Computational Security for Context-Awareness in Vehicular Ad-Hoc Networks

被引:9
|
作者
Tian, X. Y. [1 ]
Liu, Y. H. [1 ]
Wang, J. [1 ]
Deng, W. W. [2 ]
Oh, H. [3 ]
机构
[1] Jilin Univ, Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, State Key Lab Automot Simulat & Control, Changchun 130012, Peoples R China
[3] Hanyang Univ, Dept Comp Sci & Engn, Ansan 426791, South Korea
来源
IEEE ACCESS | 2016年 / 4卷
关键词
Vehicular ad-hoc networks; security; Markov process; VANET SECURITY; CHALLENGES; MANAGEMENT; TRUST; ART;
D O I
10.1109/ACCESS.2016.2598155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks can be viewed as a typical context-aware system where the experienced context frequently varies as vehicles move along road, e.g., signal-to-noise ratio (SNR), velocity, and traffic flow. In particular, the adopted security protection mechanisms often depend on the node state, location, and/or surrounding risk, which need the capability of context-aware security quantification. This paper views the security level as a user's inherent property that is only correlated with the user's behaviours and the situated context and independent of the suffered attack ways. We propose a formalized methodology to especially quantify the security level in real time from the perspective of state transition probability through estimating the stable probability of staying in the security state in inhomogeneous continuous time Markov chain. This paradigm enables users to customize the security protection mechanisms for adapting to the frequently varying context. We conduct the extensive numerical calculations and empirical analysis to comprehensively investigate the response of the proposed security quantification framework to the various combinations of the concerned parameters, e.g., SNR, velocity, and traffic flow. The results show that the proposed framework is capable of capturing the real-time security level adaptively to the vehicular context and provides a dependable decision basis to security protection, which can restrict the security to a target value.
引用
收藏
页码:5268 / 5279
页数:12
相关论文
共 50 条
  • [21] SECURING VEHICULAR AD-HOC NETWORKS
    Caballero-Gil, P.
    Hernandez-Goya, C.
    Fuster-Sabater, A.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (01): : 25 - 35
  • [22] Context awareness in ad-hoc communication
    Ganesan, P
    Karmouch, A
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 919 - 922
  • [23] An Advanced Security and Data Integrity Protocol for Vehicular Ad-Hoc Networks
    Farooq, Mohd Umar
    Pasha, Mohammad
    Khan, Khaleel Ur Rahman
    Atif, Mahboob ul Haq
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 994 - +
  • [24] Ad-hoc networks security
    Raju, G. V. S.
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 209 - 212
  • [25] Improving Security and Efficiency for Vehicular Ad-Hoc Networks using MVQQ
    Venkateswarlu, A.
    Rao, A. Narayana
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 820 - 824
  • [26] Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks
    Caballero-Gil, Pino
    Molina-Gil, Jezabel
    Caballero-Gil, Candido
    Hernandez-Goya, Candelaria
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 427 - 427
  • [27] Identity-Based Security systems for Vehicular Ad-Hoc Networks
    Baldini, Gianmarco
    Mahieu, Vincent
    Fovino, Igor Nai
    Trombetta, Alberto
    Taddeo, Marco
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 672 - 678
  • [28] Security Measures in the Vehicular Ad-Hoc Networks in the Aspect of DoS Attack
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, 2021, 1194 : 222 - 232
  • [29] Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
    Houmer, Meriem
    Hasnaoui, Moulay Lahcen
    Elfergougui, Abdeslam
    2018 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE AND WIRELESS NETWORKING (MOWNET), 2018, : 21 - 26
  • [30] Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks
    Li, Wei
    Ge, Chenyu
    Gu, Dawu
    Liao, Linfeng
    Gao, Zhiyong
    Shi, Xiujin
    Lu, Ting
    Liu, Ya
    Liu, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3421 - 3437