Skip to main content
Log in

Actual Security Threats for Vehicular and Mobile Ad Hoc Networks

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This paper considers cybersecurity threats for vehicular ad hoc networks and also describes the developed classification of these threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.

Similar content being viewed by others

REFERENCES

  1. Bezkorovainyi, M.M. and Tatuzov, A.L., Cybersecurity—approaches to the definition of the concept, Vopr. Kiberbezop., 2014, no. 1, pp. 22–27.

  2. Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Ivanov, A.A., The use of adjacency series for the recognition of prefractal graphs in assessing the cybersecurity of VANET networks, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 10–26.

  3. Semenov, A.S., Fractal evolutionary architectures, Upr. Bol’shimi Sist., 2010, no. 30-1, pp. 91–103.

  4. Gohale, V., Gosh, S.K., and Gupta, A., Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks, in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, 2011.

    Google Scholar 

  5. Martin, A., Smith, J., and Koethe, M., A platform independent model and threat analysis for mobile ad hoc networks, Proc. of the 2007 Software Defined Radio Technical Conference, Denver, Colorado, 2007.

Download references

ACKNOWLEDGMENTS

This work was supported by a scholarship of the President of the Russian Federation for leading scientific schools of the Russian Federation, project no. NSH-2992.2018.9.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to P. D. Zegzhda or D. V. Ivanov.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A. et al. Actual Security Threats for Vehicular and Mobile Ad Hoc Networks. Aut. Control Comp. Sci. 52, 993–999 (2018). https://doi.org/10.3103/S0146411618080308

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080308

Keywords:

Navigation