VANET security surveys

Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies. The main...

Full description

Saved in:
Bibliographic Details
Published inComputer communications Vol. 44; pp. 1 - 13
Main Authors Engoulou, Richard Gilles, Bellaïche, Martine, Pierre, Samuel, Quintero, Alejandro
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier B.V 15.05.2014
Elsevier
Subjects
Online AccessGet full text
ISSN0140-3664
1873-703X
DOI10.1016/j.comcom.2014.02.020

Cover

Loading…
Abstract Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies. The main benefits of VANETs are that they enhance road safety and vehicle security while protecting drivers’ privacy from attacks perpetrated by adversaries. Security is one of the most critical issues related to VANETs since the information transmitted is distributed in an open access environment. VANETs face many challenges. This paper presents a survey of the security issues and the challenges they generate. The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem. Finally, global security architecture for VANETs is proposed.
AbstractList Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area Network (LAN) technologies. The main benefits of VANETs are that they enhance road safety and vehicle security while protecting drivers’ privacy from attacks perpetrated by adversaries. Security is one of the most critical issues related to VANETs since the information transmitted is distributed in an open access environment. VANETs face many challenges. This paper presents a survey of the security issues and the challenges they generate. The various categories of applications in VANETs are introduced, as well as some security requirements, threats and certain architectures are proposed to solve the security problem. Finally, global security architecture for VANETs is proposed.
Author Quintero, Alejandro
Engoulou, Richard Gilles
Pierre, Samuel
Bellaïche, Martine
Author_xml – sequence: 1
  givenname: Richard Gilles
  surname: Engoulou
  fullname: Engoulou, Richard Gilles
  email: richard.engoulou@polymtl.ca
– sequence: 2
  givenname: Martine
  surname: Bellaïche
  fullname: Bellaïche, Martine
  email: martine.bellaiche@polymtl.ca
– sequence: 3
  givenname: Samuel
  surname: Pierre
  fullname: Pierre, Samuel
  email: samuel.pierre@polymtl.ca
– sequence: 4
  givenname: Alejandro
  surname: Quintero
  fullname: Quintero, Alejandro
  email: Alejandro.quintero@polymtl.ca
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28417293$$DView record in Pascal Francis
BookMark eNqFkL1LAzEYxoNUsK2uTg5dHO_M513iIJRSP6DoUsUthOQNpLR3JbkW7r835cTBQeGBd3if3zP8JmjUtA0gdENwSTCp7jalbXc5JcWEl5jm4DM0JrJmRY3Z5wiN8wMXrKr4BZqktMEY87pmY3T9MX9drmcJ7CGGrp-lQzxCny7RuTfbBFffd4reH5frxXOxent6WcxXhWWs6gopLQgLRAnpmOSSCkVAOfDMEwfOO-9ZZQWlTijrpFEcqBTKGEkoNVywKboddvcmWbP10TQ2JL2PYWdir6nkpKaK5R4feja2KUXwPxWC9cmB3ujBgT450Jjm4Izd_8Js6EwX2qaLJmz_gx8GGLKAY4Cokw3QWHAhgu20a8PfA18T-XrI
CitedBy_id crossref_primary_10_1016_j_vehcom_2017_02_001
crossref_primary_10_1002_spy2_367
crossref_primary_10_1016_j_cose_2019_101664
crossref_primary_10_1016_j_comcom_2018_03_014
crossref_primary_10_1109_JSYST_2021_3116029
crossref_primary_10_1016_j_iot_2019_100071
crossref_primary_10_1016_j_jksuci_2024_101945
crossref_primary_10_4236_jcc_2016_416002
crossref_primary_10_1016_j_adhoc_2018_03_010
crossref_primary_10_1145_2817552
crossref_primary_10_1016_j_pmcj_2018_05_004
crossref_primary_10_1155_2022_4725805
crossref_primary_10_1016_j_adhoc_2023_103246
crossref_primary_10_1109_ACCESS_2019_2911924
crossref_primary_10_1109_ACCESS_2021_3104148
crossref_primary_10_1109_ACCESS_2021_3125521
crossref_primary_10_1109_TITS_2020_2994972
crossref_primary_10_1109_ACCESS_2020_2993553
crossref_primary_10_1109_ACCESS_2020_2966747
crossref_primary_10_1109_JSEN_2020_3021731
crossref_primary_10_1109_TIFS_2018_2812714
crossref_primary_10_1007_s12083_020_01010_4
crossref_primary_10_1016_j_eswa_2015_12_006
crossref_primary_10_1016_j_cosrev_2021_100411
crossref_primary_10_1109_TITS_2015_2494017
crossref_primary_10_3390_electronics13122372
crossref_primary_10_1109_TVT_2023_3287989
crossref_primary_10_1007_s11432_019_2835_4
crossref_primary_10_1109_ACCESS_2019_2915956
crossref_primary_10_1166_jctn_2020_9221
crossref_primary_10_1109_ACCESS_2023_3339192
crossref_primary_10_1007_s11235_016_0200_4
crossref_primary_10_1155_2019_2423915
crossref_primary_10_1016_j_vehcom_2022_100458
crossref_primary_10_3390_electronics9091358
crossref_primary_10_1109_ACCESS_2017_2717999
crossref_primary_10_1109_ACCESS_2017_2733225
crossref_primary_10_1002_spy2_349
crossref_primary_10_1109_JIOT_2021_3060751
crossref_primary_10_32604_iasc_2022_021467
crossref_primary_10_1016_j_vehcom_2018_07_001
crossref_primary_10_1016_j_comnet_2018_12_018
crossref_primary_10_1007_s13369_019_04094_0
crossref_primary_10_1007_s12083_016_0473_0
crossref_primary_10_3390_su151512003
crossref_primary_10_4018_IJCAC_300771
crossref_primary_10_1109_JIOT_2024_3363755
crossref_primary_10_1186_s13638_018_1237_8
crossref_primary_10_3390_su17062589
crossref_primary_10_1016_j_adhoc_2017_12_005
crossref_primary_10_1108_IJPCC_04_2022_0164
crossref_primary_10_1109_MCOM_2015_7120028
crossref_primary_10_3390_app11104682
crossref_primary_10_1016_j_dsp_2018_06_003
crossref_primary_10_1109_ACCESS_2019_2937182
crossref_primary_10_1016_j_comnet_2020_107099
crossref_primary_10_1109_ACCESS_2018_2800907
crossref_primary_10_25046_aj0506172
crossref_primary_10_1109_ACCESS_2022_3198656
crossref_primary_10_3390_app8101964
crossref_primary_10_3390_app13010217
crossref_primary_10_1016_j_comcom_2017_09_005
crossref_primary_10_1109_TITS_2024_3475952
crossref_primary_10_31185_wjcm_50
crossref_primary_10_1016_j_jcss_2016_05_006
crossref_primary_10_1109_ACCESS_2022_3205351
crossref_primary_10_1016_j_adhoc_2022_102782
crossref_primary_10_1080_24751839_2022_2040898
crossref_primary_10_3390_info10010027
crossref_primary_10_1002_wfs2_1324
crossref_primary_10_1109_TIFS_2020_3040876
crossref_primary_10_1016_j_comcom_2015_08_005
crossref_primary_10_1088_1757_899X_993_1_012102
crossref_primary_10_3390_s24010241
crossref_primary_10_3390_electronics4030380
crossref_primary_10_3390_su132313068
crossref_primary_10_1109_COMST_2017_2771522
crossref_primary_10_1109_ACCESS_2018_2837887
crossref_primary_10_1109_ACCESS_2016_2645452
crossref_primary_10_3390_s19224954
crossref_primary_10_1002_dac_4290
crossref_primary_10_1016_j_vehcom_2018_01_008
crossref_primary_10_1007_s12046_020_1320_9
crossref_primary_10_1109_JIOT_2023_3337136
crossref_primary_10_1145_3711681
crossref_primary_10_1007_s11227_016_1799_3
crossref_primary_10_3390_sym14061230
crossref_primary_10_3390_s22072810
crossref_primary_10_1051_matecconf_20166305020
crossref_primary_10_1109_ACCESS_2018_2866759
crossref_primary_10_1016_j_procs_2015_12_031
crossref_primary_10_1109_JIOT_2023_3259961
crossref_primary_10_1109_TITS_2021_3136548
crossref_primary_10_1109_TITS_2023_3266828
crossref_primary_10_1016_j_comcom_2018_07_008
crossref_primary_10_3390_app142210501
crossref_primary_10_1155_2020_5129620
crossref_primary_10_3390_s21093096
crossref_primary_10_1109_TVT_2014_2358633
crossref_primary_10_3390_s20216137
crossref_primary_10_1109_ACCESS_2020_2989870
crossref_primary_10_53759_7669_jmc202303003
crossref_primary_10_1016_j_comnet_2016_08_030
crossref_primary_10_1109_JIOT_2023_3277923
crossref_primary_10_1016_j_phycom_2022_101772
crossref_primary_10_1109_COMST_2016_2521642
crossref_primary_10_1109_TIV_2022_3186897
