LEADER 03125oam 2200541 450 001 9910437587303321 005 20190911103512.0 010 $a1-4614-9357-9 024 7 $a10.1007/978-1-4614-9357-0 035 $a(OCoLC)862577738 035 $a(MiFhGG)GVRL6XFF 035 $a(EXLCZ)993710000000024317 100 $a20130927d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity assessment in vehicular networks /$fSuguo Du, Haojin Zhu 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (xi, 49 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a1-4614-9356-0 320 $aIncludes bibliographical references and index. 327 $aIntroduction to Vehicular Networks Security -- Security Assessment via Attack Tree Model -- Attack-Defense Tree Based Security Assessment -- A VANETs Attack-Defense Game -- Modelling of Multiple Phased Attack on VANET Security. 330 $aThis book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable. 410 0$aSpringerBriefs in computer science. 606 $aVehicular ad hoc networks (Computer networks)$xSecurity measures 606 $aComputer science 606 $aData protection 606 $aData encryption (Computer science) 606 $aTelecommunication 615 0$aVehicular ad hoc networks (Computer networks)$xSecurity measures. 615 0$aComputer science. 615 0$aData protection. 615 0$aData encryption (Computer science) 615 0$aTelecommunication. 676 $a58 700 $aDu$b Suguo$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058323 702 $aZhu$b Haojin 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437587303321 996 $aSecurity Assessment in Vehicular Networks$92499239 997 $aUNINA