Analysis of cyber risk and associated concentration of research (ACR)2 in the security of vehicular edge clouds

Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS. Security has been identified as one of the greatest challenges for the ITS, and security measures require consideration from design to implementation. This work focuses on providing an analysis of cyber risk and associated concentration of research (ACR2). The introduction of ACR2 approach can be used to consider research challenges in VEC and open up further investigation into those threats that are important but under-researched. That is, the approach can identify very high or high risk areas that have a low research concentration. In this way, this research can lay the foundations for the development of further work in securing the future of ITS.

[1]  Ankur Pandey,et al.  A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Challenges, and Impacts , 2014 .

[2]  Yuan Xiao,et al.  One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation , 2016, USENIX Security Symposium.

[3]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[4]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[5]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[6]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[7]  Jeannette M. Wing,et al.  An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.

[8]  Elyes Ben Hamida,et al.  Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .

[9]  Alex Wright,et al.  Hacking cars , 2011, Commun. ACM.

[10]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[11]  Rongxing Lu,et al.  From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.

[12]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[13]  Tao Zhang,et al.  Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.

[14]  Neeraj Varshney,et al.  Security protocol for VANET by using digital certification to provide security with low bandwidth , 2014, 2014 International Conference on Communication and Signal Processing.

[15]  S. Sharma,et al.  Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[16]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[17]  M. Maheshwari,et al.  Prevention of Sybil attack and priority batch verification in VANETs , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[18]  R. H. Jhaveri,et al.  A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[19]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.

[20]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[21]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[22]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[23]  Panagiotis Papadimitratos,et al.  GNSS-based Positioning: Attacks and countermeasures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[24]  Rong Yu,et al.  Toward cloud-based vehicular networks with efficient resource management , 2013, IEEE Network.

[25]  Peter Stenumgaard,et al.  Jamming and interference vulnerability of IEEE 802.11p , 2014, 2014 International Symposium on Electromagnetic Compatibility.

[26]  Ozan K. Tonguz,et al.  Broadcast storm mitigation techniques in vehicular ad hoc networks , 2007, IEEE Wireless Communications.

[27]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[28]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[29]  Owen Eriksson Intelligent Transport Systems and Services (ITS) , 2002 .

[30]  Heekuck Oh,et al.  On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications , 2014, Wirel. Pers. Commun..

[31]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[32]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[33]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[34]  Meng Chang Chen,et al.  An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics , 2014, Expert Syst. Appl..

[35]  Charlie McCarthy,et al.  Characterization of Potential Security Threats in Modern Automobiles: A Composite Modeling Approach , 2014 .

[36]  Khattab M. Ali Alheeti,et al.  Using discriminant analysis to detect intrusions in external communication for self-driving vehicles , 2017, Digit. Commun. Networks.

[37]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[38]  Tomas Olovsson,et al.  Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[39]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[40]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[41]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.

[42]  Bo Sheng,et al.  A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.

[43]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[44]  Halabi Hasbullah,et al.  Timing attack in vehicular network , 2011 .

[45]  Jonathan Loo,et al.  Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.

[46]  Deepak Dembla,et al.  Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[47]  Marko Wolf Security Engineering For Vehicular It Systems , 2009 .

[48]  Naim Asaj,et al.  Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[49]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[50]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[51]  Mario Gerla,et al.  INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[52]  Y. Roudier,et al.  Security and privacy for in-vehicle networks , 2012, 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC).

[53]  Kiran Bhandari,et al.  Prevention of black hole attack on AODV in MANET using hash function , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.

[54]  Ali Dorri,et al.  An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.

[55]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[56]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[57]  Al-Sakib Khan Pathan,et al.  Securing Cyber-Physical Systems , 2015 .

[58]  Abdelhamid Mellouk,et al.  ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[59]  Ludovic Apvrille,et al.  Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[60]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[61]  Jalel Ben-Othman,et al.  Detection of Radio Interference Attacks in VANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[62]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[63]  Mohammad S. Obaidat,et al.  Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[64]  Jianbin Hu,et al.  Resisting relay attacks on vehicular Passive Keyless Entry and start systems , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[65]  S. RoselinMary,et al.  Early detection of DOS attacks in VANET using Attacked Packet Detection Algorithm (APDA) , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[66]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[67]  J. S. Warner,et al.  GPS Spoofing Countermeasures , 2003 .

[68]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[69]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[70]  H. Hasbullah,et al.  An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[71]  Erik M. Fredericks,et al.  Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[72]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[73]  Gaurav Sharma,et al.  A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .

[74]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[75]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[76]  Huy Kang Kim,et al.  Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).

[77]  Madjid Merabti,et al.  Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.

[78]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[79]  Samia Chelloug,et al.  A New Black Hole Detection Scheme for Vanets , 2014, MEDES.

[80]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[81]  Harish Sharma,et al.  A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA) , 2015, International Conference on Computing, Communication & Automation.

[82]  Yong Wang,et al.  Mobile malware security challeges and cloud-based detection , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).

[83]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[84]  Jyoti Rani,et al.  Improving AOMDV protocol for black hole detection in Mobile Ad hoc Network , 2013, 2013 International Conference on Control, Computing, Communication and Materials (ICCCCM).

[85]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[86]  Sanjoy Das,et al.  Security and attack analysis for vehicular ad hoc network — A survey , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[87]  Nai-Wei Lo,et al.  Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.

[88]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[89]  Iftikhar Ahmad,et al.  Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).

[90]  Grace Xingxin Gao,et al.  GPS Signal Authentication From Cooperative Peers , 2015, IEEE Transactions on Intelligent Transportation Systems.

[91]  Jaydip Sen,et al.  A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[92]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[93]  Chong Han,et al.  Cooperative automation through the cloud: The CARMA project , 2017 .

[94]  Noureddine Boudriga,et al.  A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[95]  Junhai Luo,et al.  Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[96]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[97]  Liam Murphy,et al.  An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[98]  Mohammad S. Obaidat,et al.  Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.

[99]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[100]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[101]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[102]  Kamlesh C. Purohit,et al.  An Analytical Study of Routing Attacks in Vehicular Ad-hoc Networks (VANETs) , 2014 .

[103]  Xuemin Shen,et al.  BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.

[104]  Yu Cheng,et al.  A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[105]  Frank Kargl,et al.  PREparing SEcuRe VEhicle-to-X Communication Systems , 2011 .

[106]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[107]  Kazuomi Oishi,et al.  A Method of Preventing Unauthorized Data Transmission in Controller Area Network , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).

[108]  Vijay Laxmi,et al.  Sybil attack detection in VANET using neighbouring vehicles , 2014, Int. J. Secur. Networks.

[109]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[110]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[111]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.