crossref_primary_10_1155_2022_1131479
crossref_primary_10_1109_TITS_2017_2653103
crossref_primary_10_1002_sec_1251
crossref_primary_10_1007_s42979_023_02122_3
crossref_primary_10_1088_1742_6596_1427_1_012015
crossref_primary_10_1109_ACCESS_2020_3014038
crossref_primary_10_1109_JPROC_2019_2915983
crossref_primary_10_1109_ACCESS_2020_3036044
crossref_primary_10_1109_ACCESS_2019_2931217
crossref_primary_10_1109_TIFS_2019_2955891
crossref_primary_10_1155_2022_8736531
crossref_primary_10_1109_ACCESS_2019_2936575
crossref_primary_10_1109_ACCESS_2021_3120626
crossref_primary_10_1142_S0218126624500531
crossref_primary_10_1109_ACCESS_2020_3041074
crossref_primary_10_7717_peerj_cs_2259
crossref_primary_10_3390_en12234527
crossref_primary_10_3390_fi16110395
crossref_primary_10_1109_TNSE_2021_3093435
crossref_primary_10_1002_dac_3893
crossref_primary_10_1155_2022_7239464
crossref_primary_10_1002_ett_4204
crossref_primary_10_1109_ACCESS_2020_2975110
crossref_primary_10_1080_08874417_2022_2103853
crossref_primary_10_1109_COMST_2021_3108466
crossref_primary_10_6109_jkiice_2016_20_3_590
crossref_primary_10_1016_j_csi_2023_103783
crossref_primary_10_1016_j_vehcom_2020_100286
crossref_primary_10_1186_s13638_018_1064_y
crossref_primary_10_1016_j_vehcom_2020_100284
crossref_primary_10_1109_TITS_2017_2777990
crossref_primary_10_3390_fi14020031
crossref_primary_10_3233_JIFS_233527
crossref_primary_10_1016_j_procs_2019_09_449
crossref_primary_10_2139_ssrn_3179428
crossref_primary_10_3390_iot5010007
crossref_primary_10_1109_MITS_2019_2898973
crossref_primary_10_3390_electronics9010074
crossref_primary_10_1109_ACCESS_2019_2946632
crossref_primary_10_1016_j_comnet_2024_110869
crossref_primary_10_1109_COMST_2023_3264928
crossref_primary_10_1016_j_isatra_2022_02_046
crossref_primary_10_1016_j_matpr_2021_02_556
crossref_primary_10_3390_s20195719
crossref_primary_10_1016_j_adhoc_2017_03_006
crossref_primary_10_1155_2021_9997771
crossref_primary_10_4236_wet_2018_94007
crossref_primary_10_1080_19393555_2021_2007316
crossref_primary_10_1109_COMST_2022_3178081
crossref_primary_10_1016_j_vehcom_2017_12_003
crossref_primary_10_1002_itl2_323
crossref_primary_10_1109_TVT_2016_2621354
crossref_primary_10_1007_s11227_023_05620_6
crossref_primary_10_1109_ACCESS_2024_3437416
crossref_primary_10_1007_s11227_020_03520_7
crossref_primary_10_1016_j_cose_2020_102150
crossref_primary_10_1109_JSYST_2023_3279620
crossref_primary_10_1016_j_inffus_2021_03_003
crossref_primary_10_61186_jsdp_20_1_3
crossref_primary_10_1109_OJITS_2023_3347484
crossref_primary_10_1016_j_procs_2019_12_099
crossref_primary_10_1038_s41598_024_77992_5
crossref_primary_10_1016_j_adhoc_2018_12_006
crossref_primary_10_1007_s11227_021_03911_4
crossref_primary_10_3390_s20020330
crossref_primary_10_1109_MITS_2020_2985024
crossref_primary_10_1007_s11276_016_1294_z
crossref_primary_10_1007_s11277_024_10962_2
crossref_primary_10_1155_2021_6638453
crossref_primary_10_1049_iet_its_2015_0228
crossref_primary_10_1109_OJCOMS_2023_3239115
crossref_primary_10_1016_j_vehcom_2018_09_001
crossref_primary_10_1007_s11276_016_1277_0
crossref_primary_10_1145_3718736
crossref_primary_10_11648_j_wcmc_20241102_13
crossref_primary_10_32604_iasc_2022_024687
crossref_primary_10_1007_s11227_021_03659_x
crossref_primary_10_1109_TITS_2024_3495031
crossref_primary_10_1016_j_vehcom_2019_100164
crossref_primary_10_1177_1550147717700899
crossref_primary_10_1109_ACCESS_2021_3107467
crossref_primary_10_1155_2018_1640167
crossref_primary_10_1109_COMST_2017_2736886
crossref_primary_10_1016_j_jpdc_2021_02_024
crossref_primary_10_3390_info12110455
crossref_primary_10_1109_TITS_2024_3488184
crossref_primary_10_1109_TVT_2020_2981127
crossref_primary_10_3390_sym12040609
crossref_primary_10_1109_TITS_2015_2439292
crossref_primary_10_32604_iasc_2022_026331
crossref_primary_10_1177_0361198118799012
crossref_primary_10_1016_j_physa_2017_12_013
crossref_primary_10_1109_ACCESS_2024_3374216
crossref_primary_10_1109_TSC_2024_3422813
crossref_primary_10_1177_1550147718815054
crossref_primary_10_13089_JKIISC_2016_26_4_941
crossref_primary_10_3390_s23010555
crossref_primary_10_1109_ACCESS_2019_2949130
crossref_primary_10_1109_TITS_2018_2818888
crossref_primary_10_1016_j_vehcom_2016_11_009
crossref_primary_10_1109_JIOT_2020_3037098
crossref_primary_10_3390_electronics12010139
crossref_primary_10_1109_TITS_2019_2934481
crossref_primary_10_1016_j_vehcom_2017_01_002
crossref_primary_10_1109_OJCOMS_2022_3169500
crossref_primary_10_1016_j_adhoc_2021_102634
crossref_primary_10_1016_j_compeleceng_2024_109950
crossref_primary_10_1016_j_comcom_2024_02_024
crossref_primary_10_3390_s20154253
crossref_primary_10_1007_s11227_022_04526_z
crossref_primary_10_1002_dac_6077
crossref_primary_10_1016_j_vehcom_2019_100182
crossref_primary_10_1002_spy2_433
crossref_primary_10_1109_ACCESS_2018_2868417
crossref_primary_10_1145_3014584
crossref_primary_10_3390_rs11232852
crossref_primary_10_1109_JIOT_2022_3199712
crossref_primary_10_1016_j_csi_2017_09_009
crossref_primary_10_3390_su132212513
crossref_primary_10_1016_j_jisa_2020_102637
crossref_primary_10_1109_COMST_2020_3012961
crossref_primary_10_1108_IJPCC_09_2021_0239
crossref_primary_10_1109_TII_2019_2948053
crossref_primary_10_1109_JIOT_2023_3279950
crossref_primary_10_1109_JIOT_2020_2975084
crossref_primary_10_1016_j_vehcom_2022_100531
crossref_primary_10_1016_j_vehcom_2015_08_001
crossref_primary_10_1109_TDSC_2022_3164740
crossref_primary_10_1007_s11042_016_3614_9
crossref_primary_10_1109_TITS_2020_2975226
crossref_primary_10_1007_s11042_016_4154_z
crossref_primary_10_3390_electronics9091411
crossref_primary_10_1049_cmu2_12179
crossref_primary_10_3390_info15010014
crossref_primary_10_1111_mice_12416
crossref_primary_10_1002_dac_3936
crossref_primary_10_1016_j_adhoc_2019_102004
crossref_primary_10_1177_1550147717741263
crossref_primary_10_3390_s16122077
crossref_primary_10_3390_s19163589
crossref_primary_10_1155_2020_8505280
crossref_primary_10_3390_s22186934
crossref_primary_10_1109_ACCESS_2020_3017018
crossref_primary_10_1109_TGCN_2021_3110822
crossref_primary_10_1155_2022_5829607
crossref_primary_10_55529_ijrise_42_11_18
crossref_primary_10_1016_j_dcan_2021_09_010
crossref_primary_10_1016_j_icte_2024_05_008
crossref_primary_10_1016_j_comcom_2015_09_007
crossref_primary_10_1016_j_cosrev_2021_100392
crossref_primary_10_3390_s19020334
crossref_primary_10_1109_TVT_2021_3107524
crossref_primary_10_3233_JIFS_220460
crossref_primary_10_1520_JTE20230095
crossref_primary_10_1109_JIOT_2018_2812300
crossref_primary_10_1109_ACCESS_2019_2919973
crossref_primary_10_1016_j_future_2017_12_041
crossref_primary_10_1016_j_vehcom_2020_100281
crossref_primary_10_1016_j_comcom_2021_01_019
crossref_primary_10_1109_ACCESS_2018_2880984
crossref_primary_10_1109_TDSC_2022_3163752
crossref_primary_10_3390_s19040965
crossref_primary_10_7717_peerj_cs_1440
Cites_doi 10.1109/GLOCOMW.2007.4437825
10.1109/TNET.2007.904002
10.1109/VETECF.2007.22
10.1007/11814764_22
10.1109/DSN.2004.1311881
10.1109/WMNC.2010.5678756
10.1109/TITS.2013.2264356
10.1145/1023875.1023881
10.1109/SAINTW.2003.1210183
10.1109/JSAC.2011.110310
10.1109/TITS.2011.2118754
10.1007/978-3-540-79966-5_8
10.1109/MVT.2009.932539
10.1016/j.comcom.2007.12.005
10.1109/WCNC.2007.467
10.1007/0-387-33406-8_6
10.1109/MOBIQ.2007.4451013
10.1007/978-3-540-79576-6_17
10.1109/ARES.2006.136
10.1002/9780470610893.ch12
10.1109/MCOM.2008.4539481
10.1109/TVT.2009.2034669
