TITLE

Worm Spreading and Patching in Inter-vehicle Communications

AUTHOR(S)
Lin Cheng; Shakya, Rahul
PUB. DATE
April 2010
SOURCE
International Journal of Communication Networks & Information Se;Apr2010, Vol. 2 Issue 1, p50
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Inter-vehicle communications (IVC) rely on frequent data exchange among vehicles to facilitate road safety, congestion control, route planning, etc. The wireless connectivity among vehicles unfortunately poses a challenge for securing large-scale deployment of IVC systems. To successfully mitigate threats such as worm spreading in IVC systems, we describe the potential worm spreading from traffic and propagation modeling. Dual-slope pathloss and shadowing model is used to incorporate propagation and fading effects. Statistical tests performed on traces extracted from real highway data establish the traffic distributions for different times of the day. Potential worm attack and patching are simulated in different traffic scenarios. We also discuss the contributing factors observed.
ACCESSION #
49005551

 

Related Articles

  • Map-based direct position control system for wireless ad-hoc networks. Hosek, Jiri; Molnar, Karol; Vajsar, Pavel; Jakubek, Peter // Telecommunication Systems;Apr2014, Vol. 55 Issue 4, p537 

    The mobility modelling is one of the most important issues in wireless ad-hoc networks, therefore our research activities are focused on this area. This paper presents a new solution for map-based mobility modelling system which enables direct position control for mobile stations. This system,...

  • An Architecture to Generate Realistic Mobility Trace through Verified Flight Simulator. Ki-Il Kim // International Journal of Software Engineering & Its Applications;Mar2013, Vol. 7 Issue 2, p287 

    Recently aircraft ad hoc networks have received attention from many researchers since ad hoc network technology is expected to play a great role in communications between aircrafts. Due to large number of aircrafts as well as high bandwidth to meet emerging demands such as multimedia stream, ad...

  • Performance Evaluation of Routing Protocols in Vehicular Networks. BENNAOUI, Ameur; GUEZOURI, Mustapha; KECHE, Mokhtar // International Journal of Computer Network & Information Security;Aug2013, Vol. 5 Issue 10, p11 

    Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study...

  • A Cross Layer Autonomic Enabled Architecture for VANETs. FARAHANI, ALI; NAZEMI, ESLAM // International Journal of Computer Networks & Communications Secu;Oct2014, Vol. 2 Issue 10, p366 

    Similar to other ad hoc networks, VANETs need to change and adapt to their surrounding environment. Having various internal and external facilities to change network structure and parameters, VANETS are a good target for self-adaptive and self-managing systems. In order to achieve an autonomic...

  • QMMAC - New QoS Model with Admission Control for Mobile Ad hoc Networks. Magula, Peter // Information Sciences & Technologies: Bulletin of the ACM Slovaki;Dec2012, Vol. 4 Issue 4, p24 

    This paper deals with quality of service in mobile ad hoc networks. It aims at admission control schemes in this kind of networks. The state of the art is summed up and open problems are identified in this paper. Then, our proposed new QoS model for MANETs called QMMAC is presented. We provide...

  • DESIGN OF NOVEL SECURITY ARCHITECTURE FOR MANET FOR TRUSTING AND AUTHENTICATION. SEKHAR, J. CHANDRA; PRASAD, R. SIVARAM // Journal of Theoretical & Applied Information Technology;3/20/2014, Vol. 61 Issue 2, p334 

    In MANETs, providing the security for routing and data packets is a big challenge. To overcome those drawbacks in this paper we design Novel security architecture for MANET for trusting and authentication. It provides routing security against jamming attacks, detects stealthy packet dropping...

  • A Multi-hop Capacity Algorithm for Wireless Network Based on the Lifetime. Limin, Meng; Kai, Zhou; Jing, Zhang // Wireless Personal Communications;Jun2015, Vol. 82 Issue 4, p2751 

    Capacity analysis is a hotspot in the research of wireless networks, playing an important role in the network construction. This paper analyzed the connectivity of the network to form the hops-distribution probability formula between the source node and the destination node; then developed the...

  • Research on Statistics Based Multi-Priority MAC Protocol for Ad Hoc Networks. Peng Wang; Hai Li; Benli Ye; Chen Chen; Yubao Wang // Applied Mechanics & Materials;2014, Issue 644-650, p3103 

    With the growing application diversification in Ad Hoc networks, it is particularly important to support prioritization of traffic and ensure that critical data can be delivered more reliably and faster in an emergency scene. We mainly study on the improvement of statistics based multi-priority...

  • Wireless Networks And Cross-Layer Design: An Implementation Approach. Kamble, Vitthal B.; Kharat, M. U. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 4, p5435 

    In this paper, we take holistic approach to the protocol architecture design in multihop wireless networks. Our aim is to integrate various protocol layers into a framework by considering them as distributed computations over network to solve some optimization problem. Our current theory...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics