Comparative Study of Safety Measure Techniques in VANET

S. Christal Anand*
Faculty of Lord Jegannath College of Engineering and Technology, Tamil Nadu, India.
Periodicity:July - September'2012
DOI : https://doi.org/10.26634/jwcn.1.2.1936

Abstract

Vehicular Ad — Hoc Networks must enhance its safety measures, because many obstacles affecting the Vehicle to Vehicle and Vehicle to Infrastructure communications during the message dissemination. In this paper discussed, about safety measure techniques in VANETs. There is different issue regarding to VANET safety message communication in Far and near vehicles. This work make available to understand some safety measures techniques in VANETs communications and to design new more efficient mechanism for protection.

Keywords

VANET s, Privacy, Authentication, Vehicular communication, group communication

How to Cite this Article?

Anand, S.C. (2012). Comparative Study of Safety Measure Techniques in VANET, i-manager’s Journal on Wireless Communication Networks. 1(2), 7-13. https://doi.org/10.26634/jwcn.1.2.1936

References

[1]. Jinyuan Sun, and Chi Zhang, (2010). An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE, vol. 21, No. 9, Sep2010.
[2]. Nwokedi Idika (nidika@purdue.edu). A Survey of Malware Detection Techniques, Department of Computer Science Purdue University, West Lafayette, IN 47907.
[3]. Richard Yu, (2011). Senior Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks, IEEE Transactions on wireless communications, Vol. 10, No. 9, September.
[4]. Meng-Yen Hsieh, Hsiehet al. (2011). Secure protocols for data propagation and group communication in vehicular networks, EURASIP Journal on Wireless Communications and Networking.
[5]. Ziming Zhao (2012). Risk-Aware Mitigation for MANET Routing Attacks, IEEE Transactions on dependable and secure computing, vol. 9, no. 2, April.
[6]. Jinyuan Sun and Yuguang Fang (2008). A Defense technique against misbehavior in VANETs based on Threshold Authentication. IEEE.
[7]. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux (2007). Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Areas in Communications, Vol. 25, No. 8, October.
[8]. Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks. International Journal of Computer Applications (0975 – 8887), February 2010.
[9]. Ahren Studer, Elaine Shi, Fan Bai, and Adrian Perrig (2008). TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, March 14, 2008.
[10]. Ying Zhu, (2011). Attack Pattern Discovery in Forensic Investigation of Network Attacks, IEEE Areas in communications, August.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.