10.1109/MWC.2006.1632480
10.1109/ICETET.2009.198
10.1145/863965.863968
10.1109/ITST.2007.4295890
10.1109/MOBIQ.2004.1331717
10.1145/1102219.1102223
10.1109/SAHCNW.2009.5172962
10.1109/ICC.2009.5199041
10.1109/JCN.2009.6388411
10.5121/ijnsa.2011.3614
10.1109/MCOM.2008.4689252
10.1109/GLOCOM.2008.ECP.947
10.1109/NETAPPS.2010.17
10.1109/ICRTIT.2011.5972438
10.1109/JSAC.2007.071007
10.1109/ISCID.2012.184
10.1109/VETECS.2010.5494204
10.1109/ICVES.2008.4640905
10.1145/997150.997156
10.1109/MITP.2004.1265539
10.1109/INFOCOM.2007.179
10.1109/TVT.2009.2038222
10.1007/978-3-642-24861-0_20
10.3233/JCS-2007-15103
10.1109/GLOCOMW.2008.ECP.63
10.1109/CICSyN.2011.77
10.1109/TVT.2013.2277802
10.1007/978-3-642-04434-2_4
10.1109/icc.2011.5962947
10.1007/11767831_13
10.1109/BSC.2010.5473015
10.1109/ICNP.2008.4697044
10.1145/1161064.1161076
10.1145/1287748.1287752
10.1007/978-3-642-27201-1
10.1109/BWCCA.2011.12
10.4304/jnw.7.7.1106-1115
10.1109/WC-M.2006.250352
10.1201/EBK1439819197-13
10.1109/SYNASC.2010.9
10.1109/ISWTA.2011.6089388
10.1145/1080754.1080762
10.1109/GLOCOMW.2010.5700199
10.1109/COMST.2008.4483667
10.1109/ARTCom.2009.173
10.1049/iet-com.2009.0191
10.1109/GLOCOMW.2007.4437823
10.1109/COMST.2008.4625806
10.1145/1160972.1160974
ContentType Journal Article
Copyright 2014 Elsevier B.V.
2015 INIST-CNRS
Copyright_xml – notice: 2014 Elsevier B.V.
– notice: 2015 INIST-CNRS
DBID AAYXX
CITATION
IQODW
DOI 10.1016/j.comcom.2014.02.020
DatabaseName CrossRef
Pascal-Francis
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1873-703X
EndPage 13
ExternalDocumentID 28417293
10_1016_j_comcom_2014_02_020
S0140366414000863
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
ZMT
~G-
07C
29F
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AI.
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
BNPGV
CITATION
F0J
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
SBC
SEW
SSH
TAE
UHS
VH1
VOH
WUQ
XPP
ZY4
ABTAH
IQODW
ID FETCH-LOGICAL-c336t-88ce5ce1958d38482591e9def3f1dedfdff36c522d59cd8a94e2859aa8122a453
IEDL.DBID .~1
ISSN 0140-3664
IngestDate Wed Apr 02 07:16:15 EDT 2025
Thu Apr 24 23:03:57 EDT 2025
Tue Jul 01 05:05:34 EDT 2025
Fri Feb 23 02:23:48 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords VANETs
Security
Malicious nodes
Vehicular ad hoc networks
Mobile ad hoc network
Private life
Wireless LAN
Motor car
Road infrastructure
Open archives
Open systems
Traffic safety
Wireless network
Road traffic
Ad hoc network
Computer security
Open access
Mobile computing
Computer attack
Language English
License CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c336t-88ce5ce1958d38482591e9def3f1dedfdff36c522d59cd8a94e2859aa8122a453
PageCount 13
ParticipantIDs pascalfrancis_primary_28417293
crossref_primary_10_1016_j_comcom_2014_02_020
crossref_citationtrail_10_1016_j_comcom_2014_02_020
elsevier_sciencedirect_doi_10_1016_j_comcom_2014_02_020
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-05-15
PublicationDateYYYYMMDD 2014-05-15
PublicationDate_xml – month: 05
  year: 2014
  text: 2014-05-15
  day: 15
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Computer communications
PublicationYear 2014
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References G. Samara, W.A.H. Al-Salihy, R. Sures, Security analysis of vehicular ad hoc networks (VANET), in: Network Applications Protocols and Services (NETAPPS), 2010, pp. 55–60.
H. Moustafa, G. Bourdon, Y. Gourhant, Providing authentication and access control in vehicular network environment, in: Security and Privacy in Dynamic Environments, vol. 201, Springer, New York, 2006, pp. 62–73.
V. Pathak, D. Yao, L. Iftode, Securing location aware services over VANET using geographical secure path routing, in: IEEE International Conference on Vehicular Electronics and Safety, ICVES, 2008, pp. 346–353.
J. Petit, Z. Mammeri, Analysis of authentication overhead in vehicular networks, in: Third Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2010, pp. 1–6.
C2C-CC, Car to Car Communication Consortium
M. Koubek, S. Rea, D. Pesch, Event Suppression for safety message dissemination in VANETs, in: IEEE 71st Vehicular Technology Conference (VTC Spring), 2010, pp. 1–5.
Qianhong, Domingo-Ferrer, Gonzalez-Nicolas (b0480) 2010; 59
G. Guette, C. Bryce, Using TPMS to secure vehicular ad-hoc networks (VANETS), in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106–116.
Igure, Williams (b0365) 2008; 10
M. Torrent-Moreno, P. Santi, H. Hartenstein, Fair sharing of bandwidth in VANETs, in: Presented at the Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, Cologne, Germany, 2005.
P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Presented at the Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 2004.
G. Samara, W.A.H. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (VANET), in: 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398.
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET, in: Presented at the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc networks, Montreal, Quebec, Canada, 2007.
Q. Yi, N. Moayeri, Design of secure and application-oriented VANETs, in: Vehicular Technology Conference. VTC Spring IEEE, 2008, pp. 2794–2799.
F.K. Karnadi, M. Zhi Hai, L. Kun-chan, Rapid generation of realistic mobility models for VANET, in: Wireless Communications and Networking Conference, WCNC IEEE, 2007, pp. 2506–2511.
C. Gosman, C. Dobre, V. Cristea, A security protocol for vehicular distributed systems, in: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010, pp. 321–327.
Raya, Papadimitratos, Hubaux (b0120) 2006; 13
U. Delprato, M. Cristaldi, A. Gambardella, Sharing emergency information between emergency control centres: the project REACT, in: International Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, 2008.
J.M.D. Fuentes, A.I. González-Tablas, A. Ribagorda, Overview of security issues in vehicular Ad-hoc networks, in: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011
K. Papapanagiotou, G.F. Marias, P. Georgiadis, A certificate validation protocol for VANETS, in: Globecom Workshops, IEEE, 2007, pp. 1–9.
.
TPM Main: Part 1 Design Principles, Trusted Computing Group, 2006
C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE, in: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006, pp. 266–279.
K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, ARES, 2006, p. 8.
IEEE 1609.2-2013. IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages, ed, 2013.
S.N. Pathak, U. Shrawankar, Secured communication in real time VANET, in: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2009, pp. 1151–1155.
Ben Salem, Hubaux (b0570) 2006; 13
Hartenstein, Laberteaux (b0530) 2008
Dresner, Stone (b0995) 2008; 31
Identify intelligent vehicle safety applications enabled by DSRC, US National Highway Traffic Safety Administration 2005.
F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, 2007, pp. 1–12.
H. Hasbullah, I.A. Soomro, J.-L. Ab Manan, Denial of service (DOS) attack and its possible solution in VANET, WASET, 2010.
S.U. Rahman, H. Falaki, Security and Privacy for DSRC-based Automotive Collision Reporting, ED, 2009
Aad, Hubaux, Knightly (b0235) 2008; 16
L. Nai-Wei, T. Hsiao-Chien, Illusion attack on VANET applications – a message plausibility problem, in: Globecom Workshops, IEEE, 2007, pp. 1–8.
Sumra, Hasbullah, Jamalul-lail, Iskandar (b0585) 2011; 1
Wu, Cao, Ling, Liu, Sun (b0430) 2012; 7
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 99–110.
M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005.
Zeadally, Hunt, Chen, Irwin, Hassan (b0535) 2010
C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129.
A. Stampoulis, Z. Chai, A Survey of Security in Vehicular Networks, Project CPSC 534, 2007.
A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings Symposium on Applications and the Internet Workshops, 2003, pp. 342–346.
IEEE Standard 802. 16e. Amendment to IEEE Standard for Local and Metropolitan Area Networks, 2004
Kyunghwi, Jeongbeen, Wonjun (b0085) 2013; 14
Cheng, Shan, Zhuang (b0560) 2010
Toor, Muhlethaler, Laouiti, Fortelle (b0540) 2008; 10
M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, 2006, pp. 67–75.
K.V.N. Kavitha, A. Bagubali, L. Shalini, V2V wireless communication protocol for rear-end collision avoidance on highways with stringent propagation delay, in: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom ‘09, 2009, pp. 661–663.
Kim, Choi, Yoo (b0565) 2011
K. Priya, K. Karuppanan, Secure privacy and distributed group authentication for VANET, in: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 301–306.
J.P. Thompson, C.D. Wang, Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, Google Patents, US5613039, 1997
Tuan-Duc, Berder, Sentieys (b0095) 2011; 12
F. Dötzer, Privacy issues in vehicular ad hoc networks, in: Privacy Enhancing Technologies, 2006, pp. 197–209.
Toor, Muhlethaler, Laouiti (b0310) 2008; 10
F. Li, J. Wu, A winning-probability-based incentive scheme in vehicular networks, in: Proceedings of IEEE International Conference on Network Protocols (ICNP), Poster Abstract, 2008.
T.W. Chim, S. Yiu, L.C. Hui, V.O. Li, Security and privacy issues for inter-vehicle communications in VANETs, in: 6th Annual Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops’ 09, 2009, pp. 1-3.
B. Fouch, Crash Facts. Available
F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006.
E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC Network Laboratories, 2006.
T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: GLOBECOM Workshops, IEEE, New Orleans, LO, 2008, pp. 1–10.
Raya, Hubaux (b0325) 2007; 15
Sampigethaya, Li, Huang, Poovendran (b0400) 2007; 25
Rahbari, Jamali (b0610) 2011
Zhang, Wu, Solanas, Domingo-Ferrer (b0450) 2010; 59
Mirkovic, Reiher (b0385) 2004; 34
Li, Hwang, Chu (b0225) 2008; 31
N. Vighnesh, N. Kavita, S.R. Urs, S. Sampalli, A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks, in: IEEE Symposium on Wireless Technology and Applications (ISWTA), 2011, pp. 96–101.
Meraihi, Senouci, Meddour, Jerbi (b0550) 2008
Issac, Zeadally, Camara (b0555) 2010; 4
Brooks, Sander, Juan, Taiber (b0395) 2009; 4
F. Dotzer, L. Fischer, P. Magiera, Vars: a vehicle ad-hoc network reputation system, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, 2005, pp. 454–456.
G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17.
P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, M. Raya, Architecture for secure and private vehicular communications, in: 7th International Conference on ITS Telecommunications, ITST’07, 2007, pp. 1–6.
X. Yang, L. Liu, N.H. Vaidya, F. Zhao, A vehicle-to-vehicle communication protocol for cooperative collision warning, in: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, pp. 114–123.
Kapadia, Triandopoulos, Cornelius, Peebles, Kotz (b0600) 2008; 1
F. Sabahi, The security of vehicular ad hoc networks, in: Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pp. 338–342.
S. Biswas, J. Mišić, Proxy signature-based RSU message broadcasting in VANETs, in: 25th Biennial Symposium on Communications (QBSC), 2010, pp. 5–9.
M. Schagrin, Vehicle-to-Infrastructure (V
10.1016/j.comcom.2014.02.020_b0135
10.1016/j.comcom.2014.02.020_b0410
10.1016/j.comcom.2014.02.020_b0255
10.1016/j.comcom.2014.02.020_b0375
Blum (10.1016/j.comcom.2014.02.020_b0245) 2004; 6
10.1016/j.comcom.2014.02.020_b0130
10.1016/j.comcom.2014.02.020_b0250
Sun (10.1016/j.comcom.2014.02.020_b0545) 2010; 21
Dresner (10.1016/j.comcom.2014.02.020_b0995) 2008; 31
10.1016/j.comcom.2014.02.020_b0380
10.1016/j.comcom.2014.02.020_b0305
10.1016/j.comcom.2014.02.020_b0425
10.1016/j.comcom.2014.02.020_b0300
10.1016/j.comcom.2014.02.020_b0025
10.1016/j.comcom.2014.02.020_b0145
10.1016/j.comcom.2014.02.020_b0420
10.1016/j.comcom.2014.02.020_b0020
10.1016/j.comcom.2014.02.020_b0140
Aad (10.1016/j.comcom.2014.02.020_b0235) 2008; 16
10.1016/j.comcom.2014.02.020_b0260
10.1016/j.comcom.2014.02.020_b0270
10.1016/j.comcom.2014.02.020_b0390
Qianhong (10.1016/j.comcom.2014.02.020_b0480) 2010; 59
Tuan-Duc (10.1016/j.comcom.2014.02.020_b0095) 2011; 12
Jyoti (10.1016/j.comcom.2014.02.020_b0520) 2010
Sampigethaya (10.1016/j.comcom.2014.02.020_b0400) 2007; 25
10.1016/j.comcom.2014.02.020_b0435
10.1016/j.comcom.2014.02.020_b0155
10.1016/j.comcom.2014.02.020_b0275
10.1016/j.comcom.2014.02.020_b0030
10.1016/j.comcom.2014.02.020_b0150
10.1016/j.comcom.2014.02.020_b0160
10.1016/j.comcom.2014.02.020_b0280
Ben Salem (10.1016/j.comcom.2014.02.020_b0570) 2006; 13
10.1016/j.comcom.2014.02.020_b0605
Igure (10.1016/j.comcom.2014.02.020_b0365) 2008; 10
10.1016/j.comcom.2014.02.020_b0445
10.1016/j.comcom.2014.02.020_b0200
10.1016/j.comcom.2014.02.020_b0320
10.1016/j.comcom.2014.02.020_b0440
10.1016/j.comcom.2014.02.020_b0285
10.1016/j.comcom.2014.02.020_b0040
10.1016/j.comcom.2014.02.020_b0050
Cheng (10.1016/j.comcom.2014.02.020_b0560) 2010
Zeadally (10.1016/j.comcom.2014.02.020_b0535) 2010
Segata (10.1016/j.comcom.2014.02.020_b0180) 2013; 62
Li (10.1016/j.comcom.2014.02.020_b0225) 2008; 31
Raya (10.1016/j.comcom.2014.02.020_b0325) 2007; 15
Zhang (10.1016/j.comcom.2014.02.020_b0450) 2010; 59
Sumra (10.1016/j.comcom.2014.02.020_b0585) 2011; 1
10.1016/j.comcom.2014.02.020_b0215
10.1016/j.comcom.2014.02.020_b0335
10.1016/j.comcom.2014.02.020_b0455
10.1016/j.comcom.2014.02.020_b0575
10.1016/j.comcom.2014.02.020_b0210
10.1016/j.comcom.2014.02.020_b0330
10.1016/j.comcom.2014.02.020_b0175
10.1016/j.comcom.2014.02.020_b0295
10.1016/j.comcom.2014.02.020_b0060
Toor (10.1016/j.comcom.2014.02.020_b0540) 2008; 10
Rahbari (10.1016/j.comcom.2014.02.020_b0610) 2011
Kim (10.1016/j.comcom.2014.02.020_b0565) 2011
10.1016/j.comcom.2014.02.020_b0505
Issac (10.1016/j.comcom.2014.02.020_b0555) 2010; 4
Raya (10.1016/j.comcom.2014.02.020_b0120) 2006; 13
10.1016/j.comcom.2014.02.020_b0105
10.1016/j.comcom.2014.02.020_b0500
10.1016/j.comcom.2014.02.020_b0345
Kyunghwi (10.1016/j.comcom.2014.02.020_b0085) 2013; 14
10.1016/j.comcom.2014.02.020_b0465
Liqun (10.1016/j.comcom.2014.02.020_b0460) 2011; 29
10.1016/j.comcom.2014.02.020_b0220
10.1016/j.comcom.2014.02.020_b0340
10.1016/j.comcom.2014.02.020_b0065
10.1016/j.comcom.2014.02.020_b0185
10.1016/j.comcom.2014.02.020_b0580
Toor (10.1016/j.comcom.2014.02.020_b0310) 2008; 10
Wu (10.1016/j.comcom.2014.02.020_b0430) 2012; 7
10.1016/j.comcom.2014.02.020_b0190
Brooks (10.1016/j.comcom.2014.02.020_b0395) 2009; 4
Kapadia (10.1016/j.comcom.2014.02.020_b0600) 2008; 1
10.1016/j.comcom.2014.02.020_b0515
Hartenstein (10.1016/j.comcom.2014.02.020_b0530) 2008
10.1016/j.comcom.2014.02.020_b0115
10.1016/j.comcom.2014.02.020_b0355
10.1016/j.comcom.2014.02.020_b0475
10.1016/j.comcom.2014.02.020_b0595
10.1016/j.comcom.2014.02.020_b0110
10.1016/j.comcom.2014.02.020_b0230
Wang (10.1016/j.comcom.2014.02.020_b0525) 2009
Meraihi (10.1016/j.comcom.2014.02.020_b0550) 2008
Mirkovic (10.1016/j.comcom.2014.02.020_b0385) 2004; 34
10.1016/j.comcom.2014.02.020_b0470
10.1016/j.comcom.2014.02.020_b0590
10.1016/j.comcom.2014.02.020_b0080
Papadimitratos (10.1016/j.comcom.2014.02.020_b0195) 2008; 46
10.1016/j.comcom.2014.02.020_b0405
10.1016/j.comcom.2014.02.020_b0125
10.1016/j.comcom.2014.02.020_b0485
10.1016/j.comcom.2014.02.020_b0360
10.1016/j.comcom.2014.02.020_b0490
10.1016/j.comcom.2014.02.020_b0090
References_xml – reference: F. Li, J. Wu, A winning-probability-based incentive scheme in vehicular networks, in: Proceedings of IEEE International Conference on Network Protocols (ICNP), Poster Abstract, 2008.
