TY - CONF UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938765625&doi=10.1109%2fICCOINS.2014.6868376&partnerID=40&md5=dd896d2ed73a5ef15313afaa4c3e4a8f AV - none N2 - Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network. © 2014 IEEE. PB - Institute of Electrical and Electronics Engineers Inc. KW - Applications; Cryptography KW - Attackers; Attacks; Security requirements; Threat levels; Threats levels; Vehicular environments; Vehicular networks; Wireless medium KW - Surveys N1 - cited By 11; Conference of 2014 International Conference on Computer and Information Sciences, ICCOINS 2014 ; Conference Date: 3 June 2014 Through 5 June 2014; Conference Code:112912 ID - scholars4277 TI - Effects of attackers and attacks on availability requirement in vehicular network: A survey SN - 9781479943913 Y1 - 2014/// A1 - Sumra, I.A. A1 - Hasbullah, H.B. A1 - Abmanan, J.-L.B. ER -