2018 11th IFIP Wireless and Mobile Networking Conference (WMNC) 2018
DOI: 10.23919/wmnc.2018.8480909
|View full text |Cite
|
Sign up to set email alerts
|

BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…This communication protocol called "Ghost" allows the hacker to hide its remote communication with the infected vehicle. The authors considered two bot malware attacks feasible against vehicular networks: Botveillance [52], and congestion attacks [53]. Botveillance is an adaptive cooperative surveillance attack against pseudonymous systems in vehicular networks, which is based on vehicular botnet and performed by vehicles themselves without depending on any additional hardware.…”
Section: Related Workmentioning
confidence: 99%
“…This communication protocol called "Ghost" allows the hacker to hide its remote communication with the infected vehicle. The authors considered two bot malware attacks feasible against vehicular networks: Botveillance [52], and congestion attacks [53]. Botveillance is an adaptive cooperative surveillance attack against pseudonymous systems in vehicular networks, which is based on vehicular botnet and performed by vehicles themselves without depending on any additional hardware.…”
Section: Related Workmentioning
confidence: 99%
“…Vehicular bots that are compromised, hacked, or rogue nodes penetrate the network and perform DDoS attacks on the connected vehicles networks infrastructure. The bots overload the network resources and hinder connection with other legitimate nodes, thus disrupting the function and operation of connected vehicle applications [20]. The bots can also inject, alter, remove, or send fake messages to other nodes in the network, which may be hazardous to road users [21].…”
Section: Introductionmentioning
confidence: 99%
“…The safety together with nonsafety services was included in these. In reality, there are numerous services, say the surveillance [12] together with route planning services [13]. Yet, several challenges still present for the VANET's management and it's deployment in the instance of secured DC [14].…”
Section: Introductionmentioning
confidence: 99%