Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Computational Security for Context-Awareness in Vehicular Ad-Hoc Networks

Full metadata record
DC Field Value Language
dc.contributor.authorTian, Xiao-Yang-
dc.contributor.authorLiu, yan-
dc.contributor.authorWang, Jian-
dc.contributor.authorDeng, Wei-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-22T18:28:56Z-
dc.date.available2021-06-22T18:28:56Z-
dc.date.created2021-01-21-
dc.date.issued2016-08-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/16090-
dc.description.abstractVehicular ad hoc networks can be viewed as a typical context-aware system where the experienced context frequently varies as vehicles move along road, e.g., signal-to-noise ratio (SNR), velocity, and traffic flow. In particular, the adopted security protection mechanisms often depend on the node state, location, and/or surrounding risk, which need the capability of context-aware security quantification. This paper views the security level as a user's inherent property that is only correlated with the user's behaviours and the situated context and independent of the suffered attack ways. We propose a formalized methodology to especially quantify the security level in real time from the perspective of state transition probability through estimating the stable probability of staying in the security state in inhomogeneous continuous time Markov chain. This paradigm enables users to customize the security protection mechanisms for adapting to the frequently varying context. We conduct the extensive numerical calculations and empirical analysis to comprehensively investigate the response of the proposed security quantification framework to the various combinations of the concerned parameters, e.g., SNR, velocity, and traffic flow. The results show that the proposed framework is capable of capturing the real-time security level adaptively to the vehicular context and provides a dependable decision basis to security protection, which can restrict the security to a target value.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleComputational Security for Context-Awareness in Vehicular Ad-Hoc Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorOh, Heekuck-
dc.identifier.doi10.1109/ACCESS.2016.2598155-
dc.identifier.scopusid2-s2.0-84991490321-
dc.identifier.wosid000401709000001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.4, pp.5268 - 5279-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume4-
dc.citation.startPage5268-
dc.citation.endPage5279-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusVANET SECURITY-
dc.subject.keywordPlusCHALLENGES-
dc.subject.keywordPlusMANAGEMENT-
dc.subject.keywordPlusTRUST-
dc.subject.keywordPlusART-
dc.subject.keywordAuthorVehicular ad-hoc networks-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorMarkov process-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7534771-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE