Reference Hub3
Review of Security in VANETs and MANETs

Review of Security in VANETs and MANETs

Mai Abu Baqar, Hamza Aldabbas, Tariq Alwadan, Mai Alfawair, Helge Janicke
Copyright: © 2014 |Pages: 27
ISBN13: 9781466647893|ISBN10: 1466647892|EISBN13: 9781466647909
DOI: 10.4018/978-1-4666-4789-3.ch001
Cite Chapter Cite Chapter

MLA

Abu Baqar, Mai, et al. "Review of Security in VANETs and MANETs." Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, et al., IGI Global, 2014, pp. 1-27. https://doi.org/10.4018/978-1-4666-4789-3.ch001

APA

Abu Baqar, M., Aldabbas, H., Alwadan, T., Alfawair, M., & Janicke, H. (2014). Review of Security in VANETs and MANETs. In A. Amine, O. Mohamed, & B. Benatallah (Eds.), Network Security Technologies: Design and Applications (pp. 1-27). IGI Global. https://doi.org/10.4018/978-1-4666-4789-3.ch001

Chicago

Abu Baqar, Mai, et al. "Review of Security in VANETs and MANETs." In Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, 1-27. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4789-3.ch001

Export Reference

Mendeley
Favorite

Abstract

Mobile Ad Hoc Network (MANET) and Vehicular Ad Hoc Network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured, and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be set-up and deployed anywhere and anytime because it has a simple infrastructure set-up and no central administration. Distributing information between these nodes over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it, especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging. They are explored in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.