Visible to the public Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree

TitleSecurity Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Publication TypeConference Paper
Year of Publication2018
AuthorsHoumer, M., Hasnaoui, M. L., Elfergougui, A.
Conference Name2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)
ISBN Number978-1-5386-4248-1
KeywordsAd Hoc Network Security, attack tree, attack-defense tree, Availability, compositionality, Computers, Conferences, confidential information, confidentiality, data privacy, important security requirements, information discreet, integrity, Logic gates, Metrics, open access environment, privacy, private information, pubcrawl, Resiliency, security, security analysis, security threat, smart cities, telecommunication security, tree structure, trees (mathematics), VANET, vehicle network, Vehicles, vehicular ad hoc network, vehicular ad hoc networks, vehicular ad-hoc networks
Abstract

Nowadays, Vehicular ad hoc network confronts many challenges in terms of security and privacy, due to the fact that data transmitted are diffused in an open access environment. However, highest of drivers want to maintain their information discreet and protected, and they do not want to share their confidential information. So, the private information of drivers who are distributed in this network must be protected against various threats that may damage their privacy. That is why, confidentiality, integrity and availability are the important security requirements in VANET. This paper focus on security threat in vehicle network especially on the availability of this network. Then we regard the rational attacker who decides to lead an attack based on its adversary's strategy to maximize its own attack interests. Our aim is to provide reliability and privacy of VANET system, by preventing attackers from violating and endangering the network. to ensure this objective, we adopt a tree structure called attack tree to model the attacker's potential attack strategies. Also, we join the countermeasures to the attack tree in order to build attack-defense tree for defending these attacks.

URLhttps://ieeexplore.ieee.org/document/8428905
DOI10.1109/MoWNet.2018.8428905
Citation Keyhoumer_security_2018