<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra
Security Assessment in Vehicular Networks
β Scribed by Suguo Du, Haojin Zhu (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2013
- Tongue
- English
- Leaves
- 58
- Series
- SpringerBriefs in Computer Science
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.
β¦ Table of Contents
Front Matter....Pages i-xi
Introduction to Vehicular Networks Security....Pages 1-8
Security Assessment via Attack Tree Model....Pages 9-16
Attack-Defense Tree Based Security Assessment....Pages 17-22
A VANETs Attack-Defense Game....Pages 23-34
Modelling of Multiple Phased Attack on VANET Security....Pages 35-42
Back Matter....Pages 43-49
β¦ Subjects
Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks; Data Encryption
π SIMILAR VOLUMES
<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra
<p><span>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. </span></p><p><span>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged o
<b>This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks</b> <ul> <li>Take a cooperative approach towards addressing the technologyβs challenges of security and privacy issues</li> <li>Explores interdisciplinary methods
Donβt wait for an attacker to find and exploit your security vulnerabilitiesβtake the lead by assessing the state of your networkβs security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams