Attacks and countermeasures in the internet of vehicles

作者: Yunchuan Sun , Lei Wu , Shizhong Wu , Shoupeng Li , Tao Zhang

DOI: 10.1007/S12243-016-0551-6

关键词: EngineeringCloud computingInternet privacyIntelligent transportation systemAuthenticationComputer securityInternet securityCloud computing securityAttack modelIdentification (information)The Internet

摘要: … by comparing the signatures in the database with the IoV states. The IDS based on signature will … are integrated in vehicles, which makes signature-based detection invalid sometimes. …

参考文章(96)
Jetzabel Maritza Serna-Olvera, A trust-driven privacy architecture for vehicular ad-hoc networks TDX (Tesis Doctorals en Xarxa). ,(2013)
Dhavy Gantsou, Patrick Sondi, Toward a Honeypot Solution for Proactive Security in Vehicular Ad Hoc Networks Lecture Notes in Electrical Engineering. pp. 145- 150 ,(2014) , 10.1007/978-3-642-40861-8_22
Susan A. Sherer, Risk Analysis and Management Software Failure Risk. pp. 13- 24 ,(1992) , 10.1007/978-1-4615-3020-6_2
Baraa T. Sharef, Raed A. Alsaqour, Mahamod Ismail, Review: Vehicular communication ad hoc routing protocols: A survey Journal of Network and Computer Applications. ,vol. 40, pp. 363- 396 ,(2014) , 10.1016/J.JNCA.2013.09.008
Yingjie Wang, Guisheng Yin, Zhipeng Cai, Yuxin Dong, Hongbin Dong, A trust-based probabilistic recommendation model for social networks Journal of Network and Computer Applications. ,vol. 55, pp. 59- 67 ,(2015) , 10.1016/J.JNCA.2015.04.007
Kevin Harnett, Charlie McCarthy, National Institute of Standards and Technology (NIST) Cybersecurity Risk Management Framework Applied to Modern Vehicles United States. National Highway Traffic Safety Administration. ,(2014)
Luca Delgrossi, Tao Zhang, Vehicle Safety Communications: Protocols, Security, and Privacy Wiley Series on Information and Communication Technology. ,vol. 103, ,(2012) , 10.1002/9781118452189
Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim, A Key Management Scheme for Large Scale Distributed Sensor Networks Personal Wireless Communications. pp. 437- 446 ,(2006) , 10.1007/11872153_38
Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Z. Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica, The SAHARA Model for Service Composition across Multiple Providers international conference on pervasive computing. pp. 1- 14 ,(2002) , 10.1007/3-540-45866-2_1