Classification of Security attack in Vehicular Adhoc network: A survey
|
|
- Julie Wilcox
- 6 years ago
- Views:
Transcription
1 Classification of Security attack in Vehicular Adhoc network: A survey Swapnil G. Deshpande Arts, Commerce, Science College, Kiran Nagar, Amravati, Maharashtra, India Abstract: Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years. VANETs are being used to improve road safety and enable a wide variety of value-added services. Here we discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to prevent those attacks. In this work, we have done a survey of existing approaches to solve the problems associated with vehicular networks. The main contribution of this paper is to classify and identify different types of attacks in VANET. For the implementation of VANET, security is an important constraint. Most of the research concerted efforts in academics and industry are focused to provide efficient security architecture for VANET; to protect the network from adversary nodes and attacks. This paper focuses on the security challenges in VANET, especially for achieving privacy and their possible solutions. Keywords - Vehicular Ad hoc Network (VANET), attackers, attacks, Security 1. Introduction Security, however, has always been an issue in vehicular networks which must be seriously considered and a security infrastructure has to be designed and implemented in such networks. An attacker can inject false and invalid traffic messages into the network to distract drivers from choosing a specific route, or can use the network to determine a driver s location or identity. On the other hand, by gaining unauthorized access in network, an attacker can gain the control of critical components of a vehicle and cause irreparable damage to the vehicle or its passengers. One of the main challenges in VANET is to route the data efficiently from source to destination. Designing an efficient routing protocol for VANET is tedious task. Also because of wireless medium it is vulnerable to several attacks. Since attacks mislead the network operations, security is mandatory for successful deployment of such technology. This survey paper has been made to identify major security issues and challenges. There are several applications of vehicular networks which are discussed by manufacturers and also academics which will be both time and money saving. There have been numerous solutions and methods in order to improve the efficiency, privacy and security of such networks. Security, however, has always been an issue in vehicular networks which must be seriously considered and a security infrastructure has to be designed and implemented in such networks. In our work, we found that vehicular networks in general have several vulnerabilities and are exposed to different cyber attacks. Last few years, vehicular network has been taken more attention of researchers and automotive industries due to life saving factor. Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. ers generate different attacks in this life saving vehicular network. VANETs are wireless ad-hoc networks where the nodes, be it vehicles or RSU, can communicate and exchange data for purposes of information inquiry or distribution. The ultimate goal of VANETs is to enhance the driving experience and increase the level of safety for drivers. This can be achieved by allowing nodes within certain ranges (typically 5-10 Km) to connect with each other in order to exchange information (Raya et.al., 2006; Nadeem et.al. 2005; Dornbush & Joshi, 2007; Schoch, 2008). Figure shows a general view of VANETs structure. Figure 1 The basic structure of VANET One transportation system that has recently attracted a lot of attention from both academia and industry is vehicular ad hoc networks (VANETs). They constitute the basis of ITS. They enable vehicles to actively communicate with each other and to better perceive the traffic situation (such as accidents and traffic jams) in their vicinity. VANETs enable vehicles to avoid problems either by taking desired actions or by alerting other drivers. Besides road safety enhancements, the advent of VANET also opens up opportunities for many VANET-related applications (such as internet access from a car) that have great potential in enhancing our travelling comfort. VANETs Volume 2, Issue 2 March April 2013 Page 371
2 do not depend on fixed infrastructures and their nodes (known as mobile nodes) and may form networks on the fly for a variety of environments. Owing to the nature of these kinds of mobile nodes, VANETs can be challenged with frequent topology changes as well as physical threats (that create potential vulnerabilities for potential attackers). A successful attack on VANETs can have catastrophic results (such as the loss of lives) or may lead to financial losses (for payment services). Therefore securing VANETs is crucial to the design, implementation and operation of these networks [1]. Nowadays, transportation systems play an important part in our daily activities. Today major concern is to provide safety of users and safe their lives in road accidents. Safety and non safety potential applications of VANET are to ensure the safety of human life on the road. Security is the main concern of these applications where a wrong message (due to