VANET: Its Applications, Security Requirements, Types of Attacks and its Corrective Measures

被引:0
|
作者
Choudhary, Shivani [1 ]
Purohit, Kamlesh [2 ]
机构
[1] Graph Era Hill Univ, Dehra Dun, India
[2] Graph Era Univ, Dehra Dun, India
关键词
RSU; DSRC; VANET; MANET; V2V; V2I; ITS; WAVE; I2V;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
VANET is a self-organizing architecture which comprises of mobile nodes(vehicle) and these nodes communicate with each other forming Intelligent Transportation System(ITS),such that Vanet helps in contributing in improved road safety and efficiency, traffic monitoring and safety. In this review paper, we have covered various aspects related to Vanet such as its architecture, characteristics, applications, standard and security attacks in vanet as well as its security requirements.
引用
收藏
页码:883 / 888
页数:6
相关论文
共 50 条
  • [1] A Survey on VANET attacks and its Security Mechanisms
    Sapala, Tejaswi
    Penumallu, Rama Chandra Suresh Reddy
    Kiran, Reddy Sai
    Rajesh, M.V.
    Devi, B.S. Kiruthika
    [J]. PDGC 2022 - 2022 7th International Conference on Parallel, Distributed and Grid Computing, 2022, : 435 - 440
  • [2] Overview of VANET: Requirements and its Routing Protocols
    Jain, Monika
    Saxena, Rahul
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 1957 - 1961
  • [3] ITS standards security requirements
    不详
    [J]. ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 1999, 69 (10): : 20 - 20
  • [4] ITS standards security requirements
    不详
    [J]. ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 1999, 69 (09): : 27 - 27
  • [5] Attacks on Bluetooth Security Architecture and Its Countermeasures
    Iqbal, Mian Muhammad Waseem
    Kausar, Firdous
    Wahla, Muhammad Arif
    [J]. INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 190 - 197
  • [6] VANET: Architectures, Research Issues, Routing Protocols, and its Applications
    Dixit, Mayank
    Kumar, Rajesh
    Sagar, Anil Kumar
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 555 - 560
  • [7] MULTI-OBJECTIVE CLUSTERING METHODOLOGIESAND ITS APPLICATIONS IN VANET
    Amudhavel, J.
    Kumar, Prem K.
    Narmatha, T.
    Sampathkumar, S.
    Jaiganesh, S.
    Vengattaraman, T.
    [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [8] Security Attacks and Its Countermeasures in Wireless Sensor Networks - A
    Kiruthika, B.
    Abinaya, S.
    Ezhilarasie, R.
    Umamakeswari, A.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (03): : 1374 - 1387
  • [9] Robots and its types for industrial applications
    Singh, Gurjeet
    Banga, V. K.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 60 : 1779 - 1786
  • [10] Science and its applications to societal security
    Parthasarathi, A
    [J]. CURRENT SCIENCE, 2004, 87 (09): : 1174 - 1175