𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Assessment in Vehicular Networks

✍ Scribed by Suguo Du, Haojin Zhu (auth.)


Publisher
Springer-Verlag New York
Year
2013
Tongue
English
Leaves
58
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

✦ Table of Contents


Front Matter....Pages i-xi
Introduction to Vehicular Networks Security....Pages 1-8
Security Assessment via Attack Tree Model....Pages 9-16
Attack-Defense Tree Based Security Assessment....Pages 17-22
A VANETs Attack-Defense Game....Pages 23-34
Modelling of Multiple Phased Attack on VANET Security....Pages 35-42
Back Matter....Pages 43-49

✦ Subjects


Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks; Data Encryption


πŸ“œ SIMILAR VOLUMES


Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra

Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra

Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. </span></p><p><span>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling

Security in Vehicular Networks: Focus on
✍ Leila Benarous, Salim Batim, Abdelhamid Mellouk πŸ“‚ Library πŸ“… 2022 πŸ› Wiley-ISTE 🌐 English

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged o

Vehicular Ad Hoc Network Security and Pr
✍ Xiaodong Lin, Rongxing Lu πŸ“‚ Library πŸ“… 2015 πŸ› Wiley-IEEE Press 🌐 English

<b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b> <ul> <li>Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues</li> <li>Explores interdisciplinary methods

Assessing Network Security
✍ Kevin Lam, David LeBlanc, Ben Smith πŸ“‚ Library πŸ“… 2004 πŸ› Microsoft Press 🌐 English

Don’t wait for an attacker to find and exploit your security vulnerabilitiesβ€”take the lead by assessing the state of your network’s security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams