Computational Security for Context-Awareness in Vehicular Ad-Hoc Networks

被引:9
|
作者
Tian, X. Y. [1 ]
Liu, Y. H. [1 ]
Wang, J. [1 ]
Deng, W. W. [2 ]
Oh, H. [3 ]
机构
[1] Jilin Univ, Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, State Key Lab Automot Simulat & Control, Changchun 130012, Peoples R China
[3] Hanyang Univ, Dept Comp Sci & Engn, Ansan 426791, South Korea
来源
IEEE ACCESS | 2016年 / 4卷
关键词
Vehicular ad-hoc networks; security; Markov process; VANET SECURITY; CHALLENGES; MANAGEMENT; TRUST; ART;
D O I
10.1109/ACCESS.2016.2598155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks can be viewed as a typical context-aware system where the experienced context frequently varies as vehicles move along road, e.g., signal-to-noise ratio (SNR), velocity, and traffic flow. In particular, the adopted security protection mechanisms often depend on the node state, location, and/or surrounding risk, which need the capability of context-aware security quantification. This paper views the security level as a user's inherent property that is only correlated with the user's behaviours and the situated context and independent of the suffered attack ways. We propose a formalized methodology to especially quantify the security level in real time from the perspective of state transition probability through estimating the stable probability of staying in the security state in inhomogeneous continuous time Markov chain. This paradigm enables users to customize the security protection mechanisms for adapting to the frequently varying context. We conduct the extensive numerical calculations and empirical analysis to comprehensively investigate the response of the proposed security quantification framework to the various combinations of the concerned parameters, e.g., SNR, velocity, and traffic flow. The results show that the proposed framework is capable of capturing the real-time security level adaptively to the vehicular context and provides a dependable decision basis to security protection, which can restrict the security to a target value.
引用
收藏
页码:5268 / 5279
页数:12
相关论文
共 50 条
  • [31] A survey on distributed approaches for security enhancement in vehicular ad-hoc networks
    Borah, Abinash
    Paranjothi, Anirudh
    Thomas, Johnson P.
    COMPUTER NETWORKS, 2025, 261
  • [32] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95
  • [33] Information Hovering in Vehicular Ad-Hoc Networks
    Xeros, Andreas
    Lestas, Marios
    Andreou, Maria
    Pitsillides, Andreas
    Ioannou, Petros
    2009 IEEE GLOBECOM WORKSHOPS, 2009, : 380 - +
  • [34] Privacy Issues of Vehicular Ad-Hoc Networks
    Dok, Hang
    Fu, Huirong
    Echevarria, Ruben
    Weerasinghe, Hesiri
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (01): : 17 - 32
  • [35] Revocation Management in Vehicular Ad-hoc Networks
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1210 - 1217
  • [36] Targeted Broadcast in Vehicular Ad-Hoc Networks
    Ventura, Roberto
    Bjorndahl, William
    Vejarano, Gustavo
    2023 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS, LATINCOM, 2023,
  • [37] Cybersecurity of Inference in Vehicular Ad-hoc Networks
    Wang, Zisheng
    Blum, Rick S.
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 138 - 143
  • [38] Mobile Advertisement in Vehicular Ad-Hoc Networks
    Dobre, Ciprian
    Tudor, George Cristian
    EUROMEDIA'2011, 2011, : 43 - 49
  • [39] Reliable Broadcast in Vehicular Ad-Hoc Networks
    Zhang, Shu
    Asplund, Mikael
    Cahill, Vinny
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1640 - 1647
  • [40] Key management in vehicular ad-hoc networks
    Langley, Christopher
    Lucas, Raul
    Fu, Huirong
    2008 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2008, : 223 - 226