Several days ago I have final presentation in the class about data security in VANET. Because i don't want to keep it just in my dropbox, I share it with you so maybe it can help you somehow..
You can download it here
VANET have challenge in mobile networks, such as :
1. Risk Potential
2. Financial Assets
3. New Business Model
4. Cost
5. Usability
6. MObility
7. Provacy
8. Reliability
9. Market Penetration
10. Legislation
Right now, VANET can be implemented in the vehicle such as car and motorbike that use security.
And also VANET also can be implemented inside the GPS system which can make one vehicle and other communicate each other.
But, because of this communication security and safety are the most important things in the development of VANET application.
Several malicious that can make security and safety not good are because of hackers, such as :
1. Curious hacker
2. Academic Hacker
3. Malicious Hacker
4. Organizational Hacker
5. End User
The type of the attack, such as :
1. Denial of Service (DoS)
2. Message Manipulation
3. Reply and Tunnel Attack
4. Eavesdropping
5. Branch of Privacy
6. Masquerading and Sybil Attacks
7. Extraction of Secret Key
8. Financial Exploitation
I'm not going to explain all of those. So, if you interested, you can download it in here.
You can download it here
VANET have challenge in mobile networks, such as :
1. Risk Potential
2. Financial Assets
3. New Business Model
4. Cost
5. Usability
6. MObility
7. Provacy
8. Reliability
9. Market Penetration
10. Legislation
Right now, VANET can be implemented in the vehicle such as car and motorbike that use security.
And also VANET also can be implemented inside the GPS system which can make one vehicle and other communicate each other.
But, because of this communication security and safety are the most important things in the development of VANET application.
Several malicious that can make security and safety not good are because of hackers, such as :
1. Curious hacker
2. Academic Hacker
3. Malicious Hacker
4. Organizational Hacker
5. End User
The type of the attack, such as :
1. Denial of Service (DoS)
2. Message Manipulation
3. Reply and Tunnel Attack
4. Eavesdropping
5. Branch of Privacy
6. Masquerading and Sybil Attacks
7. Extraction of Secret Key
8. Financial Exploitation
I'm not going to explain all of those. So, if you interested, you can download it in here.
No comments:
Post a Comment
Anda bisa memasukkan komentar tentang postingan di sini...Terima Kasih ^.^