2010 IEEE Vehicular Networking Conference 2010
DOI: 10.1109/vnc.2010.5698267
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive malicious behavior detection in vehicular networks

Abstract: We lay ground for a comprehensive investigation of "traffic-related" threats to vehicular networks. While current research in the vehicular networks security area has done a good job in recognizing standard security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we study the problem of modeling traffic-related attacks in vehicular networks and presenting automatic and efficient (i.e., no human inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The paper didn't include detection; therefore, it's assumed it's beyond the scope of the study. [13] G. Di Crescenzo et al, creates a voting method that uses vehicle involvement to prevent malicious data manipulation, fabrication, or modification of the operation of a vehicle's on-board equipment in order to carry out attacks [14] On 802.11 networks, Sampath and colleagues investigated the impact and feasibility of cognitive radio-based jamming attacks. They demonstrated how the attacker can utilize the quick channel switching capability of cognitive radios to increase the jamming effect by utilizing a single radio to jam many channels.…”
Section: Jamming Attacks Detectionmentioning
confidence: 99%
“…The paper didn't include detection; therefore, it's assumed it's beyond the scope of the study. [13] G. Di Crescenzo et al, creates a voting method that uses vehicle involvement to prevent malicious data manipulation, fabrication, or modification of the operation of a vehicle's on-board equipment in order to carry out attacks [14] On 802.11 networks, Sampath and colleagues investigated the impact and feasibility of cognitive radio-based jamming attacks. They demonstrated how the attacker can utilize the quick channel switching capability of cognitive radios to increase the jamming effect by utilizing a single radio to jam many channels.…”
Section: Jamming Attacks Detectionmentioning
confidence: 99%
“…As an example of the first kind, redundancy was utilized in [8], where a non-interactive voting algorithm performed by the vehicle was introduced to detect malicious behavior. The algorithm depends on BSM messages broadcasts from other vehicles' reaction to an event to infer on the truth in that event.…”
Section: Background and Related Workmentioning
confidence: 99%
“…As an example of the first kind, redundancy was utilized in [9], where a non-interactive voting algorithm performed by the vehicle was introduced to detect malicious behavior. The algorithm depends on BSM message broadcasts from other vehicles' reaction to an event to infer on the truth in that event.…”
Section: B Related Workmentioning
confidence: 99%