insecure environment) may directly affect the human lives. Safety and non safety messages are forwarded between the Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) on this communication medium. Maxim Raya et.al [2] described the attacker model. Insider, malicious, active, and local is some example of serious level attacks. Types of attacks can be different depending on the behaviour of attackers. Our focus point is too safe the communication medium by controlling attackers. Active and passive safety applications [3] are used to provide safety to users. The role of active safety is high and it sends warning messages to other vehicles. If attackers change these messages then accidents become a part of the network and users life can be on risk. Each vehicle comprises of hardware unit for determining correct location information using GPS. Roadside Units (RSUs) are placed across the road for infrastructure communication. The number of RSU to be used depends upon the communication protocol. Several factors like the type of the road, daytime, weather, traffic density and even the driver himself affect the movements of vehicles on a road. Hence, the network topology change frequently, and the routing protocol used has to adapt itself to these instantaneous changes continuously Scope The scope of this work is to study different types of vehicular network security issues and their countermeasures. The purpose of this paper is to find and study these vulnerabilities thoroughly and to present a solution to securing vehicular networks from unauthorized and malicious access. 2. Vehicular Ad Hoc Networks (VANET) The main idea behind VANET is providing communication among vehicles and also among vehicles and a number of fixed equipment located on the road. The main intention with VANET s is to enhance vehicles passengers safety and comfort by distributing traffic, speed control, road and weather conditions among nearby vehicles. Among its applications collision warnings, road sign alarms and automatic toll/parking payment can be mentioned. VANETs consist of a number of On-Board Units (OBU) which are located inside the vehicles and a number of Road-Side Units (RSU) which form the infrastructure of the network. OBU is a wireless gateway which can be connected to other OBUs and RSUs. Each vehicle equipped with the OBU can become a part of the network and will be able to send, relay and receive messages throughout the network. Due to its ad hoc nature, there won t be any centralized servers and vehicles are in charge of network management themselves [1]. Besides safety applications VANET also provide comfort applications to the road users. Communication in VANET is divided into two different categories: Vehicle-to-Vehicle (V2V) Communication, were the nearby vehicles will communicate traffic and road conditions to one another Vehicle-to-Infrastructure (V2I) Communication, were vehicles communicate their gathered information to the nearest RSU in order to distribute the information faster and more effectively. 2.1 Security Requirements Of VANET In order to have a secure and dependable vehicular network, a number of security requirements must be considered. Some of these security requirements are the same for all networks but some are valid and specific to vehicular networks only. With respect to the mentioned attacks and vulnerabilities securing vehicular communications in all aspects is a must. Here we provide a list of some general security requirements that must be taken into consideration in order to mitigate vulnerabilities and attacks against VANETs. As far as security requirements are concerned the applications of VANET are focused on safety messaging, cooperative driving, toll application etc. Therefore the integrity, liability of message, liability of the user has to be ensured and at the same time privacy has to be looked upon. A secure VANET system should satisfy following requirements: Authentication Despite the lack of need for confidentiality, network nodes must be authenticated in order to be able to send messages through the network. Before reacting to messages and events a vehicle must verify the legitimacy of the message and its sender, therefore there is a need for authentication. Without authentication, illegitimate and malicious users can inject false messages into the network and confuse other vehicles by distributing false Volume 2, Issue 2 March April 2013 Page 372
3 information. With authentication, vehicles can simply drop messages from unauthenticated users Authorization Authorization is on a higher level implemented by access control which itself is defined by network policies. Authorization defines the role of a node in the network which includes the types of messages a node can read or write on the network, actions it is allowed to take and generally the protocols that it can execute Data Consistency In addition to authenticating the sender, the consistency of messages with similar ones regarding time and location must also be considered, because false messages from legitimate senders are not impossible. It is extremely important for warning messages to meet the time and location constraints. A warning message must be shown to the driver before it is too late to react and also before passing the corresponding