Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A systematic approach for attack analysis and mitigation in V2V networks
Date
2016-03-01
Author
Bhargava, Bharat
Johnson, Amber
Munyengabe, Gisele
Angın, Pelin
Metadata
Show full item record
Item Usage Stats
180
views
0
downloads
Cite This
The increasing popularity of V2V networks with the rise of driverless cars in the recent years have made them vulnerable to attacks in growing complexity. Accurate assessment of the safety and security needs of V2V networks based on context and the costs associated with attack mitigation mechanisms are significant for successful operation of these networks despite adversaries trying to disrupt their functions. In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down of attacks into common feature sets. We also provide cost analyses of major classes of V2V attacks using the proposed model. The proposed analysis approach is promising to provide guidance for research in optimization models for tradeoffs between security, safety and performance requirements in V2V.
Subject Keywords
V2V networks
,
Safety
,
Security
,
Attack mitigation
,
Attack mitigation
URI
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84962440460&origin=inward
https://hdl.handle.net/11511/83854
Journal
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
DOI
https://doi.org/10.22667/JOWUA.2016.03.31.079
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
Adaptable Safety and Security in V2X Systems
VİLLARREAL VASQUEZ, Miguel; BHARGAVA, Bharat; Angın, Pelin (2017-06-30)
With the advances in the areas of mobile computing and wireless communications, V2X systems have become a promising technology enabling deployment of applications providing road safety, traffic efficiency and infotainment. Due to their increasing popularity, V2X networks have become a major target for attackers, making them vulnerable to security threats and network conditions, and thus affecting the safety of passengers, vehicles and roads. Existing research in V2X does not effectively address the safety, ...
Investigation into suitability of current ATDs to represent ageing drivers
Acar, B. Serpil; Feng, J.; Esat, V. (2013-02-01)
Ageing car occupants are expected to become a larger part of the driver and passenger population in developed countries in the future. Currently, Anthropomorphic Test Devices (ATDs) are essential tools to assess safety of automobiles; however, they do not fully embody the features of all occupant groups in the world population. This study investigates the features of ageing drivers. The data are collected and analysed with respect to age and gender. Information particularly on driverautomobile interaction i...
An Effective Forest Fire Detection Framework Using Heterogeneous Wireless Multimedia Sensor Networks
Kizilkaya, Burak; Ever, Enver; Yatbaz, Hakan Yekta; Yazıcı, Adnan (2022-05-01)
With improvements in the area of Internet of Things (IoT), surveillance systems have recently become more accessible. At the same time, optimizing the energy requirements of smart sensors, especially for data transmission, has always been very important and the energy efficiency of IoT systems has been the subject of numerous studies. For environmental monitoring scenarios, it is possible to extract more accurate information using smart multimedia sensors. However, multimedia data transmission is an expensi...
Realistic Simulation of IEEE 802.11p Channel in Mobile Vehicle to Vehicle Communication
Islam, Tarikul; Hu, Yongchang; Onur, Ertan; Boltjes, Bert; De Jongh, J. F. C. M. (2013-04-18)
Intelligent Transportation Systems (ITS) is becoming an important paradigm, because of its ability to enhance safety and to mitigate congestion on road traffic scenarios. Realizing the fact that data collection scheme from in-situ test beds for large number of vehicles is always expensive and time consuming, before being employed in large scale, such safety critical system should be tested narrowing down the gap between real circumstances and analytical models in a simulation platform. It is evident that un...
A Macrolevel tabu-search based approach to determine the major factors in built environment-traffic safety relationship
Alişan, Onur; Babalık, Ela; Department of City and Regional Planning (2021-3-05)
Traffic crashes are a significant contributing factor to fatalities globally, with an increasing pace of crashes occurring in urban areas. Thus, this study aims to analyze the relationship between urban built environment and traffic safety (BE-TS) to reveal the factors that threaten TS so that they could be avoided in early planning phases. BE was operationalized through the D-classification (e.g., density and diversity) whereas, TS was operationalized through varying crash categories (e.g., severity) and r...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
B. Bhargava, A. Johnson, G. Munyengabe, and P. Angın, “A systematic approach for attack analysis and mitigation in V2V networks,”
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, pp. 79–96, 2016, Accessed: 00, 2021. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84962440460&origin=inward.