A Systematic Approach for Attack Analysis and Mitigation in V2V Networks

نویسندگان

  • Bharat K. Bhargava
  • Amber M. Johnson
  • Gisele Izera Munyengabe
  • Pelin Angin
چکیده

The increasing popularity of V2V networks with the rise of driverless cars in the recent years have made them vulnerable to attacks in growing complexity. Accurate assessment of the safety and security needs of V2V networks based on context and the costs associated with attack mitigation mechanisms are significant for successful operation of these networks despite adversaries trying to disrupt their functions. In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down of attacks into common feature sets. We also provide cost analyses of major classes of V2V attacks using the proposed model. The proposed analysis approach is promising to provide guidance for research in optimization models for tradeoffs between security, safety and performance requirements in V2V.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Developing a conceptual model based upon the Latin Hypercube Sampling for integrating OHS into project risk evaluation

Abstract Project management in construction industry, in many cases, is imperfect with respect to the integration of Occupational Health and Safety (OHS) risks. This imperfection exhibits itself as complications affecting the riskiness of industrial procedures and is illustrated usually by poor awareness of OHS within project teams. Difficulties on OHS regularly came about in the construction i...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2016