Figure 10: Delivery ratio
4 CONCLUSIONS
From the research that has been done, it can be con-
cluded that based on the security requirements and
types of attacks that can occur in vanet, network avail-
ability is the first and most important thing because it
is related to network services, if not available, users
will lose the benefits of safety and non-safety appli-
cations.
In order to be used properly, network services
must be available at all times, but attacks on DoS
that are carried out can result in availability being dis-
rupted. This attack is categorized as the first class be-
cause it diverts services from the start and prevents
sending information between nodes and infrastruc-
ture.
In this paper, we describe the vanet architecture,
attack type, type of attack, several methods and mod-
els to cancel and reduce the risk of attacks, not only
DoS also includes DDoS. The most important thing
is to maintain availability on the network, messages
generated by VANET services must be guaranteed
and provide benefits to users.
REFERENCES
Hasbullah, H., Soomro, I. A., et al. (2010). Denial of ser-
vice (dos) attack and its possible solutions in vanet.
International Journal of Electronics and Communica-
tion Engineering, 4(5):813–817.
Kolandaisamy, R., Md Noor, R., Ahmedy, I., Ahmad, I.,
Reza Z’aba, M., Imran, M., and Alnuem, M. (2018).
A multivariant stream analysis approach to detect
and mitigate ddos attacks in vehicular ad hoc net-
works. Wireless Communications and Mobile Com-
puting, 2018.
Krishna, B. H. (2017). Study of ad hoc network with ref-
erence to manet vanet fanet. International Journal
of Advanced Research in Computer Science and Soft-
ware Engineering, 7(7):390–394.
Kumar, A., Bansal, M., et al. (2017). A review on vanet se-
curity attacks and their countermeasure. In 2017 4th
International Conference on Signal Processing, Com-
puting and Control (ISPCC), pages 580–585. IEEE.
Luckshetty, A., Dontal, S., Tangade, S., and Manvi, S. S.
(2016). A survey: comparative study of applications,
attacks, security and privacy in vanets. In 2016 In-
ternational Conference on Communication and Signal
Processing (ICCSP), pages 1594–1598. IEEE.
Malla, A. M. and Sahu, R. K. (2013). Security attacks with
an effective solution for dos attacks in vanet. Interna-
tional Journal of Computer Applications, 66(22).
Pathre, A. (2013). Identification of malicious vehicle in
vanet environment from ddos attack. Journal of
Global Research in Computer Science, 4(6):30–34.
Rampaul, D., Patial, R. K., and Kumar, D. (2016). Detec-
tion of dos attack in vanets. Indian Journal of Science
and Technology, 9(47).
Sumra, I. A., Ahmad, I., Hasbullah, H., et al. (2011). Be-
havior of attacker and some new possible attacks in
vehicular ad hoc network (vanet). In 2011 3rd Inter-
national Congress on Ultra Modern Telecommunica-
tions and Control Systems and Workshops (ICUMT),
pages 1–8. IEEE.
Sumra, I. A., Hasbullah, H. B., Ahmad, I., Alghazzawi,
D. M., et al. (2013). Classification of attacks in ve-
hicular ad hoc network (vanet). International Infor-
mation Institute (Tokyo). Information, 16(5):2995.
VIPIN, D. and Chhillar, R. S. (2018). The ddos attack de-
tection and prevention in vanet by group controlled
analysis model.
ICCETIM 2019 - International Conference on Creative Economics, Tourism Information Management
132