geographic location of the warning Confidentiality Since security in vehicular networks is related to safety, all network users should normally have full access to network data, i.e. traffic information, road conditions, etc. in order to make informed decisions. Since messages in VANETs don't contain any sensitive information and are not confidential, there is no need for encryption and confidentiality is not an important issue. Therefore, vehicular networks do not have to be protected against eavesdropping. However, network data should be sent from authenticated sources and this can be done by source authentication Integrity All messages which are sent and received on the network should be protected against alteration attacks. A secure vehicular network should provide protection against message alteration. A message can be altered in several ways during its transit from source to destinations and all possible attacks must be considered. When it comes to integrity there are three main threats directly related to message contents. System threats regarding integrity include (1) wrong or forged messages, (2) messages which are modified during transmission and (3) replayed messages Availability Since vehicular networks require real-time responses, they are vulnerable to DoS attacks. In order to remain operational, protocols and services must be resilient against denial of service attacks. The communication channel must be available at all times, it must also be reliable otherwise attackers can launch DoS attacks. Such attacks can disrupt the entire network which will lead to failure in delivering network messages to other vehicles in range. Therefore they must be securely designed and be fault-tolerant in order to work under faulty conditions. There are a couple of security measures such as channel monitoring which is a means to increase channel availability. Besides, new technologies are always under development which will try to increase availability in communication channels. Although availability can never be completely guaranteed, yet there are still a couple of security measures such as channel monitoring which is a means to increase channel availability. Besides, channel switching and using different communication technologies in case of jamming attacks can be helpful Non Repudiation When a node sends out a message, it shouldn t be able to later deny sending that message. In case of accidents or investigations, problem-causing drivers should be reliably identified, to correctly address the sequence and contents of exchanged messages. This can be done by signing outgoing messages with an anonymous key exclusively related to the sender and also a time- stamp associated to the message preventing the user to claim that a particular message has been replayed. In case of using digital signatures, each message is signed with its private but anonymous key. Therefore the vehicle owner cannot claim that he hasn't sent the message Privacy Driver privacy is an important issue in vehicular communications. Drivers don t want their personal and private information to be accessible by others. Since the vehicle information such as location, speed, time and other car data are transmitted via wireless communication, there should not be possible to infer the driver's identity from this information. Among this information, driver's location and tracing vehicle movements are more sensitive and must be taken into consideration carefully. Regarding this issue we come to another requirement called anonymity which is discussed below Anonymity Anonymity defines the requirement that network nodes must not be able to infer if a node performed or will perform some specific action in future. In order to prevent such inferences, there must be an equal probability of doing a specific action by all nodes, or have strong probabilistic anonymity, with the probabilities being equal for all nodes. By not requiring a vehicle to authenticate with its exact identity to other vehicles to which it sends information Real-time Constraints In order to have vehicular networks secured, specific measures and techniques have been suggested. Although these techniques seem applicable and useful, there is one important issue that must be taken into account, real-time Volume 2, Issue 2 March April 2013 Page 373
4 constraints. Out-dated messages, e.g. out-dated traffic or road/weather conditions, are of no use in vehicular networks and must be eliminated in order to let the newly generated messages get to their destinations on time. On the other hand, solutions such as digital signatures and certificates must be designed specifically for vehicular networks in order to fulfill real-time constraints of such networks. 