DocumentCode :
2668226
Title :
Stealth attacks in vehicular technologies
Author :
Jakobsson, Markus ; Wang, XiaoFeng ; Wetzel, Susanne
Author_Institution :
Sch. of Informatics, Indiana Univ., Bloomington, IN, USA
Volume :
2
fYear :
2004
fDate :
26-29 Sept. 2004
Firstpage :
1218
Abstract :
In this position paper we discuss various issues related to so-called stealth attacks. We elaborate on stealth attacks in the context of three common types of wireless networks, namely ad hoc networks, hybrid networks, and sensor networks. We consider the relevance of these settings to various vehicular environments, e.g. emergency, and rescue operations, military operations, and theft recovery. Along with this, we discuss adversarial models. We furthermore explore the level of threat in a set of example situations and discuss potential tools that could be used to reduce the severity of stealth attacks in these contexts.
Keywords :
ad hoc networks; emergency services; military communication; mobile computing; telecommunication network routing; telecommunication security; wireless sensor networks; ad hoc networks; adversarial models; emergency operations; hybrid networks; military operations; rescue operations; sensor networks; stealth attacks; theft recovery; vehicular technologies; wireless networks; Ad hoc networks; Communication system security; Computer crime; Computer science; Costs; Informatics; Intelligent networks; Routing; Vehicular and wireless technologies; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th
ISSN :
1090-3038
Print_ISBN :
0-7803-8521-7
Type :
conf
DOI :
10.1109/VETECF.2004.1400216
Filename :
1400216
Link To Document :
بازگشت