A Comprehensive Analysis on The Threats and Vulnerabilities in VANET Technology

Main Article Content

V.Kumar, Shalni
S.Rani
R.P.Singh
G. C. Banerjee

Abstract

A VANET (Vehicular Ad-Hoc Network) [1] is a collection of mobile hosts forming a temporary network without the aid of any established infrastructure. This exibility in space and time induces new challenges towards the security needed to support secure wireless communications[2]. VANETs are being used to improve road safety and enable a wide variety of value-added services. A lots of work are done towards the VANET but the security[3] get less attention. In this project we will discuss the threats, attacks on VANET, and some mechanisms how to prevent from these attacks[4-5] which are helpful to keep the safe VANET technology.

Article Details

How to Cite
[1]
V.Kumar, Shalni, S.Rani, R.P.Singh, and G. C. Banerjee, “A Comprehensive Analysis on The Threats and Vulnerabilities in VANET Technology”, Int. J. Comput. Eng. Res. Trends, vol. 2, no. 5, pp. 280–283, May 2015.
Section
Research Articles

References

G Chandrasekaran, VANETs: The Networking Platform for Future Vehicular Application”. Rutgers University, pp. 45-51, may,2007.

Monika, Sanjay Batish and Amardeep Singh,” Border-node based Movement Aware Routing Protocol”, International Journal of Computer Science and Informatics ISSN (PRINT): 2231 -5292, Vol-1, Iss-4, 2012.

Rakesh Kumar, 2Mayank Dave,” A Comparative Study of Various Routing Protocols in VANET”,IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011.

K. Jayasudha,” Hierarchical Clustering Based Greedy Routing in Vehicular Ad Hoc Networks”, European Journal of Scientific Research ISSN 1450- 216X Vol.67 No.4 (2012), pp. 580-594 © Euro Journals Publishing, Inc. 2012.

K. Lakshmi1, K.Thilagam2, K. Rama3, A.Jeevarathinam4, S. Manju Priya5,” Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET”, IJCTA|JAN-FEB 2012.