3. Security challenges in VANETs Despite the various benefits offered by VANETs, they introduce several security challenges to the research community. These security challenges are mostly concerned with the trade-off between authentication and nonrepudiation versus privacy during communication within VANET environments. Another security challenge is delay sensitivity because significant delays prohibit the use of security protocols that have high overheads or rely on multiple stages of full-duplex communication between nodes [4,5]. The use of traditional authentication mechanisms to address some security threats (such as illusion attacks) without affecting privacy in VANETs poses a new challenge for those VANET applications that need to authenticate nodes in VANETs [6,7]. The other challenge is the restriction introduced by the transitory nature of interactions in a VN to use reputation-based schemes [8]. Another VANET security challenge is the forwarding of event-related messages on very large ad hoc networks of highly mobile nodes in such a way that the information can be trusted by receiving nodes because by doing so we improve traffic safety and mobility [9]. All these challenges need to be addressed to provide a secure VANET infrastructure where nodes (vehicles) can communicate securely with each other and infrastructure units. Table 1 Summary of security attacks in VANETs 11 This survey paper identify major security issues and challenges associated with different routing protocols. Third Type: Timing Forth Type: Social Fifth Type: Monitoring First Type: s on availability 1.Black Hole 2.Malware 3.Broadcast Tampering 4.Spamming 5.Greedy Drivers 6.Denial of Service Second Type: s on Authentication/ identification 1.Masquerading 2.Replay 3.Global Positioning System (GPS)Spoofing 4.Tunneling 5.Sybil Ref. Objective No. 10 In this paper, we propose five different classes of attacks and every class is expected to provide better perspective for the VANET security. The main contribution of this paper is the proposed solution for classification and identification of different attacks in VANET. Types of First Type: Network 1. Denial of service (DOS) 2.Distributed Denial of service (DDOS) 3.Sybil 4.Node Impersonation Second Type: Application (AP) 12 This paper aims to describe and analyze the most representative 6.Message Tampering 7.ID Disclosure Third Type: s on confidentiality Fourth Type: s on privacy Fifth Type: s on non-repudiation Sixth Type: s on data trust First Type : s on identification and authentication Volume 2, Issue 2 March April 2013 Page 374
5 VANET security developments 1.Impersonation. 1.1False attribute possession. 2. Sybil. Second Type: s on privacy 1.Identity revealing. 2. Location tracking. Third Type: s on non-repudiation Fourth Type: s on confidentiality Fifth Type: s on availability 1.Network Denial of Service (DoS) 1.1Routing anomalies. 13 In this paper, we have classified different security attacks and logically organized/represente d in a more lucid manner based on the level of effect of a particular security attack on intelligent vehicular traffic. 1.Malicious nodes 2.Illusion attack Fifth Type: Location 1.Forging positions and Sybil attacks 2.Position cheating and false position disseminating First Type: Network s 1.Denial of service (DOS) 2.Distributed Denial of service 3.Sybil 4.Node Impersonation Second Type: Application 2.Computation DoS. Third Type: Timing 1 This paper discusses some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to thwart those attacks. Sixth Type: s on data trust First Type: Anonymity 1.Malicious Vehicle Second Type: Key management 1.Brute force attack: 2. Misbehaving and faulty nodes Third Type: Privacy 1.Malicious user 2.Traffic analysis attacks Fourth Type : Reputation 14 Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and wide spread adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services. Fourth Type: Social Fifth Type: Monitoring First Type: Threats to availability 1.Denial of Service 2.Broadcast Tampering 3.Malware 4.Spamming 5.Black Hole Second Type: Threats to authenticity 1.Masquerading Volume 2, Issue 2 March April 2013 Page 375
6 2.Replay 3.Global Positioning System (GPS) Spoofing 4.Tunneling 5.Position Faking 6.Message Tampering 7.Message Suppression/ Fabrication/ Alteration 8.Key and/or Certificate Replication 9.Sybil Third Type: Threats to confidentiality 4. PROPERTIES OF ATTACKERS er create problem in the network by getting full access of communication medium DSRC. Here we are discussing some properties and capability of the attackers which has been mentioned in studies. Insider This type of attackers who is an authentic user of the network and have detail knowledge of network. Insider attacker might have access to insider knowledge and this knowledge will be used for understanding the design and configuration of network. When they have all information about the configuration then it s easy for them to launch attacks and create more problem as compare to outsider attacker. It can create problem in the network by changing the certificate keys. We can simply say that insider attacker is the right man doing the wrong job in the network. Outsider The outsider attacker is considered as an authentic user of the network. It is a kind of intruder which aims to misuse the protocols of the network and the range of such attacks are limited. Outsider attacker also has a limited diversity for launching different kind of attacks as compare to insider attacker. Coverage area Coverage area is the main property of attacker when they launch any kind of attacks. er could cover the main area of road, and it depends on the nature of the attacks. Basic level attacker has controlled one DSRC channels and covers the range of at most 1000 meters but the extended level attackers are more organized and cover more area using of hundred DSRC