자율주행자동차 V2V 통신환경에서의 DoS 공격 및 대응기술 동향 연구 |
Lee, Sung-young
(아주대학교 컴퓨터공학과 디지털 백신 연구소)
Kim, Ji-min (아주대학교 컴퓨터공학과 디지털 백신 연구소) Ji, Cheong-min (아주대학교 컴퓨터공학과 디지털 백신 연구소) Hong, Man-pyo (아주대학교 사이버보안학과) |
1 | SAE, "Level of Driving Automation", SAE J3061, 2018 |
2 | 관계부처 합동, "미래자동차 산업 발전 전략", 2019 |
3 | Anwer, M. Shahid, Chris GuyA, "Survey of VANET Technologies", Journal of Emerging Trends in Computing and Information Sciences 5(9) pp. 661-674, 2014 |
4 | "IEEE Guide for Wireless Access in Vehicular Environments (WAVE)-Architecture," IEEE Standard 1609.0-2013, 2013. |
5 | "IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Networking Services," IEEE Standard 1609.3-2016, 2016 |
6 | C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, 1999 |
7 | K. Geetha, N. Sreenath, "Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol", RESEARCH ARTICLE - COMPUTER ENGINEERING AND COMPUTER SCIENCE, pp. 1161-1172, 2015 |
8 | Carlos E. Caicedo, James B.D. Joshi, Summit R. Tuladhar, "IPv6 Security Challenge", Computer, vol. 42, no. 2, pp.36-42, Feb 2009 DOI |
9 | A. S. A. Mohamed Sid Ahmed, R. Hassan and N. E. Othman, "IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey.", IEEE Access, vol. 5, pp. 18187-18210, 2017. DOI |
10 | Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, "Resisting flooding attacks in ad hoc networks." International Conference on Information Technology: Coding and Computing Volume II, pp. 657-662, 2005, |
11 | V. Bibhu, K. Roshan, K. Balwant, D. Kumar, "Performance Analysis of Black Hole Attack in Vanet", I. J. Computer Network and Information Security, pp. 47-54, Nov 2012 |
12 | Karn, Chaitanya, Gupta, C.P., "A survey on VANETs security attacks and Sybil Attack detection." International Journal of Sensors Wireless Communications and Control. 6. pp. 45-62. 2016 DOI |
13 | P. Kafil, M. Fathy, M. Z. Lighvan, "Modeling Sybil attacker behavior in VANETs." 2012 9th International ISC Conference on Information Security and Cryptology, pp. 162-168. 2012, |
14 | Elsa Mustikawati, Doan Perdana, Ridha Muldina Negara, "Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm", CommIT (Communication & Information Technology) Journal 11(2), pp. 77-83, 2017 DOI |
15 | B. Brecht et al., "A Security Credential Management System for V2X Communications.", IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 12, pp. 3850-3871, Dec. 2018. DOI |
16 | L. He and W. T. Zhu, "Mitigating DoS attacks against signature-based authentication in VANETs." IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 261-265. 2012 |
17 | M. Kaur, J. Martin and H. Hu, "Comprehensive view of security practices in vehicular networks." International Conference on Connected Vehicles and Expo (ICCVE), pp. 19-26. 2016 |
18 | "IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-Channel Operation," IEEE Standard 1609.4-2016, 2016 |
19 | P. Liu, B. Liu, Y. Sun, B. Zhao, I. You, "Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET," IEEE Access, vol. 6, pp. 20795-20806, 2018. DOI |
20 | M. N. Mejri, J. Ben-Othman, "GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs.", IEEE Transactions on Mobile Computing, vol. 16, no. 3, pp. 759-771, March 2017. DOI |
21 | K. Verma, H. Hasbullah, "IP-CHOCK (filter)-Based detection scheme for Denial of Service (DoS) attacks in VANET," International Conference on Computer and Information Sciences (ICCOINS), pp. 1-6. 2014 |
22 | J. Tobin, C. Thorpe, L. Murphy, "An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks," IEEE 85th Vehicular Technology Conference, pp. 1-7, 2017 |