ABSTRACT

This chapter discusses the message constraints and the message types that will be delivered across the network to identify critical and constrained messages. It provides a general attacker classification, attacks discussed in the literature, and potential defense methods that have been applied in particular to them. The chapter presents the overall classification of defense methods and the presentation of some of the techniques that fall under that particular umbrella. It examines some potential areas of research and development that are found to be lacking or understudied in the security software protocols of Vehicular Ad-hoc Networks (VANETs) and that could lead to interesting results in the future. The primary element in any security system is trust and privacy. The primary function of VANETs should be operational without dependence on heavy infrastructure presence nor the majority of other “smart” cars on the road as the two will keep coexisting for the following decades.