In Depth Analysis of Attacks & Countermeasures in Vehicular Ad Hoc Network

Naziya Hussain, Anoop Singh, Piyush Kumar Shukla
2016 International Journal of Software Engineering and Its Applications  
A vehicular ad hoc networks (VANETs) communication is becoming an important and popular research factor in the wireless networking. It has the potential to improve road safety and travelers comfort. VANETs are distributed, self-organizing communication networks built by moving vehicles. Its differ from MANET by their architecture, characteristics and applications as well as some sort of security issues. A vehicular ad hoc network (VANETs) is very important factor for improving the road safety
more » ... d comforting of the travelers. Recently VANETs have emerged to turn the attention of researchers in the field of wireless and mobile communications; they differ from MANET by their architecture, characteristics and applications as well as some sort of security issues which make them to the deployment stage, potential security and privacy issues must be addressed. It's associate spontaneous network for the longer term Intelligent Transport System (ITS) sensible progress achieved by the investigator on study of Vehicular Ad hoc Network. However some challenges and problems still here for analysis is to be like communication, security, application, stimulation, verification and services. These solutions is classified into Public-Key Approaches, Symmetric; Hybrid Approaches and ID based mostly having the aim to construct a strong security framework for VANETs and thereby stop security attacks considerately to adapt with specific options of VANETs. In this paper we have a tendency to present the maximum aspects alongside the comparison associated with this field to assist researchers and developers to know and distinguish the most surrounding VANET in one solid document, while not the necessity to travel through different relevant papers and articles preliminary from VANET architecture by gaging up with the improving productivity of node compromise attack in vehicular Ad hoc network using Connected Dominating Set recommended general algorithmic program, that promotes the attacking productivity by destroying the network backbone and
doi:10.14257/ijseia.2016.10.12.29 fatcat:xxmgwvakyzbs5hctuyunwslguq