2015
DOI: 10.1109/tmc.2014.2375822
|View full text |Cite
|
Sign up to set email alerts
|

Worm Epidemics in Vehicular Networks

Abstract: Abstract-Connected vehicles promise to enable a wide range of new automotive services that will improve road safety, ease traffic management, and make the overall travel experience more enjoyable. However, they also open significant new surfaces for attacks on the electronics that control most of modern vehicle operations. In particular, the emergence of vehicle-to-vehicle (V2V) communication risks to lay fertile ground for self-propagating mobile malware that targets automobile environments. In this work, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Gao and Liu [18] focused on the impacts of human behaviors on worm propagation and proposed a two-layer network model to protect large-scale dynamic mobile networks. e short-range worm relies on the direct connections between hardware interfaces and currently tends to attack wireless sensor networks [19][20][21] and vehicular networks [22][23][24].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Gao and Liu [18] focused on the impacts of human behaviors on worm propagation and proposed a two-layer network model to protect large-scale dynamic mobile networks. e short-range worm relies on the direct connections between hardware interfaces and currently tends to attack wireless sensor networks [19][20][21] and vehicular networks [22][23][24].…”
Section: Related Workmentioning
confidence: 99%
“…In equation 23, when a i, j or b i, j dominates, the value of uc i, j declines, which indicates that the security of the next communication will be more predictable. Based on equations (22) and (23), the revised communication security rs ij can be defined as…”
Section: Security Evaluatormentioning
confidence: 99%
“…Many examples of malware have been observed which take advantage of security gaps in hardware, software, or communication protocols to infiltrate and spread through mobile ad-hoc networks (MANETs), giving attackers the ability to sabotage, control, or gain access to targeted assets. [6][7][8][9][10][11] It is therefore critical to develop effective defensive mechanisms to protect cyber networks at the tactical edge. Although low-level techniques such as those proposed in Kidston et al 12 can be highly effective in preventing and detecting intrusions, the threat of zero-day attacks and a continuously evolving attack surface make high-level cybersecurity analysis and risk mitigation another important component of a robust cyber defense solution.…”
Section: Motivationmentioning
confidence: 99%
“…Cyber attacks are a growing threat to mobile network security. Many examples of malware have been observed which take advantage of security gaps in wireless networking protocols to gain control of critical services by propagating an attack from a single point of entry to targeted assets [31,29,10,11,21]. Worms such as Cabir and CommWarrier, introduced in 2004 and 2005, respectively, demonstrated the ability of self-propagating malware to target popular mobile operating systems such as Android and Windows Mobile by spreading over Bluetooth.…”
Section: Introductionmentioning
confidence: 99%