Accessing risk priority of SSL SYN attack using game theoretic attack defense tree model for VANETs

Vehicular Ad-hoc Networks (VANETs) are prone to several types of attacks due to their decentralized nature and mobility. The involvement of traffic and human beings makes it important to secure VANETs to a maximum extent. There is an urgent need to move one step ahead of just preventing the attacks. We need to have a mechanism that can access and analyze the risk priority of an attacker's way of attacking and defender's way of defending. The attacker may have several ways for achieving his goal of causing damage and every way has a different severity and impact. So, the assessment of all these ways can help the defender to get the insight into the psyche of attacker. This assessment will definitely help the society to get prevention from such unwanted attacks. In this paper, a risk priority assessment model of SSL SYN attack is designed using attack-defense tree model in VANETs. Attack-defense tree model is used to analyze and present the approaches used by attackers to achieve SSL SYN attack. A game theoretic approach is adopted by attacker and defender to maximize their objectives. The rationality of the attack defense model using game theory is investigated using risk priority number on the basis of severity, occurrence and detection ratings. The mathematical assessment shows the impact of this work.

[1]  Gagangeet Singh Aujla,et al.  A Noble Routing Protocol for Vehicular ad hoc Networks (VANETs) with Less Routing Overheads , 2014 .

[2]  Samanpreet Singh A closer look through routing protocols in vehicular ad hoc networks (VANETs) , 2014 .

[3]  Ji Yi,et al.  A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.

[4]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[5]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[6]  Seema Bawa,et al.  A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..

[7]  Jun Luo,et al.  An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Joel J. P. C. Rodrigues,et al.  Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination , 2015, Mob. Networks Appl..

[9]  Haojin Zhu,et al.  A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs , 2011, 2011 IEEE International Conference on Communications (ICC).

[10]  Xiaolong Li,et al.  An attack-and-defence game for security assessment in vehicular ad hoc networks , 2014, Peer Peer Netw. Appl..

[11]  Wei Jiang,et al.  Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[12]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[13]  Seema Bawa,et al.  QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks , 2015, Mob. Networks Appl..

[14]  Jun Li,et al.  A network security assessment model based on attack-defense game theory , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[15]  Indrajit Ray,et al.  Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.

[16]  Ying Hong,et al.  Study on physical layer security with game theory , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[17]  Subhas C. Misra,et al.  An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..

[18]  Michael Wooldridge,et al.  Does Game Theory Work? , 2012, IEEE Intelligent Systems.

[19]  Neeraj Kumar,et al.  Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment , 2015, Digit. Commun. Networks.

[20]  Sahil Garg,et al.  An Attack Tree Based Comprehensive Framework for the Risk and Security Assessment of VANET using the Concepts of Game Theory and Fuzzy Logic , 2014 .

[21]  Sandeep Singh Kang,et al.  Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs , 2013 .

[22]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.