Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2020, , 936 - 947, 01.10.2020
https://doi.org/10.16984/saufenbilder.670273

Öz

Kaynakça

  • B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.
  • F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
  • S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.
  • S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.
  • V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.
  • S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.
  • S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.
  • A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.
  • H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.
  • Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.
  • P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.
  • M. Y. Abualhoul, M. Marouf, O. Shagdar, and F. Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.
  • W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.
  • X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.
  • X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.
  • S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.
  • M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.
  • R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7'h International Conference on Intelligent Systems and Control (ISCO 2013)
  • Y. Zhang and G. Cao, "V-PADA: Vehicle-Platoon-Aware Data Access in VANETs," IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.
  • M. Su. and S. Ahn, "Autonomous platoon formation for VANET-enabled vehicles," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.
  • [21] H. Hexmoor, S. Alsamaraee and M. Almaghshi, "BlockChain for Improved Platoon Security," International Journal of Information Systems and Computer Sciences, vol. 7, no. 2, pp. 1-6, 2018.
  • M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, "Vehicle platoon control with multi-configuration ability," Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.
  • M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.
  • J. Liu, D. Ma, A. Weimerskirch and H. Zhu, "Secure and Safe Automated Vehicle Platooning," IEEE Reliability Society, Detroit, 2016.
  • MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.

CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

Yıl 2020, , 936 - 947, 01.10.2020
https://doi.org/10.16984/saufenbilder.670273

Öz

The platooning is an emerging concept in VANETS that involves a group of vehicles behaving as a single unit via the coordination of movement. The emergence of autonomous vehicles has bolstered the evolution of platooning as a trend in mobility and transportation. The autonomous vehicles and the elimination of individual and manual capabilities introduces new risks. The safety of the cargos, passenger and the advanced technology had increased the complication of the security concerns in platooning as it may attract malicious actors. In improving the security of the platoon, the threat and their potential impacts on the vehicular systems should be identified to ensure the development of security features that will secure against the identified risks. In this paper, two critical types of security breaches were identified those are Sybil attack and Delay attacks. Those security attacks can be somewhat disruptive and dangerous to the regular operation of the platoon leading to severe injuries, increased fuel consumption and delay the performance of the network. The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.

Kaynakça

  • B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.
  • F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
  • S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.
  • S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.
  • V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.
  • S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.
  • S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.
  • A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.
  • H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.
  • Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.
  • P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.
  • M. Y. Abualhoul, M. Marouf, O. Shagdar, and F. Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.
  • W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.
  • X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.
  • X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.
  • S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.
  • M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.
  • R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7'h International Conference on Intelligent Systems and Control (ISCO 2013)
  • Y. Zhang and G. Cao, "V-PADA: Vehicle-Platoon-Aware Data Access in VANETs," IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.
  • M. Su. and S. Ahn, "Autonomous platoon formation for VANET-enabled vehicles," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.
  • [21] H. Hexmoor, S. Alsamaraee and M. Almaghshi, "BlockChain for Improved Platoon Security," International Journal of Information Systems and Computer Sciences, vol. 7, no. 2, pp. 1-6, 2018.
  • M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, "Vehicle platoon control with multi-configuration ability," Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.
  • M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.
  • J. Liu, D. Ma, A. Weimerskirch and H. Zhu, "Secure and Safe Automated Vehicle Platooning," IEEE Reliability Society, Detroit, 2016.
  • MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Mohammed Al Sheıkhly 0000-0003-4694-152X

Sefer Kurnaz 0000-0002-7666-2639

Yayımlanma Tarihi 1 Ekim 2020
Gönderilme Tarihi 4 Ocak 2020
Kabul Tarihi 8 Temmuz 2020
Yayımlandığı Sayı Yıl 2020

Kaynak Göster

APA Al Sheıkhly, M., & Kurnaz, S. (2020). CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. Sakarya University Journal of Science, 24(5), 936-947. https://doi.org/10.16984/saufenbilder.670273
AMA Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. Ekim 2020;24(5):936-947. doi:10.16984/saufenbilder.670273
Chicago Al Sheıkhly, Mohammed, ve Sefer Kurnaz. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science 24, sy. 5 (Ekim 2020): 936-47. https://doi.org/10.16984/saufenbilder.670273.
EndNote Al Sheıkhly M, Kurnaz S (01 Ekim 2020) CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. Sakarya University Journal of Science 24 5 936–947.
IEEE M. Al Sheıkhly ve S. Kurnaz, “CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”, SAUJS, c. 24, sy. 5, ss. 936–947, 2020, doi: 10.16984/saufenbilder.670273.
ISNAD Al Sheıkhly, Mohammed - Kurnaz, Sefer. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science 24/5 (Ekim 2020), 936-947. https://doi.org/10.16984/saufenbilder.670273.
JAMA Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. 2020;24:936–947.
MLA Al Sheıkhly, Mohammed ve Sefer Kurnaz. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science, c. 24, sy. 5, 2020, ss. 936-47, doi:10.16984/saufenbilder.670273.
Vancouver Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. 2020;24(5):936-47.

30930 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.