Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers

Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers
View Sample PDF
Author(s): Chong Han (University of Surrey, UK), Sami Muhaidat (Khalifa University, UAE), Ibrahim Abualhaol (Khalifa University, UAE), Mehrdad Dianati (University of Surrey, UK) and Rahim Tafazolli (University of Surrey, UK)
Copyright: 2014
Pages: 27
Source title: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Source Author(s)/Editor(s): Danda B. Rawat (Georgia Southern University, USA), Bhed B. Bista (Iwate Prefectural University, Japan) and Gongjun Yan (University of Southern Indiana, USA)
DOI: 10.4018/978-1-4666-4691-9.ch008


View Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers on the publisher's website for pricing and purchasing information.


Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with timely information on road and traffic conditions, and achieving smooth traffic flow on the roads. Recently, the security of VANETs has attracted major attention for the possible presence of malicious elements, and the presence of altered messages due to channel errors in transmissions. In order to provide reliable and secure communications, Intrusion Detection Systems (IDSs) can serve as a second defense wall after prevention-based approaches, such as encryption. This chapter first presents the state-of-the-art literature on intrusion detection in VANETs. Next, the detection of illicit wireless transmissions from the physical layer perspective is investigated, assuming the presence of regular ongoing legitimate transmissions. Finally, a novel cooperative intrusion detection scheme from the MAC sub-layer perspective is discussed.

Related Content

. © 2021. 35 pages.
. © 2021. 24 pages.
. © 2021. 35 pages.
. © 2021. 30 pages.
. © 2021. 34 pages.
. © 2021. 21 pages.
. © 2021. 31 pages.
Body Bottom