logo

Unauthorized Access Mitigation in VANETs

   

Added on  2019-09-20

19 Pages4643 Words441 Views
 | 
 | 
 | 
VEHICULA AD-HOC NETWORKName: Student Number: Word count: Name of the course: Tutor name: “VEHICULAR AD-HOC NETWORK:CURRENT CHALLENGES, AND FUTUREPERSPECTIVE1 | P a g e
Unauthorized Access Mitigation in VANETs_1

VEHICULA AD-HOC NETWORKAbstractVehicular Ad-hoc Network (VANET) is considered as the subclass of the mobile ad hoc networks(MANETs) and this is also considered as the promising approach in case of intelligenttransportation system (ITS). There is the design for the routing protocols in VANETs which isvery important as well as necessary issue to support the new smart technique ITS. There is the keydifference in between VANET as well as MANET which is the special mobility pattern as well asit is designed based on rapidly changing topology. This technique is also not applied effectivelyfor occurrence of the routing protocols for MANETs within VANETs. This paper focuses on thetechnology used in case of laden those multiple challenges which is needed for sorting out beforeit is considered with possible implementation for the large range of scale. This study also assessesthe present challenges as well as the future perspectives that are associated with the vehicular Ad-Hoc Network or simply VANET. It is also found through this research paper, some challenges aregoing to be identified which is primarily depending on security attacks as well as networkmanagement. Finally, there is a brief description on the issues for future research in the field ofVANET followed by a strong conclusion.Keywords: Vehicular Ad hoc Networks or VANETs; Road side unit, On-board Unit; Black hole;Wormhole etc.2 | P a g e
Unauthorized Access Mitigation in VANETs_2

VEHICULA AD-HOC NETWORKTABLEOF CONTENTSIntroduction........................................................................................................................................4Background of the study....................................................................................................................4Problem of the study..........................................................................................................................9Possible security attacks.................................................................................................................9Challenges in terms of network among vehicles.........................................................................14Security Requirements.................................................................................................................15Future research and Prospective......................................................................................................16Conclusion.......................................................................................................................................17Reference List..................................................................................................................................183 | P a g e
Unauthorized Access Mitigation in VANETs_3

VEHICULA AD-HOC NETWORKINTRODUCTIONThis paper focuses on investigating various aspects that are associated with the vehicular ad-hocnetwork for understanding the system to implement among general public. There is a briefdescription of the structure or framework of VANET followed by the possible security attacks andsome challenges to regularize this technology among public transportation system. At the lastsection there is a brief discussion of future aspects of VANETs in the field of research. BACKGROUNDOFTHESTUDYThe Ad hoc network is considered as the distributed, temporary network system. For the formationof ad hoc network there is a dynamic link consists of nodes is very much required. On the sametime, it does not rely upon the infrastructures with existing network, like gateway, router, orregular power supply etc. There is the Ad hoc network which is the kind of peer to peer networksand also there is other node which has functions for data collecting, storing, as well as processingfollowed by forwarding. This solution is cost-effective in case of short-range communication forsome particular scenarios, like automation, environment sensing, or hazards preventive. Toimprove these cases Vehicle Ad Hoc network has been introduced in recent years [ CITATIONQiu17 \l 16393 ].There are more than 1 billion of active Android users as of June, 2014 and it is growing innumbers day by day very rapidly. There are more than one million devices is being activated ineach day. For this dramatic growth in numbers, there are portable wireless devices which have ahuge market development in case of smart applications and these changes will interact with thelifestyles of users and also provides the context-aware interactions. It has been observed that themobile games markets have been grown and it has crossed the target range $23 billion in 2016[ CITATION Ahm171 \l 16393 ]. It is also observed that from the last five years, there are automakers who have adopted theintegration platforms with onboard devices as well as personal smartphone. Therefore, theconnection between consumer electronic devices, like smart phones as well as the onboardvehicles has been reduced. Moreover, for multiple applications, the data makers are going forVANET applications to target the consumer electronics.The aim of VANET is to insure safe drive through improvement of the traffic flow as well as it isexpected for decreasing the car accidents with a great numbers. It has been also observed that theusers of VANET would get benefitted from active road safety, infotainment along with traffic4 | P a g e
Unauthorized Access Mitigation in VANETs_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Challenges in VANET: A Comprehensive Survey
|23
|4698
|107

Evolving Graphs for Vehicular Ad Hoc Networks
|8
|1459
|444

Baltimore, September 2007: VANET Challenges and Future Directions
|16
|4385
|244

A Comparative Analysis of VANETs Routing Protocols
|15
|4140
|174

Cybersecurity of Vehicular Ad-Hoc Networks
|3
|552
|146

Vehicular Ad-Hoc Network Analysis
|3
|424
|174