Reference Hub9
Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions

Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions

Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon
Copyright: © 2009 |Volume: 1 |Issue: 1 |Pages: 14
ISSN: 1941-6237|EISSN: 1941-6245|ISSN: 1941-6237|EISBN13: 9781615201594|EISSN: 1941-6245|DOI: 10.4018/jaci.2009010104
Cite Article Cite Article

MLA

Tchepnda, Christian, et al. "Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions." IJACI vol.1, no.1 2009: pp.39-52. http://doi.org/10.4018/jaci.2009010104

APA

Tchepnda, C., Moustafa, H., Labiod, H., & Bourdon, G. (2009). Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions. International Journal of Ambient Computing and Intelligence (IJACI), 1(1), 39-52. http://doi.org/10.4018/jaci.2009010104

Chicago

Tchepnda, Christian, et al. "Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions," International Journal of Ambient Computing and Intelligence (IJACI) 1, no.1: 39-52. http://doi.org/10.4018/jaci.2009010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article provides a panorama on the security in vehicular networks’ environments. The special characteristics of these environments are presented and a general classification for the different types of attacks illustrated by some relevant attacks examples is introduced. Consequently, some key security requirements and security challenges are derived, considering Intelligent Transportation System (ITS) or Safety services as well as non-ITS or non-Safety services. Finally, some existing contributions in this subject are presented, and their deployment feasibility is discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.