– reference: J. Petit, Z. Mammeri, Analysis of authentication overhead in vehicular networks, in: Third Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2010, pp. 1–6.
– reference: U. Delprato, M. Cristaldi, A. Gambardella, Sharing emergency information between emergency control centres: the project REACT, in: International Congress on Environmental Modelling and Software Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, 2008.
– volume: 62
  start-page: 4150
  year: 2013
  end-page: 4161
  ident: b0180
  article-title: Automatic emergency braking: Realistic analysis of car dynamics and network performance
  publication-title: IEEE T. Veh. Technol.
– volume: 31
  start-page: 591
  year: 2008
  end-page: 656
  ident: b0995
  article-title: A multiagent approach to autonomous intersection management
  publication-title: J. Artif. Int. Res.
– volume: 25
  start-page: 1569
  year: 2007
  end-page: 1589
  ident: b0400
  article-title: Amoeba: robust location privacy scheme for VANET
  publication-title: IEEE J. Sel. Areas Commun.
– year: 2009
  ident: b0525
  article-title: Vehicular Ad Hoc Networks
– reference: C. Jung, C. Sur, Y. Park, K.-H. Rhee, A robust conditional privacy-preserving authentication protocol in VANET, in: Security and Privacy in Mobile Information and Communication Systems, vol. 17, Springer, Berlin Heidelberg, 2009, pp. 35–45.
– volume: 59
  start-page: 1606
  year: 2010
  end-page: 1617
  ident: b0450
  article-title: A scalable robust authentication protocol for secure vehicular communications
  publication-title: IEEE Trans. Veh. Technol.
– reference: B. Xiao, B. Yu, C. Gao, Detection and localization of sybil nodes in VANETs, in: International Conference on Mobile Computing and Networking: Proceedings of the workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, 2006, pp. 1–8.
– reference: C. Harsch, A. Festag, P. Papadimitratos, Secure position-based routing for VANETs, in: IEEE 66th Vehicular Technology Conference, VTC, 2007, pp. 26–30.
– reference: M. Raya, J.P. Hubaux, The security of vehicular ad hoc networks, in: Security in Ad Hoc and Sensor Networks (SASN), 2005.
– reference: S.K. Dhurandher, M.S. Obaidat, A. Jaiswal, A. Tiwari, A. Tyagi, Securing vehicular networks: a reputation and plausibility checks-based approach, in: GLOBECOM Workshops (GC Wkshps), IEEE, 2010, pp. 1550–1554.
– reference: K.V.N. Kavitha, A. Bagubali, L. Shalini, V2V wireless communication protocol for rear-end collision avoidance on highways with stringent propagation delay, in: International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom ‘09, 2009, pp. 661–663.
– volume: 1
  year: 2011
  ident: b0585
  article-title: Trust and trusted computing in VANET
  publication-title: Comput. Sci.
– reference: C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE, in: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006, pp. 266–279.
– volume: 13
  start-page: 8
  year: 2006
  end-page: 15
  ident: b0120
  article-title: Securing vehicular communications
  publication-title: IEEE Wirel. Commun.
– reference: J.M.D. Fuentes, A.I. González-Tablas, A. Ribagorda, Overview of security issues in vehicular Ad-hoc networks, in: Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, 2011,
– volume: 1
  start-page: 280
  year: 2008
  end-page: 297
  ident: b0600
  article-title: AnonySense: opportunistic and privacy-preserving context collection
  publication-title: Pervasive Comput.
– reference: IEEE 1609.2-2013. IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages, ed, 2013.
– volume: 21
  year: 2010
  ident: b0545
  article-title: An identity-based security system for user privacy in vehicular ad hoc networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 10
  start-page: 6
  year: 2008
  end-page: 19
  ident: b0365
  article-title: Taxonomies of attacks and vulnerabilities in computer systems
  publication-title: IEEE Commun. Surv. Tutorials
– volume: 4
  start-page: 894
  year: 2010
  end-page: 903
  ident: b0555
  article-title: Security attacks and solutions for vehicular ad hoc networks
  publication-title: IET Commun.
– volume: 29
  start-page: 605
  year: 2011
  end-page: 615
  ident: b0460
  article-title: Threshold anonymous announcement in VANETs
  publication-title: IEEE J. Sel. Areas Commun.
– reference: S. Biswas, J. Mišić, Proxy signature-based RSU message broadcasting in VANETs, in: 25th Biennial Symposium on Communications (QBSC), 2010, pp. 5–9.
– reference: G. Samara, W.A.H. Al-Salihy, R. Sures, Security analysis of vehicular ad hoc networks (VANET), in: Network Applications Protocols and Services (NETAPPS), 2010, pp. 55–60.
– volume: 13
  start-page: 50
  year: 2006
  end-page: 55
  ident: b0570
  article-title: Securing wireless mesh networks
  publication-title: IEEE Wirel. Commun.
– reference: K.S. Killourhy, R.A. Maxion, K.M. Tan, A defense-centric taxonomy based on attack manifestations, in: International Conference on Dependable Systems and Networks, 2004, pp. 102–111.
– reference: T.W. Chim, S. Yiu, L.C. Hui, V.O. Li, Security and privacy issues for inter-vehicle communications in VANETs, in: 6th Annual Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops’ 09, 2009, pp. 1-3.
– year: 2010
  ident: b0520
  publication-title: Security of Self-organizing Networks MANET, WSN, WMN, VANET
– reference: E. Fonseca, A. Festag, A survey of existing approaches for secure ad hoc routing and their applicability to VANETS, NEC Network Laboratories, 2006.
– reference: B. Fouch, Crash Facts. Available: <
– year: 2010
  ident: b0560
  article-title: Infotainment and road safety service support in vehicular networking: from a communication perspective
  publication-title: Mech. Syst. Signal Process.
– reference: B. Parno, A. Perrig, Challenges in securing vehicular networks, in: Workshop on Hot Topics in Networks (HotNets-IV), 2005.
– volume: 14
  start-page: 1500
  year: 2013
  end-page: 1509
  ident: b0085
  article-title: A MAC protocol using road traffic estimation for infrastructure-to-vehicle communications on highways
  publication-title: IEEE Trans. Intell. Transp. Syst.
– reference: S.N. Pathak, U. Shrawankar, Secured communication in real time VANET, in: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2009, pp. 1151–1155.
– reference: C2C-CC, Car to Car Communication Consortium,
– reference: F. Dötzer, Privacy issues in vehicular ad hoc networks, in: Privacy Enhancing Technologies, 2006, pp. 197–209.
– volume: 6
  start-page: 24
  year: 2004
  end-page: 29
  ident: b0245
  article-title: The threat of intelligent collisions
  publication-title: IT Prof.
– reference: K. Papapanagiotou, G.F. Marias, P. Georgiadis, A certificate validation protocol for VANETS, in: Globecom Workshops, IEEE, 2007, pp. 1–9.
– reference: F. Dotzer, L. Fischer, P. Magiera, Vars: a vehicle ad-hoc network reputation system, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM, 2005, pp. 454–456.
– volume: 15
  start-page: 39
  year: 2007
  end-page: 68
  ident: b0325
  article-title: Securing vehicular ad hoc networks
  publication-title: J. Comput. Secur.
– volume: 10
  start-page: 74
  year: 2008
  end-page: 88
  ident: b0310
  article-title: Vehicle ad hoc networks: applications and related technical issues
  publication-title: IEEE Commun. Surv. Tutorials
– reference: J.P. Thompson, C.D. Wang, Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network, Google Patents, US5613039, 1997,
– reference: X. Yang, L. Liu, N.H. Vaidya, F. Zhao, A vehicle-to-vehicle communication protocol for cooperative collision warning, in: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, pp. 114–123.
