Skip to main content

Vehicular Ad-hoc Network’s Privacy Assessment Based on Attack Tree

  • Conference paper
  • First Online:
Communication Technologies for Vehicles (Nets4Cars/Nets4Trains/Nets4Aircraft 2016)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9669))

Included in the following conference series:

Abstract

In the recent years, Vehicular Ad hoc NETworks (VANETs) have known a significant interest in terms of security and dependability. Moreover, we cannot ignore that this kind of networks request further work to provide different privacy related issues. Meaning that, the private data of users of this kind of network have to be prevented from different threats that may abuse their privacy. In this paper we propose an overall sight on the privacy threats in vehicular networks and we give our approach that addressing this issues. The goal here is providing the VANET dependability, by preventing the system assets from the potential threats that targets a vehicular system in order to more understand all ways in which the system can be attacked, that could help us to conceive countermeasures to counteract different possible attacks. Which could be done by applying the attack tree model on the vehicular system use case, in order to retrieve from it different informations in order to evaluate the system. Countermeasures could be added to the attack trees, that leads to the attack-defense tree model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. (1999)

    Google Scholar 

  2. Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, New York (2000)

    Google Scholar 

  3. Cremonini, M., Martini, P.: Evaluating information security investments from attackers perspective: the return-on-attack (ROA). In: Proceedings of 4th Workshop on the Economics of Information Security (2005)

    Google Scholar 

  4. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy- preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  5. Freudiger, J., Raya, M., Felegyhazi, M.: Mix-zones for location privacy in vehicular networks. In: Proceedings of ACM WiN-ITS 2007 (2007)

    Google Scholar 

  6. Freudiger, J., Shokri, R., Hubaux, J.-P.: On the optimal placement of mix zones. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 216–234. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Leinmuller, T., Schoch, E., Maihofer, C.: Security requirements and solution concepts in vehicular ad hoc networks. In: Proceedings of the 4th Annual Conference on Wireless Demand Network Systems and Services (2007)

    Google Scholar 

  8. Ren, D., Du, S., Zhu, H.: A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5, 5–9 June 2011

    Google Scholar 

  9. Du, S., Li, X., Du, J., Zhu, H.: An attack and defense game for security and privacy in vehicular ad hoc networks, Peer-to-peer networking and application. Special Issue on Machine to Machine Communication (2012)

    Google Scholar 

  10. Dotzer, F.: Privacy in vehicular ad hoc networks. In: 5th International Workshop, PET 2005, Cavtat, Croatia, 30 May–1 June 2005

    Google Scholar 

  11. Freudiger, J., Manshaei, M., Hubaux, J.-P.: Non-cooperative location privacy: a game theoretic analysis. In: CCS 2009, DC (2009)

    Google Scholar 

  12. Bistarelli, S., Dall’Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1–15. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  14. Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: opportunistic and privacy-preserving context collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) PERVASIVE 2008. LNCS, vol. 5013, pp. 280–297. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Pandurang, K., Xu, W., Tr. Zhang, W.: Temporal privacy in wireless sensor networks. In: 27th International Conference on Distributed Computing Systems, 2007, ICDCS 2007, p. 23, 25–27 June 2007

    Google Scholar 

  16. Du, S., Zhu, H.: Security Assessment in Vehicular Networks. SpringerBriefs in Computer Science. Springer, New York (2013). doi:10.1007/978-1-4614-9357-0_1

    Book  Google Scholar 

  17. Mardacany, E.: Smart cities characteristics: importance of built environments components. In: IET Conference on Future Intelligent Cities, London, pp. 1–6 (2014)

    Google Scholar 

  18. Guizani, M., He, D., Ren, K., Rodrigues, J.J.P., Chan, S., Zhang, Y.: Security and privacy in emerging networks: Part II [Guest Editorial]. IEEE Commun. Mag. 53(8), 40–41 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

We take this opportunities to thank all the conference’s committee and we would like to thanks for the anonymous reviewers for their remarks and opinions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Bahamou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Bahamou, S., Bonnin, JM., Idriss El Ouadghiri, M. (2016). Vehicular Ad-hoc Network’s Privacy Assessment Based on Attack Tree. In: Mendizabal, J., et al. Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2016. Lecture Notes in Computer Science(), vol 9669. Springer, Cham. https://doi.org/10.1007/978-3-319-38921-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38921-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38920-2

  • Online ISBN: 978-3-319-38921-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics