Abstract
In the recent years, Vehicular Ad hoc NETworks (VANETs) have known a significant interest in terms of security and dependability. Moreover, we cannot ignore that this kind of networks request further work to provide different privacy related issues. Meaning that, the private data of users of this kind of network have to be prevented from different threats that may abuse their privacy. In this paper we propose an overall sight on the privacy threats in vehicular networks and we give our approach that addressing this issues. The goal here is providing the VANET dependability, by preventing the system assets from the potential threats that targets a vehicular system in order to more understand all ways in which the system can be attacked, that could help us to conceive countermeasures to counteract different possible attacks. Which could be done by applying the attack tree model on the vehicular system use case, in order to retrieve from it different informations in order to evaluate the system. Countermeasures could be added to the attack trees, that leads to the attack-defense tree model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. (1999)
Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, New York (2000)
Cremonini, M., Martini, P.: Evaluating information security investments from attackers perspective: the return-on-attack (ROA). In: Proceedings of 4th Workshop on the Economics of Information Security (2005)
Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy- preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
Freudiger, J., Raya, M., Felegyhazi, M.: Mix-zones for location privacy in vehicular networks. In: Proceedings of ACM WiN-ITS 2007 (2007)
Freudiger, J., Shokri, R., Hubaux, J.-P.: On the optimal placement of mix zones. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 216–234. Springer, Heidelberg (2009)
Leinmuller, T., Schoch, E., Maihofer, C.: Security requirements and solution concepts in vehicular ad hoc networks. In: Proceedings of the 4th Annual Conference on Wireless Demand Network Systems and Services (2007)
Ren, D., Du, S., Zhu, H.: A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5, 5–9 June 2011
Du, S., Li, X., Du, J., Zhu, H.: An attack and defense game for security and privacy in vehicular ad hoc networks, Peer-to-peer networking and application. Special Issue on Machine to Machine Communication (2012)
Dotzer, F.: Privacy in vehicular ad hoc networks. In: 5th International Workshop, PET 2005, Cavtat, Croatia, 30 May–1 June 2005
Freudiger, J., Manshaei, M., Hubaux, J.-P.: Non-cooperative location privacy: a game theoretic analysis. In: CCS 2009, DC (2009)
Bistarelli, S., Dall’Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1–15. Springer, Heidelberg (2007)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)
Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: opportunistic and privacy-preserving context collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) PERVASIVE 2008. LNCS, vol. 5013, pp. 280–297. Springer, Heidelberg (2008)
Pandurang, K., Xu, W., Tr. Zhang, W.: Temporal privacy in wireless sensor networks. In: 27th International Conference on Distributed Computing Systems, 2007, ICDCS 2007, p. 23, 25–27 June 2007
Du, S., Zhu, H.: Security Assessment in Vehicular Networks. SpringerBriefs in Computer Science. Springer, New York (2013). doi:10.1007/978-1-4614-9357-0_1
Mardacany, E.: Smart cities characteristics: importance of built environments components. In: IET Conference on Future Intelligent Cities, London, pp. 1–6 (2014)
Guizani, M., He, D., Ren, K., Rodrigues, J.J.P., Chan, S., Zhang, Y.: Security and privacy in emerging networks: Part II [Guest Editorial]. IEEE Commun. Mag. 53(8), 40–41 (2015)
Acknowledgment
We take this opportunities to thank all the conference’s committee and we would like to thanks for the anonymous reviewers for their remarks and opinions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Bahamou, S., Bonnin, JM., Idriss El Ouadghiri, M. (2016). Vehicular Ad-hoc Network’s Privacy Assessment Based on Attack Tree. In: Mendizabal, J., et al. Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2016. Lecture Notes in Computer Science(), vol 9669. Springer, Cham. https://doi.org/10.1007/978-3-319-38921-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-38921-9_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38920-2
Online ISBN: 978-3-319-38921-9
eBook Packages: Computer ScienceComputer Science (R0)