Analytic Model on Data Security in VANETs

被引:0
|
作者
Zha, Xuan [1 ,2 ]
Wang, Xu [2 ]
Ni, Wei [3 ]
Liu, Ren Ping [1 ]
Guo, Y. Jay [1 ]
Niu, Xinxin [2 ,4 ]
Zheng, Kangfeng [2 ]
机构
[1] Univ Technol Sydney, Global Big Data Technol Ctr, Sydney, NSW, Australia
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[3] CSIRO, Data6l, Sydney, NSW, Australia
[4] State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
AD HOC NETWORKS; PROTOCOLS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fast-changing topologies and uncoordinated transmissions are two critical challenges of implementing data security in vehicular ad-hoc networks (VANETs). We propose a new protocol, where transmitters adaptively switch between backing off retransmissions and changing keys to improve success rate. A new 3-dimensional (3-D) Markov model, which can analyze the proposed protocol with symmetric or asymmetric keys in terms of data security and connectivity, is developed. Analytical results, validated by simulations, show that the proposed protocol achieves substantially improved resistance against collusion attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] An Efficient Data Dissemination in VANETs
    Bokkasam, Vishnu
    Thyagarajan, Jayavignesh
    2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 236 - 240
  • [32] Hybrid Data Security Model for Cloud
    Sood, Sandeep K.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (03) : 50 - 59
  • [33] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [34] A Metadata Model for Data Centric Security
    Aziz, Benjmin
    Crompton, Shirley
    Wilson, Michael
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 21 - +
  • [35] Data for Geofencing Security Strategy Model
    Ijeh, Anthony C.
    Preston, David S.
    Imafidon, Chris O.
    Watmon, Titus B.
    Arreymbi, Johnnes
    Uwaechie, Annette O.
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 593 - +
  • [36] Big Data: A Security Compliance Model
    Gupta, Archana
    Verma, Ajita
    Kalra, Parul
    Kumar, Lokesh
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
  • [37] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [38] THE MODEL OF COMMON DATA SECURITY ACCESS
    Zhang, Qing-Hua
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 152 - 155
  • [39] A security authentication method based on trust evaluation in VANETs
    Ao Zhou
    Jinglin Li
    Qibo Sun
    Cunqun Fan
    Tao Lei
    Fangchun Yang
    EURASIP Journal on Wireless Communications and Networking, 2015
  • [40] Security and design requirements for software-defined VANETs
    Ben Jaballah, Wafa
    Conti, Mauro
    Lal, Chhagan
    COMPUTER NETWORKS, 2020, 169 (169)