2008 IEEE Globecom Workshops 2008
DOI: 10.1109/glocomw.2008.ecp.63
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Roadside Attacker Behavior in VANETs

Abstract: Communication using VANETs is commonly seen as the next milestone for improving traffic safety. Vehicles will be enabled to exchange any kind of information that helps to detect and mitigate dangerous situations. Security research in the past years has shown that VANETs are endangered by a plethora of severe security risk.Subject of this work is the modeling of attackers that target active safety applications in VANETs. Through a risk analysis, this work identifies assets, threats and potential attacks in inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…Roadside attacker behavior is discussed in detail by Leinmuller et al in [17]. This paper provides an overview of various position forging attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Roadside attacker behavior is discussed in detail by Leinmuller et al in [17]. This paper provides an overview of various position forging attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A stationary roadside attacker is identified in [14] as the most threatening attack due to low complexity. As discussed in the attack on the GLOSA application, we additionally identify a moving attacker as rather threatening because its motivation may be higher compared to attackers that are not part of the road traffic.…”
Section: Related Workmentioning
confidence: 99%
“…The 1609.2 standard [3] also proposes the functionalities of a security layer in V2V communication. There have also been efforts regarding characterizing attacker behavior [13]. In a recent work, Sun and Fang [26] address the problem of defending against general misbehaviors in VANET.…”
Section: Related Workmentioning
confidence: 99%
“…The focus of this paper is to understand detection of misbehavior at the application layer. The related issues of understanding the attack and of security performance are considered in [13,14]. There exist several other works dealing with general considerations towards securing V2V systems [15][16][17][18][19]1,[20][21][22].…”
Section: Introductionmentioning
confidence: 99%