– volume: 46
  start-page: 100
  year: 2008
  end-page: 109
  ident: b0195
  article-title: Secure vehicular communication systems: design and architecture
  publication-title: IEEE Commun. Mag.
– reference: C. Gosman, C. Dobre, V. Cristea, A security protocol for vehicular distributed systems, in: 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010, pp. 321–327.
– reference: G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, Efficient and robust pseudonymous authentication in VANET, in: Presented at the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc networks, Montreal, Quebec, Canada, 2007.
– reference: M. Koubek, S. Rea, D. Pesch, Event Suppression for safety message dissemination in VANETs, in: IEEE 71st Vehicular Technology Conference (VTC Spring), 2010, pp. 1–5.
– reference: P. Golle, D. Greene, J. Staddon, Detecting and correcting malicious data in VANETs, in: Presented at the Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, 2004.
– reference: IEEE Standard 802. 16e. Amendment to IEEE Standard for Local and Metropolitan Area Networks, 2004,
– reference: V. Pathak, D. Yao, L. Iftode, Securing location aware services over VANET using geographical secure path routing, in: IEEE International Conference on Vehicular Electronics and Safety, ICVES, 2008, pp. 346–353.
– reference: K. El Defrawy, G. Tsudik, PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs), in: IEEE International Conference on Network Protocols, ICNP, 2008, pp. 258–267.
– reference: TPM Main: Part 1 Design Principles, Trusted Computing Group, 2006,
– reference: F. Kargl, Z. Ma, E. Schoch, Security engineering for VANETs, in: 4th Workshop on Embedded Security in Cars, 2006.
– reference: A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings Symposium on Applications and the Internet Workshops, 2003, pp. 342–346.
– year: 2010
  ident: b0535
  article-title: Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges
– year: 2008
  ident: b0530
  article-title: A tutorial survey on vehicular ad hoc networks
  publication-title: IEEE Commun. Mag.
– reference: L. Ertaul, S. Mullapudi, The security problems of vehicular ad hoc networks (VANETs) and proposed solutions in securing their operations, in: International Conference on Wireless Networks ICWN, 2009.
– reference: N. Vighnesh, N. Kavita, S.R. Urs, S. Sampalli, A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks, in: IEEE Symposium on Wireless Technology and Applications (ISWTA), 2011, pp. 96–101.
– reference: A. Stampoulis, Z. Chai, A Survey of Security in Vehicular Networks, Project CPSC 534, 2007.
– reference: V.S. Yadav, S. Misra, M. Afaque, Security of Wireless and Self-Organizing Networks: Security in Vehicular Ad Hoc Networks, CRC Press, 2010, pp. 227–250.
– reference: F. Sabahi, The security of vehicular ad hoc networks, in: Third International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2011, pp. 338–342.
– volume: 34
  start-page: 39
  year: 2004
  end-page: 53
  ident: b0385
  article-title: A taxonomy of DDoS attack and DDoS defense mechanisms
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
– reference: M. Schagrin, Vehicle-to-Infrastructure (V2I) Communications for Safety, 2013. Available: <
– volume: 31
  start-page: 2803
  year: 2008
  end-page: 2814
  ident: b0225
  article-title: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
  publication-title: Comput. Commun.
– reference: H. Moustafa, G. Bourdon, Y. Gourhant, Providing authentication and access control in vehicular network environment, in: Security and Privacy in Dynamic Environments, vol. 201, Springer, New York, 2006, pp. 62–73.
– reference: L. Nai-Wei, T. Hsiao-Chien, Illusion attack on VANET applications – a message plausibility problem, in: Globecom Workshops, IEEE, 2007, pp. 1–8.
– reference: A.P. Bernia, Reliable and Secure Geocasting in VANETs, University of Ottawa, 2012.
– year: 2011
  ident: b0565
  article-title: Secure and efficient protocol for vehicular ad hoc network with privacy preservation
  publication-title: EURASIP J. Wirel. Commun. Networking
– volume: 59
  start-page: 559
  year: 2010
  end-page: 573
  ident: b0480
  article-title: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
  publication-title: IEEE Trans. Veh. Technol.
– reference: L. Zhang, Q.Q. Wu, Bo, J. Domingo-Ferrer, APPA: aggregate privacy-preserving authentication in vehicular ad hoc networks, in: Presented at the Proceedings of the 14th International Conference on Information security, Xi’an, China, 2011.
– reference: D. Ren, S. Du, H. Zhu, A novel attack tree based risk assessment approach for location privacy preservation in the VANETs, in: IEEE International Conference on Communications (ICC), 2011, pp. 1–5.
– reference: K. Plossl, T. Nowey, C. Mletzko, Towards a security architecture for vehicular ad hoc networks, in: The First International Conference on Availability, Reliability and Security, ARES, 2006, p. 8.
– reference: Identify intelligent vehicle safety applications enabled by DSRC, US National Highway Traffic Safety Administration 2005.
– volume: 7
  start-page: 1106
  year: 2012
  end-page: 1115
  ident: b0430
  article-title: Routing algorithm based on multi-community evolutionary game for VANET
  publication-title: J. Networks
– reference: M. Torrent-Moreno, P. Santi, H. Hartenstein, Fair sharing of bandwidth in VANETs, in: Presented at the Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, Cologne, Germany, 2005.
– year: 2008
  ident: b0550
  article-title: Vehicle-to-vehicle communications: applications and perspectives
  publication-title: Wirel. Ad Hoc Sens. Networks
– reference: R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen, ECPP: efficient conditional privacy preservation protocol for secure vehicular communications, in: The 27th Conference on Computer Communications INFOCOM, IEEE, 2008.
– reference: S.U. Rahman, H. Falaki, Security and Privacy for DSRC-based Automotive Collision Reporting, ED, 2009
– volume: 4
  start-page: 52
  year: 2009
  end-page: 64
  ident: b0395
  article-title: Automobile security concerns
  publication-title: IEEE Veh. Technol. Mag.
– volume: 16
  start-page: 791
  year: 2008
  end-page: 802
  ident: b0235
  article-title: Impact of denial of service attacks on ad hoc networks
  publication-title: IEEE/ACM Trans. Networking
– reference: F. Armknecht, A. Festag, D. Westhoff, K. Zeng, Cross-layer privacy enhancement and non-repudiation in vehicular communication, in: Communication in Distributed Systems (KiVS), ITG-GI Conference, 2007, pp. 1–12.
– reference: H. Hasbullah, I.A. Soomro, J.-L. Ab Manan, Denial of service (DOS) attack and its possible solution in VANET, WASET, 2010.
– year: 2011
  ident: b0610
  article-title: Efficient detection of sybil attack based on cryptography in VANET
  publication-title: Int. J. Network Secur. Appl. (IJNSA)
– reference: A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 99–110.
– reference: G. Yan, B.B. Bista, D.B. Rawat, E.F. Shaner, General active position detectors protect VANET security, in: Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011, pp. 11–17.
– reference: P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, M. Raya, Architecture for secure and private vehicular communications, in: 7th International Conference on ITS Telecommunications, ITST’07, 2007, pp. 1–6.
– reference: G. Guette, C. Bryce, Using TPMS to secure vehicular ad-hoc networks (VANETS), in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106–116.
– reference: T. Zhou, R.R. Choudhury, P. Ning, K. Chakrabarty, Privacy-preserving detection of sybil attacks in vehicular ad hoc networks, in: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. MobiQuitous, 2007, pp. 1–8.
– reference: M. Raya, A. Aziz, J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, 2006, pp. 67–75.
– reference: >.
– reference: T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: GLOBECOM Workshops, IEEE, New Orleans, LO, 2008, pp. 1–10.
– volume: 10
  year: 2008
  ident: b0540
  article-title: Vehicle ad hoc networks: applications and related technical issues
  publication-title: IEEE Commun.
– reference: C. Wei, Y. Jianding, L. Xiangjun, The design of electronic license plate recognition terminal system based on nRF24LE1, in: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), 2012, pp. 127–129.
– reference: .
– reference: Y. Hao, Y. Cheng, K. Ren, Distributed key management with protection against RSU compromise in group signature based VANETs, in: IEEE GLOBECOM Global Telecommunications Conference, 2008, pp. 1–5.
– reference: F.K. Karnadi, M. Zhi Hai, L. Kun-chan, Rapid generation of realistic mobility models for VANET, in: Wireless Communications and Networking Conference, WCNC IEEE, 2007, pp. 2506–2511.
– volume: 12
  start-page: 659
  year: 2011
  end-page: 668
  ident: b0095
  article-title: Energy-efficient cooperative techniques for infrastructure-to-vehicle communications
  publication-title: IEEE Trans. Intell. Transp. Syst.
– reference: Q. Yi, N. Moayeri, Design of secure and application-oriented VANETs, in: Vehicular Technology Conference. VTC Spring IEEE, 2008, pp. 2794–2799.
