DocumentCode
632578
Title
A review and classification of various VANET Intrusion Detection Systems
Author
Erritali, Mohammed ; El Ouahidi, Bouabid
Author_Institution
Dept. of Comput. Sci., Mohamed V Agdal Univ. - L.R.I, Rabat, Morocco
fYear
2013
fDate
26-27 April 2013
Firstpage
1
Lastpage
6
Abstract
The use of wireless links renders a vehicular ad-hoc network (VANET) vulnerable to malicious attacks such as Denial of Service, blackhole attack, Sybil attack, selective forwarding and altering routing information. In wired networks the attacker needs to gain access to the physical media to make an attack. In wireless networks the scenario is much different, there are no firewalls and gateways in place hence attacks can take place from any location within radio coverage area. Each mobile node in ad-hoc network is an autonomous unit in itself free to move independently. This means a node with not adequate physical protection is very much susceptible to be compromised. It is difficult to track down a single compromised node in a large network, attacks stemming from a compromised node are far more detrimental and much harder to detect.
Keywords
digital signatures; telecommunication network routing; vehicular ad hoc networks; Sybil attack; VANET member nodes; autonomous unit; blackhole attack; centralized decision making architecture; cooperative participation; decentralized architecture; denial of service; digital signature; encryption; intrusion detection systems; malicious attacks; physical media; routing information; security measures; selective forwarding; vehicular ad-hoc network; wired networks; wireless links; wireless networks; Computational modeling; Databases; Encryption; Irrigation; Logic gates; Monitoring; Vehicular ad hoc networks; Intrusion Detection System (IDS); Survey; VANET;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Days (JNS3), 2013 National
Conference_Location
Rabat
Print_ISBN
978-1-4799-0322-1
Type
conf
DOI
10.1109/JNS3.2013.6595459
Filename
6595459
Link To Document