Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

An Essential of Security in Vehicular Ad hoc Network

International Journal of Computer Applications
© 2010 by IJCA Journal
Number 2 - Article 3
Year of Publication: 2010
K P Tripathi

K P Tripathi. Article:An Essential of Security in Vehicular Ad hoc Network. International Journal of Computer Applications 10(2):11–16, November 2010. Published By Foundation of Computer Science. BibTeX

	author = {K P Tripathi},
	title = {Article:An Essential of Security in Vehicular Ad hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {10},
	number = {2},
	pages = {11--16},
	month = {November},
	note = {Published By Foundation of Computer Science}


Vehicular Ad-Hoc Networks (VANET) are a specific type of wireless ad-hoc networks, formed with short range wireless communication devices, each one representing a vehicle on the road or a static device. Developing applications and protocols for Vehicular Ad-Hoc Networks (VANETs) poses unique security challenges, induced by the devices being used, the high speed and sporadic connectivity of the vehicles, the high relevance of their geographic location combined with the absence of adequate/reliable means of determining it.

Since the last few years VANET have received increased attention as the potential technology to enhance active and preventive safety on the road, as well as travel comfort. Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such a technology. Generally, attacks cause anomalies to the network functionality. A secure VANET system, while exchanging information should protect the system against unauthorized message injection, message alteration, eavesdropping. This paper is an attempt to highlights the problems occurred in Vehicle Ad hoc Networks and security issues.


  • D. Shaw and W. Kinsner, Multifractal modelling of radio transmitter transients for classification, in: Proceedings of WESCANEX’97: Communications, Power and Computing, 1997.
  • Jochen Schiller, “Mobile Communication”, Second Edition, Pearson Education Ltd., 2003.
  • Kevin,Uichin Lee, Mario Gerla, “Survey of Routing Protocols in Vehicular Ad Hoc Networks in Car 2 Car communication consortium.
  • K. Plossl, T. Nowey, C. Mletzko, “Towards a security architecture for vehicular ad hoc networks”, in: The First International Conference on Availability, Reliability and Security, 2006.
  • Maxim Raya and Jean-Pierre Hubaux “Securing vehicular ad hoc networks”, Journal of Computer security, IOS Press Amsterdam, The Netherlands, Volume 15, Issue 1(January 2007), pages 39-68
  • M. Raya, A. Aziz and J.-P. Hubaux, Efficient secure aggregation in VANETs, in: Proceedings of VANET’06, 2006.
  • M. Raya, J. P. Hubaux, “Securing vehicular ad hoc networks”, Journal of Computer Security 15 (1) (2007) 39–68. Special issue on Security of Ad Hoc and Sensor Networks
  • M. Raya, J.P. Hubaux, “Security aspects of inter-vehicle communications”, in: Proceedings of the 5th Swiss Transport Research Conference (STRC 2005), Ascona, Switzerland, 2005
  • Maxim Raya, Panos Papadimitratos and Jean-Pierre Hubaux “Securing Vehicular Communication”, IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular communication, Vol 13, num. 5, 2006, p. 8-15
  • Sascha Schnaufer, Holger Fuisler, Matthias Transier, Wolfgang Effelsberg, “Unicast Ad-hoc Routing in Vehicular City Scnarios” in “Network on wheels” project under contract no. 01AK064F and Matthias Transier.
  • S. Eichler, F. Dotzer, C. Schwingenschlogl, F.J.F. Caro, J. Eberspacher, “Secure routing in a vehicular ad hoc network”, in: IEEE 60th Vehicular Technology Conference, 2004, pp. 3339–3343.
  • Yu Wang and Fan Li, “Vehicular Ad Hoc Networks” in Guide to Wireless Ad Hoc Networks, Computer communication and Networks, DOI 10.1007/978-1-84800-328-6_20
  • Y. C. Hu, A. Perrig and D.B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in: Proceedings of IEEE Infocom’03, 2003.