Abstract In the past decade, more and more research has been done on nearly every aspect of vehicular networks, which are quite likely to become popular on the world's highways. Perhaps not surprisingly, security has become an issue. As with any network, attacks may come from a variety of directions. Vehicular networks present unique challenges in that the network itself is markedly atypical in terms of topology and node mobility. In addition, unmitigated attacks carry potentially very significant consequences. High node mobility coupled with frequent network changes makes traditional authentication and security mechanisms impractical in many cases. The problem becomes then the authentication of the data content within the network given the presence of adversaries. We identify probable attacks against vehicle-to-vehicle message applications and propose potential mitigation methods. Speaker Bio Eric John Swankoski is a third-year Ph.D. student in Dept. of Computer Science at George Mason University. He obtained his B.S. and M.S. at Penn State in 2002 and 2004, respectively.