Author : Aditi Selokar 1
Date of Publication :7th August 2016
Abstract: In this century,there is continuously increasing the automobile industry market and their safety related applications.This safety applications could be provided to the driver and passenger for getting comfort and secure feeling. But as per the nature rules, each coins has two sides one is tail and other is head.In such a way that all the application run in the nature has two sides,one is its advantage and other is disadvantage.In such way that VANET have the two side, first one is VANETs applications and second side is VANET attacks.In first side VANET can provide the security by broadcasting the messages to the vehicles by sending the various types of warning messages like collision warning, lane change warning, work zone warning, inter-vehicle communications, etc. It means that VANET provide the all types of safety related application to secure the human lives and provide to comfort feeling to driver and passenger. But in other side the VANET application would be interrupted by the attacker and this is the main disadvantage of the VANET. In VANET, there are various types of attack and attacker can attack on the VANET application such as interrupt the message, changing the order of the messages, retransmission's of message again and again, jamming the network, false information transmission, etc. In this paper we can discuss the various types of attacks and its prevention techniques.
Reference :
-
- Kyung-Ah Shim “Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 11, NOVEMBER 2013.
- Attila Altay Yavuz “An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, OCTOBER 2014.
- Neeraj Kumar and Jong-Hyouk Lee “Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications” IEEE SYSTEMS JOURNAL, VOL. 8, NO. 4, DECEMBER 2014.
- Senthil Ganesh N. Ranjani S. “Security Threats on Vehicular Ad Hoc Networks (VANET)” International Journal of Electronics Communication and Computer Engineering Volume 4, Issue (6)NCRTCST-2013, ISSN 2249–071X.
- Vinh Hoa LA, Ana CAVALLI “Security Attacks And Solutions in vehicular Ad-hoc network” International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014.
- Agrawal, Aditi Garg, Niharika Chaudhiri, Shivanshu Gupta, Devesh Pandey, Tumpa Roy “ Security on Vehicular Ad Hoc Networks (VANET)” International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013).
- Greeshma Sarath1 , Devesh C Jinwala2 and Sankita Patel,” A Survey On Elliptic Curve Digital Signature Algorithm And Its Variants” Dhinaharan Nagamalai et al. (Eds) : CSE, DBDM, CCNET, AIFL, SCOM, CICS, CSIP – 2014 pp. 121–136, 2014. © CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4411
- Mehdi Khabazian, Member, IEEE, Sonia Aïssa, Senior Member, IEEE, and Mustafa Mehmet-Ali, Member, IEEE “Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks” IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 14, NO. 1, MARCH 2013.
- Josiane Nzouonta, Neeraj Rajgure, Guiling Wang, Member, IEEE, and Cristian Borcea, Member, IEEE “VANET Routing on City Roads using Real-Time Vehicular Traffic Information” December 14, 2007; revised July 24, 2008 and December 23, 2008. This work is supported in part by the National Science Foundation under Grants No. CNS-0520033, CNS-0834585, and CNS-0831753M.
- Rashmi Raiya, Shubham Gandhi” Survey of Various Security Techniques in VANET” International Journal of Advanced Research in Computer Science and Software Engineering 4(6), June - 2014, pp. 431-433 Volume 4, Issue 6, June 2014 ISSN: 2277 128X.
- Ahmad Yusri Dak, Saadiah Yahya, and Murizah Kassim” A Literature Survey on Security Challenges in VANETs” International Journal of Computer Theory and Engineering, Vol. 4, No. 6, December 2012
- K.Susitra, S.Lakshmi Narasimman” A Survey on the Authentication Protocols in Vanet” K.Susitra ,INDIA / International Journal of Research and Computational Technology, Vol.7 Issue.1 ISSN: 0975-5662, March, 2015.
- Rukaiya Shaikh, Disha Deotale” A Survey on VANET Security using ECC, RSA & MD5” International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 6, June 2015 Copyright to IJARCCE DOI 10.17148/IJARCCE.2015.4637 167.
- K.SIVARAMAKRISHNA, Ms.CH.VIJAYA DURGA” Warning message dissemination in vanets using sumo and move” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 7, July 2015.
- Aqeel Khalique Kuldip Singh Sandeep Sood” Implementation of Elliptic Curve Digital Signature Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010
- Michael Behrisch, Laura Bieker, Jakob Erdmann, Daniel Krajzewicz” SUMO – Simulation of Urban Mobility An Overview” IARIA, 2011. ISBN: 978-1- 61208-169-4.
- Mahendri, Neha Sawal,”A Survey On Vehicular Adhoc Networks(VANETs)” International Journal of Advanced Research in Computer Engineering &Technology (IJARCET) Volume 4, Issue 5, May 2015.
- Bassem Mokhtar , Mohamed Azab ” Survey on Security Issues in Vehicular Ad Hoc Networks” Alexandria Engineering Journal (2015) 54, 1115–1126.
- Archana Phutela, Tulika Mehta” Vehicular Ad-Hoc Networks (VANETs): A Survey” IJCST Vol. 6, Iss ue 1 Spl- 1 Jan-March 2015.
- Divya Chadha, Reena” Vehicular Ad hoc Network (VANETs): A Review” International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 3, March 2015.