International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 149 | Views: 305

Survey Paper | Information Technology | India | Volume 6 Issue 3, March 2017 | Popularity: 6.6 / 10


     

Survey of Detection Techniques for DOS Attack in VANET

Jenis Shah, Deven Gol


Abstract: VANET is an application of mobile ad hoc network. More precisely a VANET is self-organised network that formed by connecting vehicle and aiming to improve driving safety and traffic management with internet access by drivers and programmers. So that security of the VANET is a critical issue. In VANET it is necessary that the network is mostly available all the time for the vehicles and RSU (Road Side Units). VANET faces several security issues due to which the network gets damaged and the services of the network may unavailable to the respective users or sometimes the wrong message of altered message passed during the communication. This type of security issues may lead in the failure of the network. Among all the attacks in the VANET, the DOS attack is very serious attack by which the services of the network get jammed and they cannot reach to the proper destination on time. Here, in this paper we analyze the different methods to detect the DOS attack in VANET.


Keywords: VANET, DOS attack, Detection of DOS Attack, APDA, EAPDA, Security


Edition: Volume 6 Issue 3, March 2017


Pages: 810 - 812



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Jenis Shah, Deven Gol, "Survey of Detection Techniques for DOS Attack in VANET", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 810-812, https://www.ijsr.net/getabstract.php?paperid=ART20171568, DOI: https://www.doi.org/10.21275/ART20171568



Similar Articles

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh, Gunjan Behl

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 661 - 664

Revolutionizing Public Health: A Blockchain - Based System for Secure Genetic and Medical Data Management

Kunal Dhanda, Sweta Sehrawat

Share this Article

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021

Pages: 1296 - 1304

Hybrid Cloud: Combining the Best of Both Worlds: Increased Adoption of Hybrid Cloud Solutions

Sandeep Chinamanagonda

Share this Article
Top