Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Title | Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Houmer, M., Hasnaoui, M. L., Elfergougui, A. |
Conference Name | 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT) |
ISBN Number | 978-1-5386-4248-1 |
Keywords | Ad Hoc Network Security, attack tree, attack-defense tree, Availability, compositionality, Computers, Conferences, confidential information, confidentiality, data privacy, important security requirements, information discreet, integrity, Logic gates, Metrics, open access environment, privacy, private information, pubcrawl, Resiliency, security, security analysis, security threat, smart cities, telecommunication security, tree structure, trees (mathematics), VANET, vehicle network, Vehicles, vehicular ad hoc network, vehicular ad hoc networks, vehicular ad-hoc networks |
Abstract | Nowadays, Vehicular ad hoc network confronts many challenges in terms of security and privacy, due to the fact that data transmitted are diffused in an open access environment. However, highest of drivers want to maintain their information discreet and protected, and they do not want to share their confidential information. So, the private information of drivers who are distributed in this network must be protected against various threats that may damage their privacy. That is why, confidentiality, integrity and availability are the important security requirements in VANET. This paper focus on security threat in vehicle network especially on the availability of this network. Then we regard the rational attacker who decides to lead an attack based on its adversary's strategy to maximize its own attack interests. Our aim is to provide reliability and privacy of VANET system, by preventing attackers from violating and endangering the network. to ensure this objective, we adopt a tree structure called attack tree to model the attacker's potential attack strategies. Also, we join the countermeasures to the attack tree in order to build attack-defense tree for defending these attacks. |
URL | https://ieeexplore.ieee.org/document/8428905 |
DOI | 10.1109/MoWNet.2018.8428905 |
Citation Key | houmer_security_2018 |
- tree structure
- private information
- pubcrawl
- Resiliency
- security
- Security analysis
- security threat
- smart cities
- telecommunication security
- privacy
- trees (mathematics)
- VANET
- vehicle network
- vehicles
- vehicular ad hoc network
- vehicular ad hoc networks
- vehicular ad-hoc networks
- Ad Hoc Network Security
- open access environment
- Metrics
- Logic gates
- integrity
- information discreet
- important security requirements
- data privacy
- confidentiality
- confidential information
- Conferences
- Computers
- Compositionality
- Availability
- attack-defense tree
- attack tree