– reference: A. Studer, F. Bai, B. Bellur, A. Perrig, Flexible, extensible, and efficient VANET authentication, in: Proceedings of the 6th Annual Conference on Embedded Security in Cars, 2008.
– reference: G. Samara, W.A.H. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (VANET), in: 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398.
– reference: T. Leinmuller, R.K. Schmidt, E. Schoch, A. Held, G. Schafer, Modeling roadside attacker behavior in VANETs, in: 2008 IEEE GLOBECOM Workshops, 2008, pp. 1–10.
– reference: K. Priya, K. Karuppanan, Secure privacy and distributed group authentication for VANET, in: International Conference on Recent Trends in Information Technology (ICRTIT), 2011, pp. 301–306.
– ident: 10.1016/j.comcom.2014.02.020_b0590
  doi: 10.1109/GLOCOMW.2007.4437825
– volume: 16
  start-page: 791
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0235
  article-title: Impact of denial of service attacks on ad hoc networks
  publication-title: IEEE/ACM Trans. Networking
  doi: 10.1109/TNET.2007.904002
– ident: 10.1016/j.comcom.2014.02.020_b0270
  doi: 10.1109/VETECF.2007.22
– ident: 10.1016/j.comcom.2014.02.020_b0215
– ident: 10.1016/j.comcom.2014.02.020_b0135
– ident: 10.1016/j.comcom.2014.02.020_b0485
– ident: 10.1016/j.comcom.2014.02.020_b0150
– ident: 10.1016/j.comcom.2014.02.020_b0340
  doi: 10.1007/11814764_22
– year: 2009
  ident: 10.1016/j.comcom.2014.02.020_b0525
– ident: 10.1016/j.comcom.2014.02.020_b0380
  doi: 10.1109/DSN.2004.1311881
– ident: 10.1016/j.comcom.2014.02.020_b0605
  doi: 10.1109/WMNC.2010.5678756
– volume: 14
  start-page: 1500
  year: 2013
  ident: 10.1016/j.comcom.2014.02.020_b0085
  article-title: A MAC protocol using road traffic estimation for infrastructure-to-vehicle communications on highways
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2013.2264356
– ident: 10.1016/j.comcom.2014.02.020_b0090
– ident: 10.1016/j.comcom.2014.02.020_b0200
  doi: 10.1145/1023875.1023881
– ident: 10.1016/j.comcom.2014.02.020_b0515
  doi: 10.1109/SAINTW.2003.1210183
– ident: 10.1016/j.comcom.2014.02.020_b0250
– volume: 29
  start-page: 605
  year: 2011
  ident: 10.1016/j.comcom.2014.02.020_b0460
  article-title: Threshold anonymous announcement in VANETs
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2011.110310
– volume: 12
  start-page: 659
  year: 2011
  ident: 10.1016/j.comcom.2014.02.020_b0095
  article-title: Energy-efficient cooperative techniques for infrastructure-to-vehicle communications
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2011.2118754
– ident: 10.1016/j.comcom.2014.02.020_b0320
  doi: 10.1007/978-3-540-79966-5_8
– ident: 10.1016/j.comcom.2014.02.020_b0285
– ident: 10.1016/j.comcom.2014.02.020_b0155
– volume: 4
  start-page: 52
  year: 2009
  ident: 10.1016/j.comcom.2014.02.020_b0395
  article-title: Automobile security concerns
  publication-title: IEEE Veh. Technol. Mag.
  doi: 10.1109/MVT.2009.932539
– volume: 31
  start-page: 2803
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0225
  article-title: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2007.12.005
– ident: 10.1016/j.comcom.2014.02.020_b0125
  doi: 10.1109/WCNC.2007.467
– ident: 10.1016/j.comcom.2014.02.020_b0230
  doi: 10.1007/0-387-33406-8_6
– ident: 10.1016/j.comcom.2014.02.020_b0330
  doi: 10.1109/MOBIQ.2007.4451013
– volume: 1
  start-page: 280
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0600
  article-title: AnonySense: opportunistic and privacy-preserving context collection
  publication-title: Pervasive Comput.
  doi: 10.1007/978-3-540-79576-6_17
– ident: 10.1016/j.comcom.2014.02.020_b0220
  doi: 10.1109/ARES.2006.136
– year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0520
– year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0550
  article-title: Vehicle-to-vehicle communications: applications and perspectives
  publication-title: Wirel. Ad Hoc Sens. Networks
  doi: 10.1002/9780470610893.ch12
– year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0530
  article-title: A tutorial survey on vehicular ad hoc networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2008.4539481
– volume: 59
  start-page: 559
  year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0480
  article-title: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2009.2034669
– year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0535
– volume: 13
  start-page: 50
  year: 2006
  ident: 10.1016/j.comcom.2014.02.020_b0570
  article-title: Securing wireless mesh networks
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2006.1632480
– ident: 10.1016/j.comcom.2014.02.020_b0030
  doi: 10.1109/ICETET.2009.198
– ident: 10.1016/j.comcom.2014.02.020_b0185
– ident: 10.1016/j.comcom.2014.02.020_b0435
– ident: 10.1016/j.comcom.2014.02.020_b0375
  doi: 10.1145/863965.863968
– ident: 10.1016/j.comcom.2014.02.020_b0420
  doi: 10.1109/ITST.2007.4295890
– ident: 10.1016/j.comcom.2014.02.020_b0105
  doi: 10.1109/MOBIQ.2004.1331717
– ident: 10.1016/j.comcom.2014.02.020_b0060
  doi: 10.1145/1102219.1102223
– year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0560
  article-title: Infotainment and road safety service support in vehicular networking: from a communication perspective
  publication-title: Mech. Syst. Signal Process.
– ident: 10.1016/j.comcom.2014.02.020_b0575
  doi: 10.1109/SAHCNW.2009.5172962
– ident: 10.1016/j.comcom.2014.02.020_b0425
  doi: 10.1109/ICC.2009.5199041
– ident: 10.1016/j.comcom.2014.02.020_b0490
  doi: 10.1109/JCN.2009.6388411
– year: 2011
  ident: 10.1016/j.comcom.2014.02.020_b0610
  article-title: Efficient detection of sybil attack based on cryptography in VANET
  publication-title: Int. J. Network Secur. Appl. (IJNSA)
  doi: 10.5121/ijnsa.2011.3614
– volume: 1
  year: 2011
  ident: 10.1016/j.comcom.2014.02.020_b0585
  article-title: Trust and trusted computing in VANET
  publication-title: Comput. Sci.
– volume: 46
  start-page: 100
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0195
  article-title: Secure vehicular communication systems: design and architecture
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2008.4689252
– ident: 10.1016/j.comcom.2014.02.020_b0345
  doi: 10.1109/GLOCOM.2008.ECP.947
– ident: 10.1016/j.comcom.2014.02.020_b0140
  doi: 10.1109/NETAPPS.2010.17
– volume: 31
  start-page: 591
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0995
  article-title: A multiagent approach to autonomous intersection management
  publication-title: J. Artif. Int. Res.
– ident: 10.1016/j.comcom.2014.02.020_b0465
  doi: 10.1109/ICRTIT.2011.5972438
– volume: 25
  start-page: 1569
  year: 2007
  ident: 10.1016/j.comcom.2014.02.020_b0400
  article-title: Amoeba: robust location privacy scheme for VANET
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2007.071007
– ident: 10.1016/j.comcom.2014.02.020_b0020
  doi: 10.1109/ISCID.2012.184
– ident: 10.1016/j.comcom.2014.02.020_b0475
– ident: 10.1016/j.comcom.2014.02.020_b0305
  doi: 10.1109/VETECS.2010.5494204
– ident: 10.1016/j.comcom.2014.02.020_b0410
  doi: 10.1109/ICVES.2008.4640905
– ident: 10.1016/j.comcom.2014.02.020_b0160
– volume: 34
  start-page: 39
  year: 2004
  ident: 10.1016/j.comcom.2014.02.020_b0385
  article-title: A taxonomy of DDoS attack and DDoS defense mechanisms
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/997150.997156
– volume: 10
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0540
  article-title: Vehicle ad hoc networks: applications and related technical issues
  publication-title: IEEE Commun.
