An Attack Tree Based Comprehensive Framework for the Risk and Security Assessment of VANET using the Concepts of Game Theory and Fuzzy Logic

Author(s):  
Sahil Garg ◽  
Gagangeet Singh Aujla
Author(s):  
Meriem Houmer ◽  
Moulay Lahcen Hasnaoui

The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Researchers and interested authorities have therefore paid more attention to this issue. Therefore, robust approaches to protect this network's security and privacy against adversaries and attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk that faces this network. This paper focuses on the security threats in vehicular network especially on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack that the attacker can lead against the availability of VANET. We adopt a tree structure called attack tree to model the attacker's potential attack strategies. Based on this attack tree model, we can estimate the degree that a certain threat can lead to the VANET and identify possible attack sequences that an attacker may launch against the availability of this network. Then we utilize the multi-attribute utility theory to calculate the system’s total risk value also the probabilities of each attack sequence. The analysis results can provide support for decision-makers to make corresponding protection measures against the attack on the availability of this network.


AIMS Energy ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 474-492
Author(s):  
Akash Talwariya ◽  
◽  
Pushpendra Singh ◽  
Mohan Lal Kolhe ◽  
Jalpa H. Jobanputra ◽  
...  

2020 ◽  
Vol 26 (10) ◽  
pp. 1148-1157
Author(s):  
V. B. Vilkov ◽  
V. A. Plotnikov ◽  
P. V. Plotnikov ◽  
A. K. Chernykh

The presented study models market behavior strategies for firms in real (“impure”) markets.Aim. The presented study aims to develop tools for optimizing (according to the criterion of profit maximization) the market behavior of firms based on the achievements of modern mathematics.Tasks. The authors describe theoretical approaches to modeling the behavior of firms; define the problem of modeling the market behavior of firms in the language of game theory; modify the game model by implementing elements of the theory of fuzzy logic and fuzzy sets; develop and test a methodological approach to identifying the optimal behavior of firms based on fuzzy game modeling.Methods. This study uses general methods of economic and mathematical modeling, provisions of neoclassical and institutional firm theory, tools of game theory and the theory of fuzzy logic and fuzzy sets.Results. The optimal market behavior strategy for firms selling the same product is determined. The implementation of this strategy focuses on maximizing profits with allowance for the imperfections of real markets. A rigorous solution to this problem is proposed, based on the provisions of game theory, theory of fuzzy sets and fuzzy logic. The developed methodological approach to identifying the optimal market behavior strategy based on fuzzy game modeling is illustrated by a meaningful example.Conclusions. The developed and tested methodological approach to identifying the optimal market behavior strategy based on fuzzy game modeling described in the article allows firms to search for optimal strategies with allowance for the imperfections of real markets. It can be used for theoretical modeling of the behavior of firms in an “impure” market, including in a mixed economy, where the government has a certain degree of planning and administrative influence on economic processes. The proposed approach can be recommended for use by the management of firms in the development and implementation of competitive strategies.


2021 ◽  
pp. 29-42
Author(s):  
Kanika Sharma ◽  
◽  
◽  
◽  
Achyut Shankar ◽  
...  

In recent years, it has been observed that disclosure of information leads to the risk. Without restrict the accessibility of information providing security is difficult. So, there is a demand of time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not related directly, but some of their factors indirectly affect each other. Attributes play an important role in connecting the gap among security and accessibility. In this paper, finds the main attributes of security and accessibility that impact directly and indirectly each other such as confidentiality, integrity and availability and severity. The significance of every attribute in terms of their weight is important for their effect on the overall security during the big data security life cycle process. To calculate proposed work, researchers used the Fuzzy Analytic Hierarchy Process (Fuzzy AHP).


Author(s):  
J. Heydeman ◽  
R. Reijntjes ◽  
R. Babuska ◽  
U. Kaymak ◽  
H.R. van Nauta Lemke

Sign in / Sign up

Export Citation Format

Share Document