2012 Third International Conference on the Network of the Future (NOF) 2012
DOI: 10.1109/nof.2012.6463997
|View full text |Cite
|
Sign up to set email alerts
|

Risk analysis study of ITS communication architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…However, it is worth note that in practice, it is useful to limit the value of ς to a small number in order to avoid "Sybillike" attacks (DOUCEUR, 2002). In this type of attack one vehicle impersonate a platoon aiming to get some advantage over the system (MOALLA et al, 2012). As a consequence, such a fake platoon could end up receiving preferential treatment from traffic lights programmed to give higher priority to congested roads.…”
Section: The Security Credential Management System (Scms)mentioning
confidence: 99%
“…However, it is worth note that in practice, it is useful to limit the value of ς to a small number in order to avoid "Sybillike" attacks (DOUCEUR, 2002). In this type of attack one vehicle impersonate a platoon aiming to get some advantage over the system (MOALLA et al, 2012). As a consequence, such a fake platoon could end up receiving preferential treatment from traffic lights programmed to give higher priority to congested roads.…”
Section: The Security Credential Management System (Scms)mentioning
confidence: 99%
“…or even to automatically adapt to the new conditions. A detailed risk analysis for in tervehicular communications can be found in [13]. Among these risks, we can cite the eavesdropping on the communications, the emission of fake data to a vehicle in order to trigger an unappropriate reaction, and of course a potential compromission of the ECU responsible for car-to-car communica tions.…”
Section: Remote Attacksmentioning
confidence: 99%
“…However, it is important to note that some usual attacks can be applied to the V2G interface. More information can be find in the related papers [1,2,3].…”
Section: Threats and Vulnerabilities Of The V2g Interfacementioning
confidence: 99%