58 Hits in 3.2 sec

Threats to Security in DSRC/WAVE [chapter]

Christine Laurendeau, Michel Barbeau
2006 Lecture Notes in Computer Science  
To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture.  ...  We also discuss possible countermeasures to the most critical threats.  ...  security threats specific to the DSRC/WAVE architecture.  ... 
doi:10.1007/11814764_22 fatcat:4pynv7ttkbg2rexulc5nu4prli

Outlines of Vehicular Ad-Hoc networks

Ing. Boris Cucor
2021 Transportation Research Procedia  
In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management.  ...  In the past years, autonomous and self-configured Vehicular Ad-Hoc Network (VANET) has become the key research topic due to the increasing demand for road safety and management.  ...  DSRC/ WAVE spectrum allocation In the EU, the DSRC/ WAVE networks use for communication seven channels with 10 MHz bandwidth of each. The channel plan is shown in figure 3 .  ... 
doi:10.1016/j.trpro.2021.07.115 fatcat:hw2ybxrxxzehbbf5yzuc4sl6bq

Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective

Emmanuel Bamidele Ajulo, Raphael Olufemi Akinyede, Olumide Sunday Adewale
2018 Journal of Information  
Article History Keywords Vehicular Ad-Hoc networks (VANETs) Intelligent Transport System (ITS) Road-Side Units (RSUs) OBU DSRC WAVE Node Bandwidth Security and privacy threats Attackers.  ...  The shared wireless medium is accessible to both legitimate and illegitimate users; and this has raise formidable research challenges to providing security for this network.  ...  Section 2 of this paper gives a further overview of VANET; other related works were reviewed in section 3, Section 4 shows the new derived perspective to security and privacy attacks in VANET and section  ... 
doi:10.18488/journal.104.2018.41.1.9 fatcat:r3cwzekemfaujjjdqo2fdcreba

Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges

Tarek Gaber, Yassine El Jazouli, Esraa Eldesouky, Ahmed Ali
2021 Electronics  
Consequently, the presence of secure and reliable communications is crucial in making AHS mines safer, productive, and sustainable.  ...  The current advancement of robotics, especially in Cyber-Physical Systems (CPS), leads to a prominent combination between the mining industry and connected-embedded technologies.  ...  Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/electronics10111357 fatcat:nmdxrrrxj5hhlfpady6q5kx4fi

AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication

Taehyoung Ko, Cheongmin Ji, Manpyo Hong, Azeem Irshad
2021 Security and Communication Networks  
Security Credential Management System (SCMS) has been proposed as one of these elements, but it is vulnerable to denial-of-service (DoS) attacks due to message authentication costs.  ...  However, security factors should be considered during communication.  ...  As shown in Figure 1 , the attacker sends a large number of BSMs to the target vehicle. Vehicles within the attacker's DSRC/WAVE transmission range become the target vehicle.  ... 
doi:10.1155/2021/2890132 fatcat:3bcdc4y2zzeafnpvz5lwgmabr4

Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes

Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma
2020 IET Communications  
The rudimentary step towards an end-to-end secure UAS is not only safeguarding communication paths but also securing the overall environment which makes up the platform.  ...  Malicious code could exploit the zero-day vulnerability to bypass security controls and hit the aerial vehicle.  ...  the middle, unauthorised access, rogue access point, DoD, DDoS, replay, session hijacking OFDM, SOFDMA, QPSK, BPSK, 16-QAM IEEE 1609 1 Km 1609.2, 1609.3, 1609.4, 1609.12 DSRC, WAVE, VANET signed  ... 
doi:10.1049/iet-com.2020.0073 fatcat:guulooew3baf7ptqv6xwimd7ta

A Survey on Vanet Technologies

Tanuja K, Sushma T M, Bharathi M, Arun K H
2015 International Journal of Computer Applications  
physical security, limited bandwidth, energy and power constraints [1].  ...  The nodes included in a MANET ought to coordinate with one another and convey among themselves .  ...  to physical security threats.  ... 
doi:10.5120/21637-4965 fatcat:zm4mjnts2jfrxbv7zgaqp56dyy

Preliminary Results for Secure Traffic Regulation

Assia Belbachir, Sorore Benabid, Marcia Pasin, Amal El Fallah Seghrouchni
2018 Proceedings of the 15th International Conference on Informatics in Control, Automation and Robotics  
Thus, an important issue is to ensure a robust and secure communication between the different components able to resist to hypothetic hacker's attacks.  ...  In this paper, we propose a solution for traffic regulation in Intelligent Transportation Systems (ITS).  ...  WAVE and DSRC standards are defined in IEEE 1609.1-4 and 802.11p respectively. The U.S.  ... 
doi:10.5220/0006904504290434 dblp:conf/icinco/BelbachirBPF18 fatcat:2vryolp675bado4aewjyrnq6zu

Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks

Zeen Kim, Junhyun Yim, Jangseong Kim, Kwangjo Kim, Taeshik Sohn
2011 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops  
In this paper, we proposed a novel anonymous authentication scheme in VANETs. Our scheme provides message authentication, anonymity, unlinkability, and traceability of an end-user simultaneously.  ...  Compared with the existing work, we claim that our scheme has better performance in terms of storage, computation, and communication overhead.  ...  DSRC/WAVE systems fill a niche in the wireless infrastructure by facilitating low latency, geographically local, high data rate, and high mobility communications. X.  ... 
doi:10.1109/ispaw.2011.67 fatcat:g2ukbmn5znfsvorzltuoug5wae

Sustainable Adoption of Connected Vehicles in the Brazilian Landscape: Policies, Technical Specifications and Challenges

Douglas Aguiar Do Nascimento, Yuzo Iano, Hermes José Loschi, Navid Razmjooy, Robert Sroufe, Vlademir De Jesus Silva Oliveira, Diego Arturo Pajuelo Castro, Matheus Montagner
2019 Transactions on Environment and Electrical Engineering  
This review addresses the intervehicular communication in Connected Vehicles (CV) by emphasizing V2V (vehicle-to-vehicle) and V2I (vehicle-to-infrastructure) communications in terms of evolution, current  ...  This review is based on studies conducted from 2009 to 2019, government reports about the sustainable deployment of these technologies and their adoption in the Brazilian automotive market.  ...  Therefore, a DSRC/WAVE offers [8] , [54] , [56] , [57] : 1.  ... 
doi:10.22149/teee.v3i1.130 fatcat:fsiz7ljy3rcz3jtwlwxuma5stq

A Comprehensive Survey on VANET Security Services in Traffic Management System

Muhammad Sameer Sheikh, Jun Liang
2019 Wireless Communications and Mobile Computing  
Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs.  ...  Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs.  ...  Figure 2 :Figure 3 : 23 Channel diagram of DSRC. WAVE layout [39] . Figure 4 : 4 VANET security services. Figure 5 : 5 Categories of authentication in VANETs.  ... 
doi:10.1155/2019/2423915 fatcat:4dool3bba5ea7h6muysjtzpxfq

Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks

Christine Laurendeau, Michel Barbeau
2009 EURASIP Journal on Wireless Communications and Networking  
In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting  ...  power utilized to carry out an exploit.  ...  An IEEE standard has been proposed for securing vehicular communications in the Dedicated Short Range Communications Wireless Access in Vehicular Environments (DSRC/WAVE) [12] .  ... 
doi:10.1155/2009/128679 fatcat:jvyxmh5knjf67bwdkwbhyxyidq

Conceptual Model for Connected Vehicles Safety and Security using Big Data Analytics

Noor Afiza Mat Razali, Nuraini Shamsaimon, Muslihah Wook, Khairul Khalil
2020 International Journal of Advanced Computer Science and Applications  
To address this gap, this research aims to determine the basic components of safety and security for CVs implementation and propose a conceptual model for safety and security in CVs by applying the machine  ...  The proposed model is highly correlated to safety and security and could be applied in congestion and collision prediction.  ...  ACKNOWLEDGMENT The authors would like to thank all experts especially Associate Prof Dr. Suzaimah Ramli and Prof Ir. Dr.  ... 
doi:10.14569/ijacsa.2020.0111136 fatcat:mbkdp23rm5h77c43f2khoae37q

A Survey on the Current Security Landscape of Intelligent Transportation Systems

Ayyoub Lamssaggad, Nabil Benamar, Abdelhakim Senhaji Hafid, Mounira Msahli
2021 IEEE Access  
Finally, this survey presents key challenges in the field, and discusses recent trends that must be factored in by researchers, implementers, and car manufactures to improve the security of ITS.  ...  However, this raises new security issues that make the whole system prone to cybersecurity attacks that threaten both the safety and privacy of all road-users.  ...  ACKNOWLEDGMENT The authors would like to thank the editors and the anonymous reviewers for their valuable and enriching comments and suggestions to improve the content of this article.  ... 
doi:10.1109/access.2021.3050038 fatcat:wagonasxpbetxdlrhxzadnpkw4

An Effective Data Sharing Scheme Based on Blockchain in Vehicular Social Networks

Yanji Jiang, Xueli Shen, Sifa Zheng
2021 Electronics  
Adversaries are able to violate the privacy of the vehicle based on the collected data, thereby threatening the security of the entire network.  ...  In VSNs, vehicles can upload the necessary data in the cloud service provider (CSP) and other vehicles can query the data they are interested in through CSP, which enables VSNs to provide more user-friendly  ...  In the United States, the standards of V2V and V2I (DSRC/WAVE) are formulated by the Institute of electrical and electronics engineers.  ... 
doi:10.3390/electronics10020114 fatcat:sp5boe2vjrc2zb6mnvtrkzu6ga
« Previous Showing results 1 — 15 out of 58 results