Open Access
Issue |
MATEC Web of Conferences
Volume 150, 2018
Malaysia Technical Universities Conference on Engineering and Technology (MUCET 2017)
|
|
---|---|---|
Article Number | 06038 | |
Number of page(s) | 7 | |
Section | Information & Communication Technology (ICT), Science (SCI) & Mathematics (SM) | |
DOI | https://doi.org/10.1051/matecconf/201815006038 | |
Published online | 23 February 2018 |
- A. Agrawal, A. Garg, N. Chaudhiri, S. Gupta,D. Pandey, and T. Roy, “Security on Vehicular Ad Hoc Networks (VANET): A Review Paper,” vol. 3, no. 1, 2013. [Google Scholar]
- C. Kruegel and T. Toth, “A survey on intrusion detection systems,” TU Vienna, Austria, vol. 109, no. 1, pp. 6–15, 2000. [Google Scholar]
- O. Pattnaik and B. K. Pattanayak, “SECURITY IN VEHICULAR AD HOC NETWORK,”vol. 11, no. 2, pp. 337-346, 2014. [Google Scholar]
- C. Y. Shim, “A taxonomy for DOS attacks in VANET,” 2014 14th Int. Symp. Commun. Inf. Technol., pp. 26-27, 2014. [Google Scholar]
- H. Hasbullah, I. A. Soomro, and J. A. Manan, “Denial of Service (DOS) Attack and Its Possible Solutions in VANET,” World Acad. Sci. Eng. Technol., vol. 4, no. 5, pp. 411-415, 2010. [Google Scholar]
- J. M. De Fuentes and A. I. González-tablas, “Overview of security issues in Vehicular Ad-hoc Networks,” Science (80-.)., 2010. [Google Scholar]
- R. S. Raw, M. Kumar, and N. Singh, “Security Challenges, Issues and Their Solutions for VANET,” Int. J. Netw. Secur. Its Appl., vol. 5, no. 5, pp. 95–105, 2013. [Google Scholar]
- M. Bharat, K. S. Sree, and T. M. Kumar, “Authentication Solution for Security Attacks in VANETs,” vol. 3, no. 8, pp. 7661–7664, 2014. [Google Scholar]
- I. A. Sumra, J. A. B. Manan, H. Hasbullah, and B. S. Iskandar,“Timing Attack in Vehicular Network 2 VANET Applications and Time,” pp. 151-155. [Google Scholar]
- J. T. Isaac, S. Zeadally, and J. S. Cámara, “Security attacks and solutions for vehicular ad hoc networks,” IET Commun., vol. 4, no. 7, p.894, 2010. [CrossRef] [Google Scholar]
- K. M. A. Alheeti, A. Gruebler, and K. D. Mcdonald-maier, “An Intrusion Detection System Against Malicious Attacks on the Communication Network of Driverless Cars,” IEEE Consum. Commun. Netw. Conf., no. 12, pp. 916–921, 2015. [Google Scholar]
- S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Telecommun. Syst., vol. 50, no. 4, pp. 217–241, 2012. [CrossRef] [Google Scholar]
- V. Bibhu, “Performance Analysis of Black Hole Attack in Vanet,” no. October, pp. 47–54, 2012. [Google Scholar]
- S. M. Safi, A. Movaghar, and M. Mohammadizadeh, “A novel approach for avoiding wormhole attacks in VANET,” 2nd Int. Work. Comput. Sci. Eng. WCSE 2009, vol. 2, pp. 160–165, 2009. [CrossRef] [Google Scholar]
- M. N. Mejri and J. Ben-Othman,“Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks,” Glob. Commun. Conf. (GLOBECOM), 2014 IEEE, no. ii, pp. 5032–-5037, 2014. [CrossRef] [Google Scholar]
- J. Jakubiak and Y. Koucheryavy, “State of the Art and Research Challenges for VANETs,” 2008 5th IEEE Consum. Commun. Netw. Conf., pp. 912–916, 2008. [CrossRef] [Google Scholar]
- S. S. Shinde and S. P. Patil, “Various Issues in Vehicular Ad hoc Networks : A Survey,” vol. 1, no. 2, pp. 399–403, 2010. [Google Scholar]
- G. Samara, W. a. H. Al-Salihy, and R. Sures, “Security Analysis of Vehicular Ad Hoc Nerworks (VANET),” Netw. Appl. Protoc. Serv. (NETAPPS), 2010 Second Int. Conf., pp.55–60, 2010. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.