Open Access   Article Go Back

Vanet Security and Privacy – An Overview

D. Kumar1 , V. Sindhu2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 105-108, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.105108

Online published on Jul 31, 2019

Copyright © D. Kumar, V. Sindhu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Kumar, V. Sindhu, “Vanet Security and Privacy – An Overview,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.105-108, 2019.

MLA Style Citation: D. Kumar, V. Sindhu "Vanet Security and Privacy – An Overview." International Journal of Computer Sciences and Engineering 7.7 (2019): 105-108.

APA Style Citation: D. Kumar, V. Sindhu, (2019). Vanet Security and Privacy – An Overview. International Journal of Computer Sciences and Engineering, 7(7), 105-108.

BibTex Style Citation:
@article{Kumar_2019,
author = {D. Kumar, V. Sindhu},
title = {Vanet Security and Privacy – An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {105-108},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4730},
doi = {https://doi.org/10.26438/ijcse/v7i7.105108}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.105108}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4730
TI - Vanet Security and Privacy – An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - D. Kumar, V. Sindhu
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 105-108
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
336 236 downloads 145 downloads
  
  
           

Abstract

Nearly 1.5 million people die from vehicles accidents per year and nearly 20 million are injured or physically disabled. we can be avoided 60 percent of accidents by using sufficient warnings system. For increasing safety in vehicles, we have Vehicular Ad hoc networks (VANETs) system. This System Designed to increase safety, driving efficiency and make the driving experience more reliable. VANETs connect vehicle into a huge mobile ad hoc network share data on a bigger scale. However, communicating in a free environment makes security and privacy issue an actual challenge, which may disrupt the VANETs system. Researchers have found a resolution to this problem. In this paper, I talked about the different techniques and security parameter which may reflect security and privacy in VANET system.

Key-Words / Index Term

VANETs, Attacks, SECURITY AND PRIVACY REQUIREMENTS

References

[1]. Zing Zhu, Sumit Roy, "MAC(Media Access Control) for DSRC (Dedicated Short Range Communication) in Intelligent Transport System", IEEE Commun. Mag., vol. 41, no. 12, pp. 60-67, Dec. 2003.
[2].G. Samara, Wafaa A.H. Al-Salihy, R. Sures" study of a security review of vehicular ad hoc networks (VANET)" National Advanced IPv6 Centre, Universitiy Sains Malaysia, 2010.
[3].K. B.Sahare and DR.L.G.Malik, " Review- Method for Detection of Attacks in VANET", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014.
[4]. M. Elsa Mathew and A.Raj Kumar p." threat examination and safety mechanisms in Vanet" international journal of advanced research in computer science and software engineering volume 3, issue 1, Jan 2013.
[5]. Ajmal, S., Rasheed, A., Qayyum, A., Hasan, A.: Classification of VANET MAC, Routing and approaches a detailed survey. J. UCS 20(4), 462–487 (2014).
[6]. Rasheed, A., Zia, H., Hashmi, F., Hadi, U., Naim, Warda, Ajmal, Sana: Fleet & convoy management using VANET. J. Comput. Netw. 1(1), 1–9 (2013).
[7]. Sajjad Akbar, M., Rasheed, A., Qayyum, A.: VANET architectures and protocol stacks: a survey. In: InternationalWorkshop on Communication Technologies for Vehicles, pp. 95–105. Springer, Berlin, Heidelberg (2011).
[8]. Liang, W., Li, Z., Zhang, H., Wang, S., Bie, Rongfang: Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. Int. J. Distrib. Sens. Netw. 2015, 17(2015).
[9]. Da Cunha, F.D., Boukerche, A., Villas, L., Carneiro Viana, A., Loureiro, Antonio AF.: Data communication in VANETs: a survey, challenges and applications. Ph.D. diss., INRIA Saclay; INRIA (2014).
[10]. Ajmal, Sana, Jabeen, Samra, Rasheed, Asim, Hasan, Aamir: An intelligent hybrid spread spectrum MAC for interference management in mobile ad hoc networks. Comput. Commun. 72, 116–129 (2015)
[11]. Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4 1British University in Egypt, Cairo, Egypt 2,3Computer and Systems Engineering Department, Ain Shams University, Cairo, Egypt 4Avelabs, Cairo, Egypt – Munich, Germany.
[12].A. Yusri Dak, "A Literature Survey on Security Difficulties in VANETs", International Journal of Computer Theory And Engineering, Volume 4, No. 6, December 2012.
[13]. You Lu, Biao Zhou, Fei Jia, and M. Gerla, "Group-based Secure Source Authentication(GSA) Protocol for VANETs", IEEE Globecom 2010 Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks.
[14]. Road Safety Facts — Association for Safe International Road Travel.