This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Modeling Worm Propagation over Vehicular Ad Hoc Networks
*
Technical Paper
2006-01-1581
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
Internet worms have shown the capability to compromise millions of network hosts in a matter of seconds, thereby precluding human countermeasures. A worm over a vehicular ad hoc network (VANET) can, in addition to the well-known threats, pose a whole new class of traffic-related threats (ranging from congestion to large-scale accidents). To combat these automated adversaries, security patches can be distributed by good worms. An accurate VANET-based worm propagation model is essential to protect from malicious worms and to efficiently utilize good worms for distribution of security patches. This paper derives an approximate closed-form mathematical model of worm propagation over VANETs. Simulation results assert that the proposed model captures the VANET worm propagation dynamics with outstanding accuracy.
Recommended Content
Citation
Khayam, S. and Radha, H., "Modeling Worm Propagation over Vehicular Ad Hoc NetworksAlso In
SAE 2006 Transactions Journal of Passenger Cars: Electronic and Electrical Systems
Number: V115-7; Published: 2007-03-30
Number: V115-7; Published: 2007-03-30
References
- February 10 2004
- Ghosh A. K. “Defense against cyber attacks on mobile, ad hoc network systems (MANETS),” BAA04-18 Proposer Information Pamphlet (PIP) Defense Advanced Research Projects Agency (DARPA) Advanced Technology Office (ATO) April 2004
- Ilett D. “Lexus a nexus between cars and phone viruses?” CNET News January 2005
- Melanson D. “Lexus cars potentially vulnerable to virus?” wireless.engadget.com January 2005
- Leyden J. “In-depth investigation of the ‘Cabir-in-Cars’ myth,” F-Secure May 2005
- Ilett D. “Car virus rumours taken out for a spin,” CNET News May 2005
- Castaňeda F. Sezer E. C. Xu J. “WORM vs. WORM: A preliminary study of an active counter-attack mechanism,” ACM Workshop on Rapid Malcode (WORM) October 2004
- Khayam S. A. Radha H. “Analyzing the spread of active worms over VANET,” ACM Workshop on Vehicular Ad Hoc Networks (VANET) October 2004
- Khayam S. A. Radha H. “A topologically-aware worm propagation model for wireless sensor networks,” IEEE ICDCS Workshop on Security in Distributed Computing Systems (SDCS) June 2005
- Khayam S. A. Radha H. “Using signal processing techniques to model worm propagation over wireless sensor networks,” IEEE Signal Processing Magazine November 2005
- Cole R. G. Phamdo N. Rajab M. Abu Terzis A. “Requirement on worm mitigation technologies in MANETs,” IEEE/ACM/SCS Workshop on Principles of Advanced and Distributed Simulations (PADS) June 2005
- Tanachaiwiwat S. Helmy A. “VACCINE: War of the worms in wired and wireless networks,” July 2005
- Bailey N. T. J. “The Mathematical Theory of Infectious Diseases and its Applications,” Charles Griffin & Co. Ltd. London 1975
- Anderson R. M. May R. M. “Infectious Diseases of Humans: Dynamics and Control,” Oxford Science Publications New York 1991
- Perkins C. E. Royer E. M. Das S. “Ad hoc on-demand distance vector (AODV) routing,” RFC 3561 February 1999
- Broch J. Johnson D. B. “The dynamic source routing protocol for mobile ad hoc networks,” IETF Internet Draft July 2004
- Staniford S. Paxson V. Weaver N. “How to 0wn the Internet in your spare time,” Usenix Security Symposium August 2002
- Rappaport T. S. “Wireless Communications: Principles and Practice,” Prentice-Hall 2nd December 2001
- Moore D. Shannon C. Brown D. “Code-red: A case study on the spread and victims of an Internet worm,” ACM Internet Measurement Workshop (IMW) August 2002
- Kreyszig E. “Advanced Engineering Mathematics,” Wiley New York 1998
- Lathi B. P. “Signal Processing and Linear Systems,” Berkeley-Cambridge Press 1998