Dr.Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan
{"title":"攻击者和攻击对车联网可用性需求的影响研究","authors":"Dr.Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan","doi":"10.1109/ICCOINS.2014.6868376","DOIUrl":null,"url":null,"abstract":"Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Effects of attackers and attacks on availability requirement in vehicular network: A survey\",\"authors\":\"Dr.Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan\",\"doi\":\"10.1109/ICCOINS.2014.6868376\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network.\",\"PeriodicalId\":368100,\"journal\":{\"name\":\"2014 International Conference on Computer and Information Sciences (ICCOINS)\",\"volume\":\"203 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Computer and Information Sciences (ICCOINS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCOINS.2014.6868376\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computer and Information Sciences (ICCOINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCOINS.2014.6868376","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effects of attackers and attacks on availability requirement in vehicular network: A survey
Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network.