메뉴 건너뛰기




Volumn , Issue , 2016, Pages 1-6

Ghost: Concealing vehicular botnet communication in the VANET control channel

Author keywords

Autonomous Cars; VANET Security; Vehicular Ad hoc Networks; Vehicular Botnet Communication; Vehicular Botnets

Indexed keywords

AD HOC NETWORKS; MALWARE; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84994155250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2016.7577024     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 1
    • 84994185772 scopus 로고    scopus 로고
    • The evita project
    • The evita project. http://www.evita-project.org, 2008.
    • (2008)
  • 2
    • 84873949571 scopus 로고    scopus 로고
    • Assessment of node trustworthiness in vanets using data plausibility checks with particle filters
    • N. Bismeyer, S. Mauthofer, K. M. Bayarou, and F. Kargl. Assessment of node trustworthiness in vanets using data plausibility checks with particle filters. In IEEE VNC, 2012.
    • (2012) IEEE VNC
    • Bismeyer, N.1    Mauthofer, S.2    Bayarou, K.M.3    Kargl, F.4
  • 3
    • 79951781925 scopus 로고    scopus 로고
    • Intrusion detection in vanets through verification of vehicle movement data
    • N. Bismeyer, C. Stresing, and K. Bayarou. Intrusion detection in vanets through verification of vehicle movement data. In IEEE VNC, 2010.
    • (2010) IEEE VNC
    • Bismeyer, N.1    Stresing, C.2    Bayarou, K.3
  • 4
    • 84890104386 scopus 로고    scopus 로고
    • Vars: A vehicle ad-hoc network reputation system
    • F. Dotzer, L. Fischer, and P. Magiera. Vars: A vehicle ad-hoc network reputation system. In IEEE WoWMoM, 2005.
    • (2005) IEEE WoWMoM
    • Dotzer, F.1    Fischer, L.2    Magiera, P.3
  • 7
    • 0141832923 scopus 로고    scopus 로고
    • A new traffic safety vision for the United States
    • L. Evans. A new traffic safety vision for the united states. American Journal of Public Health, 93(9):1384-1386, 2003.
    • (2003) American Journal of Public Health , vol.93 , Issue.9 , pp. 1384-1386
    • Evans, L.1
  • 8
    • 84964647233 scopus 로고    scopus 로고
    • Congestion attacks to autonomous cars using vehicular botnets
    • M. T. Garip, M. E. Gursoy, P. Reiher, and M. Gerla. Congestion attacks to autonomous cars using vehicular botnets. In NDSS, 2015.
    • (2015) NDSS
    • Garip, M.T.1    Gursoy, M.E.2    Reiher, P.3    Gerla, M.4
  • 9
    • 78649265918 scopus 로고    scopus 로고
    • Detecting and correcting malicious data in vanets
    • P. Golle, D. Greene, and J. Staddon. Detecting and correcting malicious data in vanets. In ACM VANET, 2004.
    • (2004) ACM VANET
    • Golle, P.1    Greene, D.2    Staddon, J.3
  • 11
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • J. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy, 2(3):49-55, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.1    Capkun, S.2    Luo, J.3
  • 12
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
    • I. Roufa et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In 19th USENIX Security Symposium, 2010.
    • (2010) 19th USENIX Security Symposium
    • Roufa, I.1
  • 13
    • 84994173788 scopus 로고    scopus 로고
    • Vanet alert endorsement using multi-source filters
    • T. H. J. Kim, A. Studer, R. Dubey, and X. Zhang et al. Vanet alert endorsement using multi-source filters. In ACM VANET, 2010.
    • (2010) ACM VANET
    • Kim, T.H.J.1    Studer, A.2    Dubey, R.3    Zhang, X.4
  • 15
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • T. Leinmuller, E. Schoch, and F. Kargl. Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5):16-21, 2006.
    • (2006) IEEE Wireless Communications , vol.13 , Issue.5 , pp. 16-21
    • Leinmuller, T.1    Schoch, E.2    Kargl, F.3
  • 17
    • 0031001058 scopus 로고    scopus 로고
    • Road traffic injuries in developing countries: A comprehensive review of epidemiological studies
    • May
    • W. Odero, P. Garner, and A. Zwi. Road traffic injuries in developing countries: a comprehensive review of epidemiological studies. Tropical Medicine & International Health, 2(5):445-460, May 1997.
    • (1997) Tropical Medicine & International Health , vol.2 , Issue.5 , pp. 445-460
    • Odero, W.1    Garner, P.2    Zwi, A.3
  • 18
    • 34247351261 scopus 로고    scopus 로고
    • Challenges in securing vehicular networks
    • B. Parno and A. Perrig. Challenges in securing vehicular networks. In ACM Hotnets IV, 2005.
    • (2005) ACM Hotnets IV
    • Parno, B.1    Perrig, A.2
  • 19
    • 84857552847 scopus 로고    scopus 로고
    • Spoofed data detection in vanets using dynamic thresholds
    • J. Petit, M. Feiri, and F. Kargl. Spoofed data detection in vanets using dynamic thresholds. In IEEE VNC, 2011.
    • (2011) IEEE VNC
    • Petit, J.1    Feiri, M.2    Kargl, F.3
  • 20
    • 84857534647 scopus 로고    scopus 로고
    • Vehicle behavior analysis to enhance security in vanets
    • R. K. Schmidt et al. Vehicle behavior analysis to enhance security in vanets. In IEEE V2VCOM, 2008.
    • (2008) IEEE V2VCOM
    • Schmidt, R.K.1
  • 21
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39-68, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 23
    • 85061034567 scopus 로고    scopus 로고
    • Comprehensive experimental analyses of automotive attack surfaces
    • S. Checkoway et al. Comprehensive experimental analyses of automotive attack surfaces. In 20th USENIX Security Symposium, 2011.
    • (2011) 20th USENIX Security Symposium
    • Checkoway, S.1
  • 26
    • 84857611312 scopus 로고    scopus 로고
    • A two-stage verification process for car-to-x mobility data based on path prediction and probabilistic maneuver recognition
    • H. Stubing, J. Firl, and S. A. Huss. A two-stage verification process for car-to-x mobility data based on path prediction and probabilistic maneuver recognition. In IEEE VNC, 2011.
    • (2011) IEEE VNC
    • Stubing, H.1    Firl, J.2    Huss, S.A.3
  • 29
    • 84994185247 scopus 로고    scopus 로고
    • UN Economic Commission for Europe
    • UN Economic Commission for Europe. UN vehicle regulations. http://www.unece.org/trans/main/wp29/wp29regs21-40.html, 2016.
    • (2016) UN Vehicle Regulations
  • 32
    • 84966477020 scopus 로고    scopus 로고
    • Wireless access in vehicular environments
    • July
    • Wireless LAN Working Group. Wireless access in vehicular environments. IEEE Standards, July 2010.
    • (2010) IEEE Standards
  • 33
    • 84994185702 scopus 로고    scopus 로고
    • Providing vanet security through active position detection
    • G. Y. Yan, G. Choudhary, M. C. Weigle, and S. Olariu. Providing vanet security through active position detection. In ACM VANET, 2007.
    • (2007) ACM VANET
    • Yan, G.Y.1    Choudhary, G.2    Weigle, M.C.3    Olariu, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.