Non-interactive malicious behavior detection in vehicular networks

G. D. Crescenzo, Y. Ling, S. Pietrowicz, Zhang Tao
{"title":"Non-interactive malicious behavior detection in vehicular networks","authors":"G. D. Crescenzo, Y. Ling, S. Pietrowicz, Zhang Tao","doi":"10.1109/VNC.2010.5698267","DOIUrl":null,"url":null,"abstract":"We lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. While current research in the vehicular networks security area has done a good job in recognizing standard security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we study the problem of modeling traffic-related attacks in vehicular networks and presenting automatic and efficient (i.e., no human intervention and no expensive cryptographic protocols) solutions to prevent or tolerate a number of these attacks. To prevent these attacks, we propose techniques based on the capability of implementing simple and non-interactive voting algorithms using the mere participations of vehicles to the vehicular network. We provide analysis and simulation results in typical urban environments validating our techniques. Previous work required interactive protocols to implement voting or consensus techniques and implicitly left open the question we solve in this paper.","PeriodicalId":257339,"journal":{"name":"2010 IEEE Vehicular Networking Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Vehicular Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2010.5698267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

We lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. While current research in the vehicular networks security area has done a good job in recognizing standard security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we study the problem of modeling traffic-related attacks in vehicular networks and presenting automatic and efficient (i.e., no human intervention and no expensive cryptographic protocols) solutions to prevent or tolerate a number of these attacks. To prevent these attacks, we propose techniques based on the capability of implementing simple and non-interactive voting algorithms using the mere participations of vehicles to the vehicular network. We provide analysis and simulation results in typical urban environments validating our techniques. Previous work required interactive protocols to implement voting or consensus techniques and implicitly left open the question we solve in this paper.
车载网络中的非交互式恶意行为检测
我们为全面调查车辆网络的“交通相关”威胁奠定了基础。虽然目前车辆网络安全领域的研究在识别标准安全和加密威胁方面做得很好,但文献中很少考虑针对车辆交通的威胁的详细建模和分析。在本文中,我们研究了车辆网络中与流量相关的攻击建模问题,并提出了自动和有效的(即,没有人为干预和昂贵的加密协议)解决方案来防止或容忍这些攻击。为了防止这些攻击,我们提出了基于实现简单和非交互式投票算法的能力的技术,这些算法只使用车辆对车辆网络的参与。我们提供了典型城市环境的分析和模拟结果,验证了我们的技术。以前的工作需要交互式协议来实现投票或共识技术,并且隐式地保留了我们在本文中解决的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信