STUDY ON THE IMPLEMENTATION OF PROTOCOLS FOR PROVIDING SECURITY IN AVERAGE VANET INTERVEHICULARY NETWORK COMMUNICATION SYSTEMS

被引:0
|
作者
Alexandrescu, R. V. [1 ]
Surugiu, Maria Claudia [2 ]
Petrescu, I. [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Elect Telecommun & Informat Technol, Bucharest, Romania
[2] Univ Politehn Bucuresti, Fac Transports, Remote Control & Elect Transports Dept, Bucharest, Romania
关键词
Vehicular Ad-Hoc Networks; protocol; communication V2V; structure message; seizing date packets; calculating the minimum carrier frequency;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The VANET type networks (Vehicular Ad-Hoc Networks) are a particular case of ad-hoc wireless networks. These networks are formed by equipping vehicles with short-range wireless communication devices. The development of VANET network applications and protocols brings some unique security issues dictated by the devices in use, vehicles' sporadic connectivity, the high degree of relevance given by their geographical location discovery. The paper presents a security protocol used in VANET networks (Vehicular Ad-Hoc Networks). The motivation behind this work is based on the current void of adequate mechanisms to ensure standardized property security in vehicular ad-hoc environments of today. Now, there is a serious lack of mechanisms for possible attack detection and also a lack of means to neutralize them. The solutions developed so far do not cover all security aspects, not being yet standardized and accepted among the scientific community. The security solution exposed in this paper is based on the vehicle's position when sending messages, the time when emission occurs, and existence of certification authorities in the area at the starting moment of information transmittal, which guarantees a secure message transmission in the VANET environment.
引用
收藏
页码:WW1 / WW6
页数:6
相关论文
共 50 条
  • [41] Study on Network Security Architecture for Power Systems
    By Chen Yan
    Electricity, 2005, (03) : 47 - 49
  • [42] Software implementation details of the secure data communication protocols stack based on the dynamic network topology
    Kushko, E. A.
    Parotkin, N. Y.
    INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING (APITECH-2019), 2019, 1399
  • [43] Implementation of a Modern Security Systems Honeypot Honey Network on Wireless Networks
    Wafi, Hibatul
    Fiade, Andrew
    Hakiem, Nashrul
    Bahaweres, Rizal Broer
    2017 INTERNATIONAL YOUNG ENGINEERS FORUM (YEF-ECE), 2017, : 91 - 96
  • [44] Security concerns and countermeasures in network coding based communication systems: A survey
    Talooki, Vahid Nazari
    Bassoli, Riccardo
    Lucani, Daniel E.
    Rodriguez, Jonathan
    Fitzek, Frank H. P.
    Marques, Hugo
    Tafazolli, Rahim
    COMPUTER NETWORKS, 2015, 83 : 422 - 445
  • [45] Security Against Communication Network Attacks of Cyber-Physical Systems
    Lima, Publio Macedo
    Silva Alves, Marcos Vinicius
    Carvalho, Lilian Kawakami
    Moreira, Marcos Vicente
    JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS, 2019, 30 (01) : 125 - 135
  • [46] Enhancing network security with hybrid feedback systems in chaotic optical communication
    Ashraf, M. Wasim Abbas
    Singh, Arvind R.
    Pandian, A.
    Bajaj, Mohit
    Zaitsev, Ievgen
    Rathore, Rajkumar Singh
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [47] Security Against Communication Network Attacks of Cyber-Physical Systems
    Públio Macedo Lima
    Marcos Vinícius Silva Alves
    Lilian Kawakami Carvalho
    Marcos Vicente Moreira
    Journal of Control, Automation and Electrical Systems, 2019, 30 : 125 - 135
  • [48] Benefits of Network Security and Mass Communication Systems for Journalism Education in Nigeria
    Wogu, Joseph Oluchukwu
    Ogbonna, Christian Alozie
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (04): : 11 - 22
  • [49] Study on two privacy-oriented protocols for information communication systems
    Taek-Young Youn
    Jongsung Kim
    Myung-Jae Lim
    Journal of Intelligent Manufacturing, 2014, 25 : 339 - 345
  • [50] Study on two privacy-oriented protocols for information communication systems
    Youn, Taek-Young
    Kim, Jongsung
    Lim, Myung-Jae
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 339 - 345