WHEN GAME THEORY MEETS SECURITY AND PRIVACY RELATED RISK ASSESSMENT OF VEHICULAR NETWORKS (VANET)

Authors

  • SARA BAHAMOU IA Laboratory, My Ismail University Meknes, Morocco IRISA Laboratory, Institut Mines Telecom Atlantique, Rennes, France
  • DRISS EL OUADGHIRI IA Laboratory, My Ismail University Meknes, Morocco
  • JEAN-MARIE BONNIN IRISA Laboratory, IMT Atlantique 35510, Rennes, France

Keywords:

Vehicular ad hoc networks Security and Privacy, location Privacy Risk Anal- ysis, Attack Tree, Game Theory

Abstract

Vehicular ad-hoc networks faces numerous challenges, in particular Security and Privacy issues. Here, security assessment, risk evaluation and many other security features/ calculations are based generally on theoretical ideas, that may project in dierent level real life conditions. Hence, the existing of an important risk that these analysis may not work properly. We shouldn't forget that the important goal of VANET applications deployment is to reduce accident rate, which means the reduction of the human deaths and injuries number. Hence, our focus on the importance of strengthening the security aspect of dierent VANET applications and services, Which could be achieved by relying on security requirements. We found many research approaches covering a signicant part of VANETs security and risk assessment challenges. This article is dedicated to the most crucial challenges in every security analysis methodology which is the study of dierent attack scenarios. These scenarios are generally in accordance with the most feared threats. So our goal here, is to determine the most probably attack scenario and how we can deploy the appropriate countermeasures in such a way some risks are acceptable. Therefore, our approach to VANET defense applies attack tree- defense tree for advanced vulnerabilities assessment and intrusion detection. Attack tree processing shows how attackers can penetrate a VANET, so by identifying critical vulnerabilities we can provide strategies for protecting the critical network assets. Thus, attack-tree leads us to the optimal intrusion detection and attack response. A strong link is existed between attacker and defender assets, which can be modeled by a mathematical analysis, called game theory analysis. This game approach has demonstrated the interaction in the attack-tree processing.

 

Downloads

Download data is not yet available.

References

IEEE Standard for Message Sets for Vehicle/ Roadside Communications. 1455-1999, pp.i-130

Moustafa and Y. Zhang (Eds.). 2009. Vehicular Networks: Techniques, Standards and Applica-

tions. Auerbach publishers, Taylor and Francis Group.

E.B. Hamida, H. Noura, H. Znaidi: Security of Cooperative Intelligent Transport Systems: Stan-

dards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380

Downloads

Published

2017-04-30

Issue

Section

Articles

Most read articles by the same author(s)