– ident: 10.1016/j.comcom.2014.02.020_b0500
– volume: 6
  start-page: 24
  year: 2004
  ident: 10.1016/j.comcom.2014.02.020_b0245
  article-title: The threat of intelligent collisions
  publication-title: IT Prof.
  doi: 10.1109/MITP.2004.1265539
– ident: 10.1016/j.comcom.2014.02.020_b0440
  doi: 10.1109/INFOCOM.2007.179
– volume: 59
  start-page: 1606
  year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0450
  article-title: A scalable robust authentication protocol for secure vehicular communications
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2009.2038222
– ident: 10.1016/j.comcom.2014.02.020_b0455
  doi: 10.1007/978-3-642-24861-0_20
– ident: 10.1016/j.comcom.2014.02.020_b0145
– volume: 15
  start-page: 39
  year: 2007
  ident: 10.1016/j.comcom.2014.02.020_b0325
  article-title: Securing vehicular ad hoc networks
  publication-title: J. Comput. Secur.
  doi: 10.3233/JCS-2007-15103
– ident: 10.1016/j.comcom.2014.02.020_b0050
  doi: 10.1109/GLOCOMW.2008.ECP.63
– ident: 10.1016/j.comcom.2014.02.020_b0360
  doi: 10.1109/CICSyN.2011.77
– volume: 62
  start-page: 4150
  issue: 9
  year: 2013
  ident: 10.1016/j.comcom.2014.02.020_b0180
  article-title: Automatic emergency braking: Realistic analysis of car dynamics and network performance
  publication-title: IEEE T. Veh. Technol.
  doi: 10.1109/TVT.2013.2277802
– ident: 10.1016/j.comcom.2014.02.020_b0275
  doi: 10.1007/978-3-642-04434-2_4
– ident: 10.1016/j.comcom.2014.02.020_b0260
  doi: 10.1109/icc.2011.5962947
– ident: 10.1016/j.comcom.2014.02.020_b0300
– ident: 10.1016/j.comcom.2014.02.020_b0405
  doi: 10.1007/11767831_13
– ident: 10.1016/j.comcom.2014.02.020_b0080
– ident: 10.1016/j.comcom.2014.02.020_b0190
  doi: 10.1109/BSC.2010.5473015
– ident: 10.1016/j.comcom.2014.02.020_b0335
  doi: 10.1109/ICNP.2008.4697044
– ident: 10.1016/j.comcom.2014.02.020_b0505
  doi: 10.1145/1161064.1161076
– ident: 10.1016/j.comcom.2014.02.020_b0445
  doi: 10.1145/1287748.1287752
– ident: 10.1016/j.comcom.2014.02.020_b0255
– ident: 10.1016/j.comcom.2014.02.020_b0280
– year: 2011
  ident: 10.1016/j.comcom.2014.02.020_b0565
  article-title: Secure and efficient protocol for vehicular ad hoc network with privacy preservation
  publication-title: EURASIP J. Wirel. Commun. Networking
  doi: 10.1007/978-3-642-27201-1
– ident: 10.1016/j.comcom.2014.02.020_b0065
  doi: 10.1109/BWCCA.2011.12
– volume: 21
  year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0545
  article-title: An identity-based security system for user privacy in vehicular ad hoc networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 7
  start-page: 1106
  year: 2012
  ident: 10.1016/j.comcom.2014.02.020_b0430
  article-title: Routing algorithm based on multi-community evolutionary game for VANET
  publication-title: J. Networks
  doi: 10.4304/jnw.7.7.1106-1115
– ident: 10.1016/j.comcom.2014.02.020_b0040
– volume: 13
  start-page: 8
  year: 2006
  ident: 10.1016/j.comcom.2014.02.020_b0120
  article-title: Securing vehicular communications
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/WC-M.2006.250352
– ident: 10.1016/j.comcom.2014.02.020_b0025
  doi: 10.1201/EBK1439819197-13
– ident: 10.1016/j.comcom.2014.02.020_b0210
– ident: 10.1016/j.comcom.2014.02.020_b0595
  doi: 10.1109/GLOCOMW.2008.ECP.63
– ident: 10.1016/j.comcom.2014.02.020_b0470
– ident: 10.1016/j.comcom.2014.02.020_b0130
  doi: 10.1109/SYNASC.2010.9
– ident: 10.1016/j.comcom.2014.02.020_b0355
  doi: 10.1109/ISWTA.2011.6089388
– ident: 10.1016/j.comcom.2014.02.020_b0110
  doi: 10.1145/1080754.1080762
– ident: 10.1016/j.comcom.2014.02.020_b0390
  doi: 10.1109/GLOCOMW.2010.5700199
– volume: 10
  start-page: 6
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0365
  article-title: Taxonomies of attacks and vulnerabilities in computer systems
  publication-title: IEEE Commun. Surv. Tutorials
  doi: 10.1109/COMST.2008.4483667
– ident: 10.1016/j.comcom.2014.02.020_b0115
  doi: 10.1109/NETAPPS.2010.17
– ident: 10.1016/j.comcom.2014.02.020_b0175
  doi: 10.1109/ARTCom.2009.173
– volume: 4
  start-page: 894
  year: 2010
  ident: 10.1016/j.comcom.2014.02.020_b0555
  article-title: Security attacks and solutions for vehicular ad hoc networks
  publication-title: IET Commun.
  doi: 10.1049/iet-com.2009.0191
– ident: 10.1016/j.comcom.2014.02.020_b0580
  doi: 10.1109/GLOCOMW.2007.4437823
– volume: 10
  start-page: 74
  year: 2008
  ident: 10.1016/j.comcom.2014.02.020_b0310
  article-title: Vehicle ad hoc networks: applications and related technical issues
  publication-title: IEEE Commun. Surv. Tutorials
  doi: 10.1109/COMST.2008.4625806
– ident: 10.1016/j.comcom.2014.02.020_b0295
  doi: 10.1145/1160972.1160974
SSID ssj0004773
Score 2.5488873
Snippet Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer to a set of smart vehicles used on the road. These vehicles provide...
SourceID pascalfrancis
crossref
elsevier
SourceType Index Database
Enrichment Source
Publisher
StartPage 1
SubjectTerms Applied sciences
Computer science; control theory; systems
Computer systems and distributed systems. User interface
Equipments and installations
Exact sciences and technology
Ground, air and sea transportation, marine construction
Malicious nodes
Memory and file management (including protection and security)
Memory organisation. Data processing
Mobile radiocommunication systems
Radiocommunications
Road transportation and traffic
Security
Software
Telecommunications
Telecommunications and information theory
VANETs
Vehicular ad hoc networks
Title VANET security surveys
URI https://dx.doi.org/10.1016/j.comcom.2014.02.020
Volume 44
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB7EXlpK6UtqH5JDr6m6ryRHEcW21JMWb2HdB1iKFR899rd3Jg9boSAUAiFhd5N8u5mZkG--Abi33jMTKxU6J1kofJuH0ySroUFpljqSIhPTeRmqwVg8TeSkAt0yF4ZolYXtz216Zq2LM80CzeZiNmtmtCSulMAdBeak-ClERKv84euH5iGi_C8z0RipdZk-l3G8cGzijKATFJlyJ1X9_ts9HS_0CkHzebWLXy6ofwonRewYdPLbO4OKm5_D0S9FwQuovXaGvVGwKqrSBavN8hPn6hLG_d6oOwiL0geh4Vytwzg2ThpHSjCWxwI_45K2S6zz3Letsx4h5spg7GRlYmysE-FIiU5r9NdMC8lrUJ1_zN0VBLH0jLWMRmfuhVNeM-fjKfPWYGSEr2wdePnEqSl0wak8xXtaEsDe0hynlHBKWwy3Vh3Cba9Frouxp31UgpnuzG-KpntPz8YO9tvLoWPF6Cvh1_8e-gYO6YjIAG15C9X1cuPuMMZYTxvZImrAQefxeTD8BjqMzuk
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB6sHtpSSl9S-7A59Bo0-4jJUUSJVXPS4m1ZN7tgKVZ89Pd3Ng-rUBAKgUCS2STfJjMT8s03AK-JMUQFvu9qzYnLjEfdWZj20LBllrLFWSqmM4r9aMLepnxagk5RC2Nplbnvz3x66q3zLY0czcZyPm-ktCTq-wxXNjGnJ1Cx6lS8DJV2fxDFv-WRrexHs2UyWoOigi6leeHwljaCcZCl4p228fffEepiKdeIm8kaXuxFod4VXObpo9POrvAaSnpxA-d7ooK3UH1vx92xs84b0znr7eobp-sOJr3uuBO5efcDV1Hqb9wgUJorbcVgEhow_JILPR0m2lDjJToxiDL1FaZPCQ9VEsiQaStGJyWGbCIZp1UoL74W-h6cgBtCmkpiPDdM-0YSbYIZMYnC5Ajf2hrQ4o6FyqXBbYeKT1FwwD5EhpOwOIkmwaVZA3dntcykMY4c3yrAFAdTLNB7H7GsH2C_Ox3GVkzAQvrw76Ff4DQaj4Zi2I8Hj3Bm91hugMefoLxZbfUzphybWT1_pH4AZa7Rmg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=VANET+security+surveys&rft.jtitle=Computer+communications&rft.au=Engoulou%2C+Richard+Gilles&rft.au=Bella%C3%AFche%2C+Martine&rft.au=Pierre%2C+Samuel&rft.au=Quintero%2C+Alejandro&rft.date=2014-05-15&rft.pub=Elsevier+B.V&rft.issn=0140-3664&rft.eissn=1873-703X&rft.volume=44&rft.spage=1&rft.epage=13&rft_id=info:doi/10.1016%2Fj.comcom.2014.02.020&rft.externalDocID=S0140366414000863
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon