2022
DOI: 10.1109/access.2022.3210117
|View full text |Cite
|
Sign up to set email alerts
|

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

Abstract: The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. To protect these entities and learn about adversaries, data on attackers can be realistically gathered using decoy systems like honeypots. Admittedly, honeypots introduces a trade-off between the level of honeypot-attacker interactions and incurred overheads and costs for implementing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 56 publications
0
0
0
Order By: Relevance
“…An important direction for further research would be to combine the risk assessment and optimisation framework presented in this paper with the game-theoretic frameworks such as [25], [38], [42], and [43], to explore how strategic interactions impact the optimal choice of controls and support cyber security decisions. Additionally, the optimisation functionality of CENSOR could be extended in terms of its scope to allow for different objective functions, reflected in risk measures, such as the VaR and the CVaR.…”
Section: Discussionmentioning
confidence: 99%
“…An important direction for further research would be to combine the risk assessment and optimisation framework presented in this paper with the game-theoretic frameworks such as [25], [38], [42], and [43], to explore how strategic interactions impact the optimal choice of controls and support cyber security decisions. Additionally, the optimisation functionality of CENSOR could be extended in terms of its scope to allow for different objective functions, reflected in risk measures, such as the VaR and the CVaR.…”
Section: Discussionmentioning
confidence: 99%
“…Panda et al [23] proposed a new decision support framework for Internet of Vehicles honeypot deception, using decoy systems such as honeypots to truly collect attacker data. Haydari et al [24] proposed a statistical non-parametric intrusion detection system for the online detection of attacks, which has superior performance in fast and accurate detection.…”
Section: Intrusion Detection Methods Based On Other Types (Nonmachine...mentioning
confidence: 99%
“…The potential for cyber attacks on vehicles, infrastructure, and autonomous networks has already yielded some protective actions: situation reviews (Chen et al, 2022;Sharma and Gillanders, 2022), policy recommendations (Girdhar et al, 2022;Khan et al, 2022;Kukkala et al, 2022;Benyahya et al, 2023), honey-pots (Panda et al, 2022;Anastasiadis et al, 2023;Baldo et al, 2023), and attack detection (Chen et al, 2021;Zelle et al, 2022;Zhang et al, 2023). This activity demonstrates a high level of concern for the cybersecurity of vehicles, infrastructure, and autonomous vehicles.…”
Section: Security Considerationsmentioning
confidence: 99%