Application Distribution Model and Related Security Attacks in VANET

被引:5
作者
Nikaein, Navid [1 ]
Datta, Soumya Kanti [1 ]
Marecar, Irshad [1 ]
Bonnet, Christian [1 ]
机构
[1] EURECOM, Sophia Antipolis, France
来源
INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012) | 2013年 / 8768卷
关键词
VANET; Application distribution; Mobile platform; Malware; Sandbox; App store; Attacker's Model;
D O I
10.1117/12.2010545
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker's model as an extension to the work done in [ 6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e. g. malware, spamming & phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
引用
收藏
页数:6
相关论文
共 14 条
[1]  
[Anonymous], P 28 INT C SOFTW ENG
[2]  
[Anonymous], 11 INT IEEE C INT TR
[3]  
[Anonymous], 6 ANN IEEE COMM SOC
[4]  
[Anonymous], P INTELLIGENT TRANSP
[5]  
[Anonymous], P 4 IEEE WORKSH MOB
[6]  
[Anonymous], 2 INT WORKSH COMP SC
[7]  
Ashtankar Pravin P., 2009, 2009 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET 2009), P598, DOI 10.1109/ICETET.2009.41
[8]  
Carter S., 2002, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), P329
[9]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[10]  
Lo NW, 2007, IEEE GLOBE WORK, P69