channels. Technical Expertise Technical expertise of the attacker makes them stronger for creating attacks in the network. It is difficult for attacker to mount attacks on cryptographic algorithms. Chance is low for attacker to compromise the infrastructure network and data capture from restricted area of network. er having ability to extracts the program code and secret keys of the computing platform of OBU and RSU by launching physical attacks. Resources Budget, manpower and tools are the three main key resources and attackers depend on it to achieve their goals. Need budget to borrow technical expert and spend time to understand the configuration of specific network and then disturb network with launching of different kind of attacks. er can use different kind of tools for launching attacks. These software tools can develop by own self or buy from the market. Many business parties make setup their business nears the road and provide non safety application services (Internet, entertainment services). One business party can be used their own maximum resources to create problems for other parties and destroy their business with different kind of attacks. 5. Conclusion and Future work In this paper various attacks in VANET have been classified. It has been observed that the classification helps to deal with different types of attack on VANET. Due to recent improvements in connecting vehicles to external networks, proper security mechanisms must be developed in parallel to reduce the risk of malicious and unauthorized behavior in the vehicular network domain. Users require safety on road in future vehicular network and it could be possible by implementing VANET applications. We expect that the proposed attacks classes may helpful to identify attacks and understand attackers. It is difficult to control attackers but in future work we will develop such system to identify attacks in network with respect to some specific type of attack. Implementation could be easy of this future human life saving network if we control attackers and their attacks. In this work, we have analyzed the attacks that VANETs can be subjected to. Table provides a summary of the security attacks we have identified that may be launched on VANETs and the corresponding security solutions to mitigate those attacks. I hope that this survey will enable VANET designers and developers to build more secure and robust VANET architectures, protocols and applications in the future. Volume 2, Issue 2 March April 2013 Page 376
7 REFERENCES [1] J.T. Isaac S. Zeadally J.S. Ca mara Security attacks and solutions for vehicular ad hoc networks IET Communications [2] M. Raya, J. Pierre, Hubaux, Securing vehicular ad hoc Networks Journal of Computer Security,vol.15, january 2007, pp: [3] A.Weimerskirch,J.J Haas,Y.C.Hu,K.P.Laberteaux, Data security in vehicular communication networks,chapter no.09, pp [4] BURMESTER M., MAGKOS E., CHRISSIKOPOULOS V.: Strengthening Privacy protection in VANETs. IEEE Int. Conf. on Wireless & Mobile Computing, Networking & Communication (WIMOB 2008), 2008, pp [5] JAKUBIAK J., KOUCHERYAV Y.: State of the art and research challenges for VANETs. Fifth IEEE Consumer Communications and Networking Conf. (CCNC 2008), 2008, pp [6] XI Y., SHA K., SHI W., SCHWIEBERT L., ZHANG T.: Enforcing privacy using symmetric random keyset in vehicular networks. Eighth Int. Symp. on Autonomous Decentralized Systems (ISADS 2007), 2007, pp [7] LO N., TSA H.: Illusion attack on VANET applications a message plausibility problem. IEEE Globecom Workshops, 2007, pp. 1 8 [8] PARNO B., PERRIG A.: Challenges in securing vehicular networks. Fourth Workshop on Hot Topics in Networks (HotNets-IV), 2005 [9] FLORIAN D., LARS F., PRZEMYSLAW M.: VARS: a vehicle ad hoc network reputation system. Int. Conf. on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 2005, pp [10] Irshad Ahmed Sumra,Iftikhar Ahmad, Halabi Hasbullah Classes of s in VANET [11] Anup Dhamgaye, Nekita Chavhan Survey on security challenges in VANET IJCSN International Journal of Computer Science and Network, Vol 2, Issue 1, [12] José María de Fuentes, Ana Isabel González-Tablas, Arturo Ribagorda Overview of security issues in Vehicular Ad-hoc Networks [13] Adil Mudasir Malla Ravi Kant Sahu Security s with an Effective Solution for DOS s in VANET International Journal of Computer Applications ( ) Volume 66 No.22, March 2013 [14] Sherali Zeadally Ray Hunt Yuh-Shyan Chen Angela Irwin Aamir Hassan Vehicular ad hoc networks (VANETS): status, results, and challenges Springer Science+Business Media, LLC 2010 Volume 2, Issue 2 March April 2013 Page 377
Overview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationOVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK)
OVERVIEW OF SECURITY ISSUES IN VANET (VEHICULAR ADHOC NETWORK) (MTech 2 nd year) Computer Science & Engineering Integral University, Lucknow 60 ABSTRACT Vehicular Ad Hoc Network is a kind of special wireless
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationMitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks
Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationSybil Attack Detection and Prevention Using AODV in VANET
Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru
More informationICMP and Monitoring to Detect and Isolate Sybil Attack in VANET
ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET Jaydeep P. Kateshiya 1, Anup Parkash Singh 2 P.G. Student, Department of Computer Engineering, Lovely Professional University, Punjab, India
More informationSURVEY: Reputation and Trust Management in VANETs
, pp. 301-306 http://dx.doi.org/10.14257/ijgdc.2015.8.4.29 SURVEY: Reputation and Trust Management in VANETs Jitendra Singh Sengar BVM College of Technology & Management, Gwalior, MP, India jitendrasinghsengar@gmail.com
More informationEnhancement of VANET Communication Range using WiMAX and Wi-Fi: A Survey
International Journal of Urban Design for Ubiquitous Computing Vol.1, No.1, (2013), pp. 9-16 http://dx.doi.org/10.21742/ijuduc.2013.1.1.02 Enhancement of VANET Communication Range using WiMAX and Wi-Fi:
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationAd-hoc Trusted Information Exchange Scheme for Location Privacy in VANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationSecurity of Mobile Ad Hoc and Wireless Sensor Networks
Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute
More informationSybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1
More informationCHAPTER I INTRODUCTION TO VANETS
CHAPTER I INTRODUCTION TO VANETS 1.1 PERVASIVE NETWORK Pervasive Networking is perceived as the ability to communicate and access the same types of services-anytime, anywhere. This is regardless of the
More informationWireless Sensor Networks: Security Issues, Challenges and Solutions
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 859-868 International Research Publications House http://www. irphouse.com Wireless Sensor Networks:
More informationSybil Attack Detection in Mobile Adhoc Network
Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India
More informationThreat Modeling. Bart De Win Secure Application Development Course, Credits to
Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,
More informationClustering Based Certificate Revocation Scheme for Malicious Nodes in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationEfficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationUsing Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET)
International Conference on Recent Advances in Computer Systems (RACS 2015) Using Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET) Irshad Ahmed Sumra,
More informationOVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS
OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS M.Newlin Rajkumar 1, M.Nithya 2,P.HemaLatha 3 1Assistant Professor, Department of Computer Science, Anna University Regional Centre Coimbatore 2P.G
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose
More informationDetection of Sybil Attack in VANETs by Trust Establishment in Clusters
International Journal of Computer Engineering and Applications, Volume VII, Issue I, July 14 www.ijcea.com ISSN 2321-3469 Detection of Sybil Attack in VANETs by Trust Establishment in Clusters Shivani
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationMobile ad hoc networks Various problems and some solutions
Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems
More informationSurvey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements
Survey of Vehicular Ad-hoc Networks (VANETs) With Security Requirements A.Prabhaharan 1 M.Phil Research Scholar, Department of Computer Science NGM College Pollachi, Bharathiar University, Coimbatore,
More informationApplication Distribution Model and Related Security Attacks in VANET
Application Distribution Model and Related Security Attacks in VANET Navid Nikaein, Soumya Kanti Datta, Irshad Marecar, Christian Bonnet EURECOM, Sophia Antipolis, France {navid.nikaein, soumya-kanti.datta,
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationDefine information security Define security as process, not point product.
CSA 223 Network and Web Security Chapter One What is information security. Look at: Define information security Define security as process, not point product. Define information security Information is
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationVarious Issues in Vehicular Ad hoc Networks : A Survey
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb
More informationSecurity in Ad Hoc Networks Attacks
Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection
More informationI-PRE: Improved Proxy Re-Encryption Scheme for VANET
www.ijcsi.org 8 I-PRE: Improved Proxy Re-Encryption Scheme for VANET Arun Malik, Dr. Sanjeev Rana and Dr. Rajneesh Gujral Asian Institute of Management and Technology, Yamunagar, Haryana, India M. M. University,
More informationCOOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More informationSOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications
Enabling and Securing Digital Business in Economy Protect s Serving Business Critical Applications 40 percent of the world s web applications will use an interface Most enterprises today rely on customers
More informationIntroduction to Vehicular Networks
CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/
More informationSECURE ROUTING PROTOCOLS IN AD HOC NETWORKS
SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,
More informationEXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION
EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.
