Diversity-based Moving-target Defense for Secure Wireless Vehicular Communications

被引:7
|
作者
Ghourab, Esraa M. [1 ]
Samir, Effat [1 ]
Azab, Mohamed [2 ,4 ]
Eltoweissy, Mohamed [3 ]
机构
[1] Alexandria Univ, Elect Engn Dept, Alexandria, Egypt
[2] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
[3] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA 24450 USA
[4] Univ Florida, Elect & Comp Engn, ACIS, Gainesville, FL 32611 USA
关键词
Vehicle to vehicle communication; Moving target defense; Diversification; Nagel-Schreckenberg rules; PHYSICAL LAYER SECURITY; NETWORKS;
D O I
10.1109/SPW.2018.00046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and reliable vehicle to vehicle (V2V) communication is a challenging task, particularly due to the wireless medium and the highly dynamic nature of the vehicular environment. There is a need to ensure wireless communication security against eavesdropping and signal jamming in such a highly dynamic environment. This paper proposes a spatiotemporal diversity-based mechanism that employs real time diversity to induce Moving-Target Defense (MTD); a defense mechanism inspired by nature. The mechanism is based on enabling flexible signal manipulation such as runtime diversification to confuse eavesdroppers by transmitting data across dynamic multi-paths relayed through vehicles traveling on a multi-lane road. Simulation results show that it would be very complicated for a malicious user to eavesdrop on a meaningful portion of the signal or jam a targeted data stream.
引用
收藏
页码:287 / 292
页数:6
相关论文
共 50 条
  • [21] Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network
    Ghourab, Esraa M.
    Azab, Mohamed
    Mansour, Ahmed
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 138 : 1 - 14
  • [22] Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
    Fleck, Daniel
    Stavrou, Angelos
    Kesidis, George
    Nasiriani, Neda
    Shan, Yuquan
    Konstantopoulos, Takis
    [J]. 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 196 - 203
  • [23] Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids
    Lakshminarayana, Subhash
    Belmega, E. Veronica
    Poor, H. Vincent
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2019,
  • [24] "MystifY": A proactive Moving-Target Defense for a resilient SDN controller in Software Defined CPS
    Azab, Mohamed
    Samir, Mohamed
    Samir, Effat
    [J]. COMPUTER COMMUNICATIONS, 2022, 189 : 205 - 220
  • [25] MIGRATE: Towards a Lightweight Moving-target Defense against Cloud Side-Channels
    Azab, Mohamed
    Eltoweissy, Mohamed
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 96 - 103
  • [26] NOMAD: Towards Non-Intrusive Moving-Target Defense against Web Bots
    Vikram, Shardul
    Yang, Chao
    Gu, Guofei
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 55 - 63
  • [27] Diversity-based sampling rate reduction for digital UWB communications
    Cartagena Gordillo, Alex
    Kohno, Ryuji
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 44 - 47
  • [28] Exploiting Principle of Moving Target Defense to Secure FPGA Systems
    Zhang, Zhiming
    Yu, Qiaoyan
    [J]. 2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 393 - 398
  • [29] Secure VPN using Mobile IPv6 based Moving Target Defense
    Heydari, Vahid
    Yoo, Seong-Moo
    Kim, Sun-il
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [30] An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance
    Kesidis, George
    Shan, Yuquan
    Fleck, Daniel
    Stavrou, Angelos
    Konstantopoulos, Takis
    [J]. PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 61 - 67