語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection and Mitigation of Security...
~
ProQuest Information and Learning Co.
Detection and Mitigation of Security Attacks in Connected Vehicles.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Detection and Mitigation of Security Attacks in Connected Vehicles./
作者:
Albouq, Sami Saad.
面頁冊數:
1 online resource (146 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: B.
Contained By:
Dissertation Abstracts International79-12B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780438184497
Detection and Mitigation of Security Attacks in Connected Vehicles.
Albouq, Sami Saad.
Detection and Mitigation of Security Attacks in Connected Vehicles.
- 1 online resource (146 pages)
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: B.
Thesis (Ph.D.)--Oakland University, 2018.
Includes bibliographical references
Securing smart-highway networks is critical due to the nature of Connected Vehicles (CVs) environments where the network is dynamic and scalable. CV nodes serve as both hosts and routers to communicate without base stations. Because of the cooperative routing capability, CVs have been envisioned for safety and emergency communications but have become more vulnerable to security attacks. If a malicious node in CVs propagates forged routing information or accesses resources without permissions, such a node can easily disrupt the network to cause a denial of service or can hijack critical routes. Defending against attacks is challenging due to the CV network's unique communication characteristics. Traditional cryptographic authentication mechanisms are not sufficient because CV networks are subject to insider attacks. This dissertation proposes a framework that provides CVs with security at both levels of communications, mobile and infrastructure, As well as this dissertation comprises a detection mechanism for verifying route existences and conditions and managing resource access controls. The effectiveness of these approaches is demonstrated by case studies to demonstrate the validity of each technique.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780438184497Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Detection and Mitigation of Security Attacks in Connected Vehicles.
LDR
:02418ntm a2200325Ki 4500
001
919152
005
20181116131021.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780438184497
035
$a
(MiAaPQ)AAI10748719
035
$a
(MiAaPQ)oakland:10061
035
$a
AAI10748719
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Albouq, Sami Saad.
$3
1193659
245
1 0
$a
Detection and Mitigation of Security Attacks in Connected Vehicles.
264
0
$c
2018
300
$a
1 online resource (146 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: B.
500
$a
Adviser: Erik Fredericks.
502
$a
Thesis (Ph.D.)--Oakland University, 2018.
504
$a
Includes bibliographical references
520
$a
Securing smart-highway networks is critical due to the nature of Connected Vehicles (CVs) environments where the network is dynamic and scalable. CV nodes serve as both hosts and routers to communicate without base stations. Because of the cooperative routing capability, CVs have been envisioned for safety and emergency communications but have become more vulnerable to security attacks. If a malicious node in CVs propagates forged routing information or accesses resources without permissions, such a node can easily disrupt the network to cause a denial of service or can hijack critical routes. Defending against attacks is challenging due to the CV network's unique communication characteristics. Traditional cryptographic authentication mechanisms are not sufficient because CV networks are subject to insider attacks. This dissertation proposes a framework that provides CVs with security at both levels of communications, mobile and infrastructure, As well as this dissertation comprises a detection mechanism for verifying route existences and conditions and managing resource access controls. The effectiveness of these approaches is demonstrated by case studies to demonstrate the validity of each technique.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Oakland University.
$b
Science.
$3
1193660
773
0
$t
Dissertation Abstracts International
$g
79-12B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10748719
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入