Browse > Article

자율주행자동차 V2V 통신환경에서의 DoS 공격 및 대응기술 동향 연구  

Lee, Sung-young (아주대학교 컴퓨터공학과 디지털 백신 연구소)
Kim, Ji-min (아주대학교 컴퓨터공학과 디지털 백신 연구소)
Ji, Cheong-min (아주대학교 컴퓨터공학과 디지털 백신 연구소)
Hong, Man-pyo (아주대학교 사이버보안학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 SAE, "Level of Driving Automation", SAE J3061, 2018
2 관계부처 합동, "미래자동차 산업 발전 전략", 2019
3 Anwer, M. Shahid, Chris GuyA, "Survey of VANET Technologies", Journal of Emerging Trends in Computing and Information Sciences 5(9) pp. 661-674, 2014
4 "IEEE Guide for Wireless Access in Vehicular Environments (WAVE)-Architecture," IEEE Standard 1609.0-2013, 2013.
5 "IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Networking Services," IEEE Standard 1609.3-2016, 2016
6 C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, 1999
7 K. Geetha, N. Sreenath, "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol", RESEARCH ARTICLE - COMPUTER ENGINEERING AND COMPUTER SCIENCE, pp. 1161-1172, 2015
8 Carlos E. Caicedo, James B.D. Joshi, Summit R. Tuladhar, "IPv6 Security Challenge", Computer, vol. 42, no. 2, pp.36-42, Feb 2009   DOI
9 A. S. A. Mohamed Sid Ahmed, R. Hassan and N. E. Othman, "IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey.", IEEE Access, vol. 5, pp. 18187-18210, 2017.   DOI
10 Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, "Resisting flooding attacks in ad hoc networks." International Conference on Information Technology: Coding and Computing Volume II, pp. 657-662, 2005,
11 V. Bibhu, K. Roshan, K. Balwant, D. Kumar, "Performance Analysis of Black Hole Attack in Vanet", I. J. Computer Network and Information Security, pp. 47-54, Nov 2012
12 Karn, Chaitanya, Gupta, C.P., "A survey on VANETs security attacks and Sybil Attack detection." International Journal of Sensors Wireless Communications and Control. 6. pp. 45-62. 2016   DOI
13 P. Kafil, M. Fathy, M. Z. Lighvan, "Modeling Sybil attacker behavior in VANETs." 2012 9th International ISC Conference on Information Security and Cryptology, pp. 162-168. 2012,
14 Elsa Mustikawati, Doan Perdana, Ridha Muldina Negara, "Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm", CommIT (Communication & Information Technology) Journal 11(2), pp. 77-83, 2017   DOI
15 B. Brecht et al., "A Security Credential Management System for V2X Communications.", IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 12, pp. 3850-3871, Dec. 2018.   DOI
16 L. He and W. T. Zhu, "Mitigating DoS attacks against signature-based authentication in VANETs." IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 261-265. 2012
17 M. Kaur, J. Martin and H. Hu, "Comprehensive view of security practices in vehicular networks." International Conference on Connected Vehicles and Expo (ICCVE), pp. 19-26. 2016
18 "IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation," IEEE Standard 1609.4-2016, 2016
19 P. Liu, B. Liu, Y. Sun, B. Zhao, I. You, "Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET," IEEE Access, vol. 6, pp. 20795-20806, 2018.   DOI
20 M. N. Mejri, J. Ben-Othman, "GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs.", IEEE Transactions on Mobile Computing, vol. 16, no. 3, pp. 759-771, March 2017.   DOI
21 K. Verma, H. Hasbullah, "IP-CHOCK (filter)-Based detection scheme for Denial of Service (DoS) attacks in VANET," International Conference on Computer and Information Sciences (ICCOINS), pp. 1-6. 2014
22 J. Tobin, C. Thorpe, L. Murphy, "An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks," IEEE 85th Vehicular Technology Conference, pp. 1-7, 2017