In recent years, a series of serious catastrophic traffic accidents, such as the Chongqing bus crash and Wuxi Road bridge collapse, revealed some serious issues in the mobile vehicle safety and emergency response mechanisms. The advent of 5G communication has undoubtedly created some great opportunities for solving these issues. In order to fulfill the requirements of serious traffic accident prevention and forensic analysis, this paper proposes an event-based mobile vehicle cyber-physical security governance framework based on 5G communication technology. The proposed framework aims to resolve the issues of mobile vehicle security, including the availability of network resources in high-speed motion and the complexity of security objectives within cyberphysical systems. Relying on precise perception of insecure events at the physical, communication, and society layers, this paper constructs an integrated intelligent safety response strategy for physical equipment information security, state vehicle security, environmental vehicle security, and network security by intelligent perception, edge-cloud computing, and other technologies. The proposed framework achieves the goals of real-time event prediction before the event, immediate alarm during the event, and replay for evidence forensics after the event.
The increasing popularity of Internet of Things (IoTs) is making people universally connected and thus bringing the ease of life. Because of their sheer volume, weak security, and continual operation, IoT devices, along with many computer servers, are widely compromised to launch powerful distributed denial-of-service (DDoS) attacks. The emerging link flooding attacks (LFAs) are one type of such attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices) are deliberately aggregated at upstream critical links and grow intensified, gradually making a network connected to the critical links disconnected. Although LFAs are far more sophisticated than traditional DDoS attacks, whether such sophistication comes without a downside has never been investigated. In this paper, by modeling link flooding attacks and defenses, we tackle a series of questions concerning the practical issues of LFAs. Specifically, from the perspective of attacks, we advance a novel notion of strike precision, and reveal that LFAs may exhibit attack interference (i.e., unexpectedly interfere the connectivity of innocent networks) which might undermine the stealthiness and persistence of LFAs. From the perspective of defenses, we make the first step to study attack intention, i.e., inversely inferring the target network to disconnect based on the identified links under attack. Furthermore, we consider a strong defender who employs traffic engineering to mitigate LFAs, and formulate the game-theoretic interactions between attackers and defenders. Our formulation demonstrates that LFAs can be effectively mitigated based on traffic engineering from a game-theoretic perspective. We also study practical issues of non-cooperative defenses (e.g., light-weight probe deployment, multi-protocolbased measurement).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.