Cybersecurity Report: Vehicular Ad-hoc Network (VANET) Analysis

Verified

Added on  2019/09/13

|3
|552
|146
Report
AI Summary
This report focuses on the cybersecurity aspects of Vehicular Ad-hoc Networks (VANET). It begins by introducing VANET technology, explaining how it utilizes cars as wireless nodes to create a mobile network. The report highlights VANET's capabilities, including high dynamic topology and frequent network disconnections. It then discusses the importance of VANET in cybersecurity, emphasizing its role in enhancing road safety through vehicle-to-vehicle communication and protecting networks. The report presents a structured outline, including an introduction, background information, an analysis of current cybersecurity challenges and potential solutions, and a discussion of future research directions. The study aims to explore the issues preventing wider adoption of VANET, current research efforts, and future prospects. It concludes with a summary of findings and suggestions for further research, emphasizing the need for continued development and improvement in VANET security.
Document Page
The Vehicular Ad-hoc Network
The Vehicular Ad-hoc Network
The cybersecurity technology that has been used in this paper is "The Vehicular Ad-Hoc
Network (Al-Sultan, 2014)." It is a technology that widely used for the purpose of moving cars
as nodes in a network to create a mobile network. This technology mainly turns every
participating car into a wireless node or router which further allow them to create their network
with a wide range. The technology comes with a wide set of capabilities. Some of them are the
high dynamic topology, frequent disconnected network, mobility modeling and prediction, and
various others. From past some 5 years, this the VANET technology is frequently emerging day
by day. It has been clarified the facts given by the Loo (2016). The researcher said that the
VANET is used now in a large number of fields such as communication or information
technology. Due to the growing use of this technology, it has gained enough attraction of big
business houses.
It is mainly popular in the areas which are related to warning lights, maintenance and
highway construction, weather-related hazards, and stop and go traffic information. VANET
plays an important role in cybersecurity. In cybersecurity, this technology mainly used to
enhance the safety on the roads by enabling vehicles to communicate with each other. In the
protection area of cybersecurity VANET mainly protects the different networks by enforcing
proper communication channel (Pathan, 2016). On the other hand, in other areas like defense,
recovery, and resilience, and remediation the VANET mainly identify the different
vulnerabilities and propose a relevant solution for further improvement.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reham Alsabet
Cybersecurity Paper
References
Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2014). A comprehensive survey
on vehicular ad hoc network. Journal of network and computer applications, 37, 380-392.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and
future trends. CRC Press.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANET security challenges and
solutions. A survey. Vehicular Communications.
Proposed structure for the paper:
Chapter 1: introduction:
Chapter 2: background
Chapter 3: the problem in the study ( for example: what is preventing this technology from being in
all cars today? What is being done to help this technology be deployed in technology? What the current
issues with it from cyberscurity prospectie..)
Chapter 4: Future reserch and future prospective (Here should talk about what should be done what is
the future study should be focusing on to help this technology be deployed in technology?
Document Page
Reham Alsabet
Cybersecurity Paper
Chapter 5: conclusion.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]