Share Email Print

Proceedings Paper

Application distribution model and related security attacks in VANET
Author(s): Navid Nikaein; Soumya Kanti Datta; Irshad Marecar; Christian Bonnet
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker‘s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

Paper Details

Date Published: 14 March 2013
PDF: 6 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876808 (14 March 2013); doi: 10.1117/12.2010545
Show Author Affiliations
Navid Nikaein, EURECOM (France)
Soumya Kanti Datta, EURECOM (France)
Irshad Marecar, EURECOM (France)
Christian Bonnet, EURECOM (France)

Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?