More informationA Survey of BGP Security Review
A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationEnhancing Security on Vehicular Adhoc Networks using EMAP-HMAC
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationResearch Issues on Vehicular Ad hoc Network
Research Issues on Vehicular Ad hoc Network Md. Humayun Kabir Department of Computer Science & Engineering University of Rajshahi, Rajshahi, Bangladesh. Abstract Vehicular Ad Hoc Network (VANET) is a kind
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationSecurity Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET) S.Nithya 1, S.Prema 2, G.Sindhu 3 1 Asst.Professor, Department of ECE, KPR Institute of Engineering & Technology, Tamil Nadu,
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationA Surveying on Road Safety Using Vehicular Communication Networks
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department
More informationIJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT
A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically
More informationCryptography and Network Security
Security Sixth Edition Chapter 1 Introduction Dr. Ahmed Y. Mahmoud Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationNew Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate
New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate Aditi Garg 1, Ankita Agrawal 2, Niharika Chaudhary 3, Shivanshu Gupta 4, Devesh Pandey 5, Tumpa Roy 6 G.L.N.A
More informationWhen the Lights go out. Hacking Cisco EnergyWise. Version: 1.0. Date: 7/1/14. Classification: Ayhan Koca, Matthias Luft
When the Lights go out Hacking Cisco EnergyWise Version: 1.0 Date: 7/1/14 Classification: Author(s): Public Ayhan Koca, Matthias Luft TABLE OF CONTENT 1 HANDLING... 5 1.1 DOCUMENT STATUS AND OWNER... 5
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,
More informationProxy Signature-based RSU Message Broadcasting in VANETs
Proxy Signature-based RSU Message Broadcasting in VANETs Subir Biswas Dept. of Computer Science University of Manitoba Winnipeg MB, Canada R3T 2N2 Email: bigstan@cs.umanitoba.ca Jelena Mišić Dept. of Computer
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationA Review on Security in Vehicular Ad-hoc Networks
A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014
More informationBYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY
BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationOn Reputation and Data-centric Misbehavior Detection Mechanisms for VANET
On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET by Zhen Huang Thesis submitted to the Faculty of Graduate and Postgraduate Studies In partial fulfillment of the requirements For
More informationStudy on Computer Network Technology of Digital Library
International Symposium on Computers & Informatics (ISCI 2015) Study on Computer Network Technology of Digital Library Yanming Sui LinYi University, Linyi, China suiyanming@lyu.edu.cn Abstract With the
More informationSecurity issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.
Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed
More informationUsing TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) Gilles Guette 1 and Ciarán Bryce 2 IRISA Campus de Beaulieu, 35042 Rennes CEDEX, France gilles.guette@univ-rennes1.fr, Ciaran.Bryce@inria.fr Abstract.
More informationEXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS
EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationSecurity Using Digital Signatures & Encryption
Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationProtecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 3 - Data Classification Processes and Models Readings In the News MIS5206 Week 3 Data Classification Processes and Models Test Taking Tip Quiz Readings Vacca Chapter
More informationImplementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
More informationA Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationA Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS
NEC Technical Report NLE-PR-2006-19, NEC Network Laboratories, March 2006, 28 pages. A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1.1 June 2, 2006
More informationAn Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs
An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationUnderstanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol
IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia
More informationD.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3
Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG
More informationBoston University College of Engineering Department of Electrical and Computer Engineering. Secure Cooperative Accident Avoidance for Vehicles
Boston University College of Engineering Department of Electrical and Computer Engineering Secure Cooperative Accident Avoidance for Vehicles MS Project Jimmy C. Chau Advisor: Thomas Little May 7, 2011
More informationSecuring Devices in the Internet of Things
AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationA Review on Black Hole Attack in MANET
A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More information