Model-checking continuous-time Markov chains
ACM Transactions on Computational Logic (TOCL)
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Modeling mobility for vehicular ad-hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Stochastic properties of the random waypoint mobility model
Wireless Networks
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
Providing VANET security through active position detection
Computer Communications
Simulation-Based Performance Comparison of VANETs Backbone Formation Algorithms
DS-RT '08 Proceedings of the 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
ACM Transactions on Sensor Networks (TOSN)
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
IEEE Transactions on Dependable and Secure Computing
DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking
Mobile Networks and Applications
Increasing Resiliency in Multi-phase Wireless Sensor Networks
The Computer Journal
Performance evaluation of routing protocols in vehicular ad hoc networks
International Journal of Internet Protocol Technology
A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)
Wireless Communications & Mobile Computing
Threats to security in DSRC/WAVE
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Security in vehicular ad hoc networks
IEEE Communications Magazine
AMOEBA: Robust Location Privacy Scheme for VANET
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Simulation-based evaluation of techniques for privacy protection in VANETs
WIMOB '12 Proceedings of the 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
Mobile Networks and Applications
Hi-index | 0.00 |
In the node compromise attack, the adversary physically captures nodes and extracts the cryptographic keys from the memories, which destroys the security, reliability and confidentiality of the networks. Due to the dynamical network topology, designing an efficient node compromise attack algorithm is challenging, because it is difficult to model the attack or to enhance the attacking efficiency. In this paper, a general algorithm for modeling the node compromise attack in VANET is proposed, which promotes the attacking efficiency by destroying the network backbone. The backbone is constructed using the connected dominating set of the network, which has relevant to the intermeeting time between the vehicles. Then two attacking algorithms are proposed based on the general model, which destroy the network in a centralized and distributed version while maximizing the destructiveness. Simulations are conducted to show the advantages of our scheme. Simulation results reveal that our scheme enhances the attacking efficiency in different mobility models and different applications, which is suitable for modeling the node compromise attack in VANET. At last, discussions are presented to the illustrate the influences of the characteristics to the attacking efficiency with respect to vehicle speed, communication range and key sharing probability.