attack mitigation
Recently Published Documents


TOTAL DOCUMENTS

190
(FIVE YEARS 94)

H-INDEX

13
(FIVE YEARS 4)

2022 ◽  
Vol 6 (1) ◽  
pp. 1-24
Author(s):  
Liuwang Kang ◽  
Haiying Shen

For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the vehicle ABS. In our attack detection method, we build a vehicle state space equation that considers the real-time road friction coefficient to predict vehicle states (i.e., wheel speed and longitudinal brake force) with their previous values. Based on sets of historical measured vehicle states, we develop a search algorithm to find out attack changes (vehicle state changes because of attack) by minimizing errors between the predicted vehicle states and the measured vehicle states. In our attack mitigation strategy, attack changes are subtracted from the measured vehicle states to generate correct vehicle states for a vehicle ABS. We conducted the first real SA experiments to show how a magnet affects sensor readings. Our simulation results demonstrate that our attack detection method can detect SA and CAN bus attack more accurately compared with existing methods, and also that our attack mitigation strategy almost eliminates the attack’s effects on a vehicle ABS.


Author(s):  
Karen Ávila ◽  
Paul Sanmartin ◽  
Daladier Jabba ◽  
Javier Gómez

AbstractWireless sensor networks (WSN) were cataloged as one of the most important emerging technologies of the last century and are considered the basis of the Internet of Things paradigm. However, an undeniable disadvantage of WSN is that the resources available for these types of networks, such as processing capacity, memory, and battery, are usually in short supply. This limitation in resources implements security mechanisms a difficult task. This work reviews 93 recent proposals in which different solutions were formulated for the different attacks in WSN in the network layer; in total, 139 references were considered. According to the literature, these attacks are mainly Sybil, wormhole, sinkhole, and selective forwarding. The main goal of this contribution is to present the evaluation metrics used in the state of the art to mitigate the Sybil, wormhole, sinkhole, and selective forwarding attacks and show the network topologies used in each of these proposals.


Author(s):  
Jaya Singh ◽  
Ayush Sinha ◽  
Priyanka Goli ◽  
Venkatesan Subramanian ◽  
Sandeep Kumar Shukla ◽  
...  

Author(s):  
G. Manoranjan ◽  
Madhavarapu Chandan ◽  
G. Karthik ◽  
Rabinarayan Satpathy ◽  
S. Sugumaran

Author(s):  
Khashayar Torabi Farsani ◽  
Maryam Dehghani ◽  
Roozbeh Abolpour ◽  
Navid Vafamand ◽  
Mohammad S. Javadi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document