Security Assessment in Vehicular Networks

Security Assessment in Vehicular Networks
Author: Suguo Du,Haojin Zhu
Publsiher: Springer Science & Business Media
Total Pages: 58
Release: 2013-10-29
Genre: Computers
ISBN: 9781461493570

Download Security Assessment in Vehicular Networks Book in PDF, Epub and Kindle

This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

Cloud and IoT Based Vehicular Ad Hoc Networks

Cloud and IoT Based Vehicular Ad Hoc Networks
Author: Gurinder Singh,Vishal Jain,Jyotir Moy Chatterjee,Loveleen Gaur
Publsiher: John Wiley & Sons
Total Pages: 434
Release: 2021-06-05
Genre: Technology & Engineering
ISBN: 9781119761822

Download Cloud and IoT Based Vehicular Ad Hoc Networks Book in PDF, Epub and Kindle

CLOUD AND IOT-BASED VEHICULAR AD HOC NETWORKS This book details the architecture behind smart cars being fitted and connected with vehicular cloud computing, IoT and VANET as part of the intelligent transport system (ITS). As technology continues to weave itself more tightly into everyday life, socioeconomic development has become intricately tied to ever-evolving innovations. An example of this is the technology being developed to address the massive increase in the number of vehicles on the road, which has resulted in more traffic congestion and road accidents. This challenge is being addressed by developing new technologies to optimize traffic management operations. This book describes the state-of-the-art of the recent developments of Internet of Things (IoT) and cloud computing-based concepts that have been introduced to improve Vehicular Ad-Hoc Networks (VANET) with advanced cellular networks such as 5G networks and vehicular cloud concepts. 5G cellular networks provide consistent, faster and more reliable connections within the vehicular mobile nodes. By 2030, 5G networks will deliver the virtual reality content in VANET which will support vehicle navigation with real time communications capabilities, improving road safety and enhanced passenger comfort. In particular, the reader will learn: A range of new concepts in VANETs, integration with cloud computing and IoT, emerging wireless networking and computing models New VANET architecture, technology gap, business opportunities, future applications, worldwide applicability, challenges and drawbacks Details of the significance of 5G Networks in VANET, vehicular cloud computing, edge (fog) computing based on VANET. Audience The book will be widely used by researchers, automotive industry engineers, technology developers, system architects, IT specialists, policymakers and students.

Vehicular Communications for Smart Cars

Vehicular Communications for Smart Cars
Author: Niaz Chowdhury,Lewis Mackenzie
Publsiher: CRC Press
Total Pages: 216
Release: 2021-12-31
Genre: Computers
ISBN: 9781351617451

Download Vehicular Communications for Smart Cars Book in PDF, Epub and Kindle

This book covers a wide range of topics from the smart transportation domain. It discusses protocols, applications and security concerns in various vehicular networks using examples and easy-to-understand figures. The first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. Dr. Niaz Chowdhury is a postdoctoral research associate at the Knowledge Media Institute, the Open University in England. Dr. Lewis M. Mackenzie is a senior lecturer in computing science at the University of Glasgow.

Security in Vehicular Networks

Security in Vehicular Networks
Author: Leila Benarous,Salim Batim,Abdelhamid Mellouk
Publsiher: John Wiley & Sons
Total Pages: 276
Release: 2022-09-14
Genre: Computers
ISBN: 9781394172603

Download Security in Vehicular Networks Book in PDF, Epub and Kindle

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

Vehicular Cyber Physical Systems

Vehicular Cyber Physical Systems
Author: Danda B. Rawat,Chandra Bajracharya
Publsiher: Springer
Total Pages: 75
Release: 2016-09-03
Genre: Technology & Engineering
ISBN: 9783319444949

Download Vehicular Cyber Physical Systems Book in PDF, Epub and Kindle

This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.

Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy
Author: Xiaodong Lin,Rongxing Lu
Publsiher: John Wiley & Sons
Total Pages: 216
Release: 2015-06-05
Genre: Computers
ISBN: 9781119082149

Download Vehicular Ad Hoc Network Security and Privacy Book in PDF, Epub and Kindle

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking

VANET

VANET
Author: Hannes Hartenstein,Kenneth Laberteaux
Publsiher: John Wiley & Sons
Total Pages: 466
Release: 2009-11-04
Genre: Technology & Engineering
ISBN: 0470740620

Download VANET Book in PDF, Epub and Kindle

This book provides an invaluable introduction to inter-vehicular communications, demonstrating the networking and communication technologies for reducing fatalities, improving transportation efficiency, and minimising environmental impact. This book addresses the applications and technical aspects of radio-based vehicle-to-vehicle and vehicle-to-infrastructure communication that can be established by short- and medium range communication based on wireless local area network technology (primarily IEEE 802.11). It contains a coherent treatment of the important topics and technologies contributed by leading experts in the field, covering the potential applications for and their requirements on the communications system. The authors cover physical and medium access control layer issues with focus on IEEE 802.11-based systems, and show how many of the applications benefit when information is efficiently disseminated, and the techniques that provide attractive data aggregation (also includes design of the corresponding middleware). The book also considers issues such as IT-security (means and fundamental trade-off between security and privacy), current standardization activities such as IEEE 802.11p, and the IEEE 1609 standard series. Key Features: Covers the state-of-the-art in the field of vehicular inter-networks such as safety and efficiency applications, physical and medium access control layer issues, middleware, and security Shows how vehicular networks differ from other mobile networks and illustrates the idea of vehicle-to-vehicle communications with application scenarios and with current proofs of concept worldwide Addresses current standardization activities such as IEEE 802.11p and the IEEE 1609 standard series Offers a chapter on mobility models and their use for simulation of vehicular inter-networks Provides a coherent treatment of the important topics and technologies contributed by leading academic and industry experts in the field This book provides a reference for professional automotive technologists (OEMS and suppliers), professionals in the area of Intelligent Transportation Systems, and researchers attracted to the field of wireless vehicular communications. Third and fourth year undergraduate and graduate students will also find this book of interest. For additional information please visit http://www.vanetbook.com

Decision and Game Theory for Security

Decision and Game Theory for Security
Author: Linda Bushnell,Radha Poovendran,Tamer Başar
Publsiher: Springer
Total Pages: 652
Release: 2018-10-22
Genre: Computers
ISBN: 9783030015541

Download Decision and Game Theory for Security Book in PDF, Epub and Kindle

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.