware and Architecture, Control and Systems Engineering, Computer Science (miscellaneous), Attacks, Threats, V2I V2V, VANET, Confidentiality, Electrical and Electronic Engineering, business, Instrumentation, computer, Information Systems
الوصف: Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.
تدمد: 2302-9285
2089-3191
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::79afe2c0e1c0c3a99e3cee9c7ed99ba0
https://doi.org/10.11591/eei.v10i5.3127
حقوق: OPEN
رقم الأكسشن: edsair.doi.dedup.....79afe2c0e1c0c3a99e3cee9c7ed99ba0
قاعدة البيانات: OpenAIRE