Analysis of cyber risk and associated concentration of research (ACR)2 in the security of vehicular edge clouds
暂无分享,去创建一个
Tim Watson | Mehrdad Dianati | Carsten Maple | Hussam A. Alhagagi | Yi Lu | T. Sheik | Alex Mouzakitis | C. Maple | T. Watson | M. Dianati | A. Mouzakitis | H. Alhagagi | Yi Lu | T. Sheik
[1] Ankur Pandey,et al. A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Challenges, and Impacts , 2014 .
[2] Yuan Xiao,et al. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation , 2016, USENIX Security Symposium.
[3] Irshad Ullah,et al. Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .
[4] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[5] Todd E. Humphreys,et al. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..
[6] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[7] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[8] Elyes Ben Hamida,et al. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .
[9] Alex Wright,et al. Hacking cars , 2011, Commun. ACM.
[10] Peng Ning,et al. P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[11] Rongxing Lu,et al. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.
[12] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[13] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[14] Neeraj Varshney,et al. Security protocol for VANET by using digital certification to provide security with low bandwidth , 2014, 2014 International Conference on Communication and Signal Processing.
[15] S. Sharma,et al. Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[16] Sherali Zeadally,et al. Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..
[17] M. Maheshwari,et al. Prevention of Sybil attack and priority batch verification in VANETs , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[18] R. H. Jhaveri,et al. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[19] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[20] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[21] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[22] Lars C. Wolf,et al. Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[23] Panagiotis Papadimitratos,et al. GNSS-based Positioning: Attacks and countermeasures , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[24] Rong Yu,et al. Toward cloud-based vehicular networks with efficient resource management , 2013, IEEE Network.
[25] Peter Stenumgaard,et al. Jamming and interference vulnerability of IEEE 802.11p , 2014, 2014 International Symposium on Electromagnetic Compatibility.
[26] Ozan K. Tonguz,et al. Broadcast storm mitigation techniques in vehicular ad hoc networks , 2007, IEEE Wireless Communications.
[27] Josep Domingo-Ferrer,et al. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.
[28] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[29] Owen Eriksson. Intelligent Transport Systems and Services (ITS) , 2002 .
[30] Heekuck Oh,et al. On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications , 2014, Wirel. Pers. Commun..
[31] Gérard Lachapelle,et al. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .
[32] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.
[33] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[34] Meng Chang Chen,et al. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics , 2014, Expert Syst. Appl..
[35] Charlie McCarthy,et al. Characterization of Potential Security Threats in Modern Automobiles: A Composite Modeling Approach , 2014 .
[36] Khattab M. Ali Alheeti,et al. Using discriminant analysis to detect intrusions in external communication for self-driving vehicles , 2017, Digit. Commun. Networks.
[37] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[38] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[39] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[40] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[41] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.
[42] Bo Sheng,et al. A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.
[43] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[44] Halabi Hasbullah,et al. Timing attack in vehicular network , 2011 .
[45] Jonathan Loo,et al. Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.
[46] Deepak Dembla,et al. Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[47] Marko Wolf. Security Engineering For Vehicular It Systems , 2009 .
[48] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[49] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[50] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[51] Mario Gerla,et al. INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[52] Y. Roudier,et al. Security and privacy for in-vehicle networks , 2012, 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC).
[53] Kiran Bhandari,et al. Prevention of black hole attack on AODV in MANET using hash function , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.
[54] Ali Dorri,et al. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.
[55] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[56] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[57] Al-Sakib Khan Pathan,et al. Securing Cyber-Physical Systems , 2015 .
[58] Abdelhamid Mellouk,et al. ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[59] Ludovic Apvrille,et al. Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
[60] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[61] Jalel Ben-Othman,et al. Detection of Radio Interference Attacks in VANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[62] Satyajayant Misra,et al. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[63] Mohammad S. Obaidat,et al. Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[64] Jianbin Hu,et al. Resisting relay attacks on vehicular Passive Keyless Entry and start systems , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[65] S. RoselinMary,et al. Early detection of DOS attacks in VANET using Attacked Packet Detection Algorithm (APDA) , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[66] G. H. Raisoni,et al. Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .
[67] J. S. Warner,et al. GPS Spoofing Countermeasures , 2003 .
[68] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[69] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[70] H. Hasbullah,et al. An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[71] Erik M. Fredericks,et al. Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[72] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[73] Gaurav Sharma,et al. A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .
[74] Pin-Han Ho,et al. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[75] Carsten Maple,et al. Security and privacy in the internet of things , 2017 .
[76] Huy Kang Kim,et al. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).
[77] Madjid Merabti,et al. Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.
[78] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[79] Samia Chelloug,et al. A New Black Hole Detection Scheme for Vanets , 2014, MEDES.
[80] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[81] Harish Sharma,et al. A novel mechanism of detection of denial of service attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA) , 2015, International Conference on Computing, Communication & Automation.
[82] Yong Wang,et al. Mobile malware security challeges and cloud-based detection , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).
[83] Gongjun Yan,et al. Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.
[84] Jyoti Rani,et al. Improving AOMDV protocol for black hole detection in Mobile Ad hoc Network , 2013, 2013 International Conference on Control, Computing, Communication and Materials (ICCCCM).
[85] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[86] Sanjoy Das,et al. Security and attack analysis for vehicular ad hoc network — A survey , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[87] Nai-Wei Lo,et al. Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.
[88] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[89] Iftikhar Ahmad,et al. Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).
[90] Grace Xingxin Gao,et al. GPS Signal Authentication From Cooperative Peers , 2015, IEEE Transactions on Intelligent Transportation Systems.
[91] Jaydip Sen,et al. A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.
[92] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[93] Chong Han,et al. Cooperative automation through the cloud: The CARMA project , 2017 .
[94] Noureddine Boudriga,et al. A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[95] Junhai Luo,et al. Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[96] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[97] Liam Murphy,et al. An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[98] Mohammad S. Obaidat,et al. Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.
[99] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[100] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[101] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[102] Kamlesh C. Purohit,et al. An Analytical Study of Routing Attacks in Vehicular Ad-hoc Networks (VANETs) , 2014 .
[103] Xuemin Shen,et al. BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.
[104] Yu Cheng,et al. A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[105] Frank Kargl,et al. PREparing SEcuRe VEhicle-to-X Communication Systems , 2011 .
[106] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[107] Kazuomi Oishi,et al. A Method of Preventing Unauthorized Data Transmission in Controller Area Network , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[108] Vijay Laxmi,et al. Sybil attack detection in VANET using neighbouring vehicles , 2014, Int. J. Secur. Networks.
[109] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[110] Azim Eskandarian,et al. Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.
[111] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.