Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense
暂无分享,去创建一个
Xinyu Yang | Wei Yu | Jie Lin | Linqiang Ge | Nan Zhang | Wei Yu | Xinyu Yang | Linqiang Ge | Jie Lin | N. Zhang
[1] Yong Guan,et al. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[2] Ana R. Cavalli,et al. A distributed intrusion detection scheme for wireless ad hoc networks , 2012, SAC '12.
[3] Liviu Iftode,et al. Probabilistic validation of aggregated data in vehicular ad-hoc networks , 2006, VANET '06.
[4] Tao Lin,et al. Route Planning based on Floyd Algorithm for Intelligence Transportation System , 2007, 2007 IEEE International Conference on Integration Technology.
[5] Xinyu Yang,et al. A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems , 2017, IEEE Transactions on Vehicular Technology.
[6] Nada Golmie,et al. An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.
[7] Mate Boban,et al. Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation , 2013, IEEE Transactions on Vehicular Technology.
[8] Huang Hu,et al. Research the Optimal Fuel Economy of 12m City Bus Based on MATLAB , 2011, 2011 Third International Conference on Measuring Technology and Mechatronics Automation.
[9] Chunming Qiao,et al. Toward Effective Service Scheduling for Human Drivers in Vehicular Cyber-Physical Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[11] Rui Li,et al. Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.
[12] Gu Qing,et al. A Supervisory Control Strategy for Plug-In Hybrid Electric Vehicles Based on Energy Demand Prediction and Route Preview , 2015, IEEE Transactions on Vehicular Technology.
[13] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[14] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[15] Xinyu Yang,et al. A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[16] Xinyu Yang,et al. A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[17] Hyuk Lim,et al. Prefetching-Based Data Dissemination in Vehicular Cloud Systems , 2016, IEEE Transactions on Vehicular Technology.
[18] Kanisius Karyono,et al. Computational load analysis of Dijkstra, A*, and Floyd-Warshall algorithms in mesh network , 2013, 2013 International Conference on Robotics, Biomimetics, Intelligent Computational Systems.
[19] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Jianzhong Li,et al. Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks , 2009, IEEE INFOCOM 2009.
[21] Xinyu Yang,et al. Defending against Energy Dispatching Data integrity attacks in smart grid , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[22] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[23] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[24] Zhong Chen,et al. Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.
[25] Xuemin Shen,et al. Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System , 2015, IEEE Transactions on Vehicular Technology.
[26] Xinyu Yang,et al. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[27] Seung-Woo Seo,et al. Fast and Secure Group Key Dissemination Scheme for Out-of-Range V2I Communication , 2015, IEEE Transactions on Vehicular Technology.
[28] Rui Zhang,et al. Traffic Routing Guidance Algorithm Based on Backpressure with a Trade-Off between User Satisfaction and Traffic Load , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[29] Erik G. Ström,et al. Radio Resource Management for D2D-Based V2V Communication , 2016, IEEE Transactions on Vehicular Technology.
[30] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[31] Deepak Dembla,et al. Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[32] Hai Le Vu,et al. Real time route guidance with correlated link cost , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[33] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[34] Azzedine Boukerche,et al. Localized Routing Approach to Bypass Holes in Wireless Sensor Networks , 2014, IEEE Transactions on Computers.
[35] Timothy W. Finin,et al. Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[36] Cristian Borcea,et al. VANET Routing on City Roads Using Real-Time Vehicular Traffic Information , 2009, IEEE Transactions on Vehicular Technology.
[37] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[38] Zhenhai Duan,et al. False data injection on EKF-based navigation control , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).
[39] Yanheng Liu,et al. Modelling and simulating worm propagation in static and dynamic traffic , 2014 .
[40] Emil Angelov. Google Self-driving car , 2016 .
[41] Kira Kastell. Security requirements in communication networks for transportation systems , 2014, 2014 16th International Conference on Transparent Optical Networks (ICTON).
[42] Timothy W. Finin,et al. A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[43] Claude Oestges,et al. Vehicle-to-Vehicle Radio Channel Characterization in Crossroad Scenarios , 2016, IEEE Transactions on Vehicular Technology.
[44] Karine Zeitouni,et al. Proactive Vehicular Traffic Rerouting for Lower Travel Time , 2013, IEEE Transactions on Vehicular Technology.
[45] Cheng Chen,et al. Dynamic route guidance using maximum flow theory and its MapReduce implementation , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[46] Tapabrata Ray,et al. Analytical Hierarchy Process Using Fuzzy Inference Technique for Real-Time Route Guidance System , 2014, IEEE Transactions on Intelligent Transportation Systems.
[47] Xinwen Fu,et al. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.
[48] Mohamed Ayoub Messous,et al. How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[49] Ting Yuan,et al. KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[50] Yuguang Fang. Connected Vehicles Make Transportation Faster, Safer, Smarter, and Greener! , 2015, IEEE Transactions on Vehicular Technology.
[51] Xiang Cheng,et al. Interference Graph-Based Resource-Sharing Schemes for Vehicular Networks , 2013, IEEE Transactions on Vehicular Technology.
[52] C.-F. Wang,et al. Real-time vehicle route guidance using vehicle-to-vehicle communication , 2010, IET Commun..
[53] Xinyu Yang,et al. On false data injection attack against Multistep Electricity Price in electricity market in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[54] Weisong Shi,et al. $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.
[55] Fei Xie,et al. Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.