Title :
Stealth attacks in vehicular technologies
Author :
Jakobsson, Markus ; Wang, XiaoFeng ; Wetzel, Susanne
Author_Institution :
Sch. of Informatics, Indiana Univ., Bloomington, IN, USA
Abstract :
In this position paper we discuss various issues related to so-called stealth attacks. We elaborate on stealth attacks in the context of three common types of wireless networks, namely ad hoc networks, hybrid networks, and sensor networks. We consider the relevance of these settings to various vehicular environments, e.g. emergency, and rescue operations, military operations, and theft recovery. Along with this, we discuss adversarial models. We furthermore explore the level of threat in a set of example situations and discuss potential tools that could be used to reduce the severity of stealth attacks in these contexts.
Keywords :
ad hoc networks; emergency services; military communication; mobile computing; telecommunication network routing; telecommunication security; wireless sensor networks; ad hoc networks; adversarial models; emergency operations; hybrid networks; military operations; rescue operations; sensor networks; stealth attacks; theft recovery; vehicular technologies; wireless networks; Ad hoc networks; Communication system security; Computer crime; Computer science; Costs; Informatics; Intelligent networks; Routing; Vehicular and wireless technologies; Wireless sensor networks;
Conference_Titel :
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th
Print_ISBN :
0-7803-8521-7
DOI :
10.1109/VETECF.2004.1400216