Review on Various Routing Attacks in Vehicular Adhoc Networks
نویسندگان
چکیده
منابع مشابه
Routing Protocols for Vehicular Adhoc Networks (VANETs): A Review
Routing in Vehicular Ad hoc Networks is a challenging task due to the unique characteristics of the network such as high mobility of nodes, dynamically changing topology and highly partitioned network. It is a challenge to ensure reliable, continuous and seamless communication in the presence of speeding vehicles. The performance of routing protocols depends on various internal factors such as ...
متن کاملA Study of Reliable Routing Protocols for Vehicular Adhoc Networks
In smart transport techniques, the coordination between vehicles and the street area devices are of utmost importance. Vehicular Adhoc Networks (VANETS) truly are an encouraging technological innovation to permit the transmissions between vehicles using one side as well as in between vehicles and street area devices on the other side. But, it is really a difficult job to design an efficient rou...
متن کاملMobility Management in Vehicular Adhoc Networks: A Review
Vehicular Adhoc Networks (VANET) are gaining importance in vehicular networks and attracting an increasing attraction from both industry and research communities. Mobility Management is one of the most important and challenging research issue in vehicular networks which support various applications of Intelligent Transportation System (ITS). A specific mobility management solution is required f...
متن کاملSecurity Protocols for Vehicular Adhoc Networks: a Review
VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides, between mobile vehicles and roadside units. Throughout the world, there are many national and international projects in governments, industry, and academia devoted to the development of VANET protocols. In this paper I have reviewed the various security protocols used for vehicular ad ho...
متن کاملSYN Flooding Attacks in Mobile Adhoc Networks
Mobile Adhoc Networks (MANET) are special because of their self configuring and self maintenance capabilities. The highly dynamic network topology and the shared wireless medium are the main attractions and at the same time the main challenges of the MANET. These characters make MANET vulnerable to various attacks. There are several attacks on each layer of the protocol stack. Providing the sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017914053