2014
DOI: 10.1007/978-3-642-40861-8_22
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Honeypot Solution for Proactive Security in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Honeypot (Spitzner, 2003) is a potential solution that can be used to collect and analyze attacker behaviors. In vehicular networks, many proposals (Gantsou and Sondi, 2014; Patel and Jhaveri, 2017; Sharma and Kaul, 2018) relied on the honeypot to deal with security attacks. To date, we have identified only an old work (Verendel et al , 2008) which introduces a placement strategy of a honeypot within a driving vehicle based on CAN bus.…”
Section: Discussion and Research Challengesmentioning
confidence: 99%
“…Honeypot (Spitzner, 2003) is a potential solution that can be used to collect and analyze attacker behaviors. In vehicular networks, many proposals (Gantsou and Sondi, 2014; Patel and Jhaveri, 2017; Sharma and Kaul, 2018) relied on the honeypot to deal with security attacks. To date, we have identified only an old work (Verendel et al , 2008) which introduces a placement strategy of a honeypot within a driving vehicle based on CAN bus.…”
Section: Discussion and Research Challengesmentioning
confidence: 99%
“…Honeypots have been used to identify vehicles behaving selfishly to preserve their resources [5], collect adversarial information [6], and support intrusion detection systems for VANETs [23]. [7] highlighted the application of honeypots in VANETs by presenting how in-vehicle honeypots and road side unit honeypots could be used to support the security and enhance the performance of VANETs. Verendel et al [6] proposed three in-vehicle honeypot models demonstrating the use of honeypots in IoV to gather adversarial information.…”
Section: A Honeypots For Vehiclesmentioning
confidence: 99%
“…IoV thus needs to address numerous security issues including threats concerning the Internet of Things (IoT) but also new threats specific to connected vehicular networks. Cyber deception and more specifically honeypots have been studied within the field of vehicular networks, e.g., [5], [6], [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…to design algorithms that are suitable in the IoV network. Some promising techniques, like Intrusion Detection System (IDS) [99] , Honeypot [100] , and Secure Routing Protocols [101] have been shown to be effective.…”
Section: Security and Privacymentioning
confidence: 99%