M. Shahid, A. Jaekel, C. Ezeife, Qasim Al-Ajmi, Ikjot Saini
{"title":"Review of potential security attacks in VANET","authors":"M. Shahid, A. Jaekel, C. Ezeife, Qasim Al-Ajmi, Ikjot Saini","doi":"10.1109/MINTC.2018.8363152","DOIUrl":null,"url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Majan International Conference (MIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MINTC.2018.8363152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.