Attacks on Anonymity in VANET

B. Chaurasia, S. Verma, G. Tomar
{"title":"Attacks on Anonymity in VANET","authors":"B. Chaurasia, S. Verma, G. Tomar","doi":"10.1109/CICN.2011.43","DOIUrl":null,"url":null,"abstract":"A vehicular ad-hoc network (VANET), is an instance of intelligent transportation system that provides vehicle-to-vehicle communication aided by road side infrastructure for in-vehicle entertainment and safer road environment. VANET is characterized by highly mobile vehicles, predetermined topology and the requirement of reliable time bound message delivery over error prone shared wireless medium. The security solutions are constrained by these characteristics. In this paper we are discussing the various type of attack on VANET along with intersection attack on anonymity and the security issue that need to kept in mind while developing any protocol to make VANET secure. Simulation and results indicate that intersection attack is breach the privacy even though cryptographic and noncryptographic security mechanism is enabled over the VANET.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2011.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

A vehicular ad-hoc network (VANET), is an instance of intelligent transportation system that provides vehicle-to-vehicle communication aided by road side infrastructure for in-vehicle entertainment and safer road environment. VANET is characterized by highly mobile vehicles, predetermined topology and the requirement of reliable time bound message delivery over error prone shared wireless medium. The security solutions are constrained by these characteristics. In this paper we are discussing the various type of attack on VANET along with intersection attack on anonymity and the security issue that need to kept in mind while developing any protocol to make VANET secure. Simulation and results indicate that intersection attack is breach the privacy even though cryptographic and noncryptographic security mechanism is enabled over the VANET.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
VANET中的匿名攻击
车辆自组织网络(VANET)是智能交通系统的一个实例,它通过道路侧基础设施提供车对车通信,以实现车内娱乐和更安全的道路环境。VANET的特点是高度移动的车辆,预先确定的拓扑结构以及在容易出错的共享无线媒体上可靠的限时消息传递要求。安全解决方案受到这些特征的限制。在本文中,我们讨论了对VANET的各种类型的攻击,以及对匿名性的交叉攻击,以及在开发任何协议以使VANET安全时需要牢记的安全问题。仿真结果表明,即使在VANET上启用了加密和非加密安全机制,交叉攻击仍然会破坏用户的隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Optimized Fast Discrete Cosine Transform Approach with Various Iterations and Optimum Numerical Factors for Image Quality Evaluation Meta Search Engine Based on Prioritizor Simulation and Testing of Photovoltaic with Grid Connected System Segmentation of Left Ventricle of 2D Echocardiographic Image Using Active Contouring Effects of Shadowing on the Performances of Mobile Ad Hoc Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1