IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 5    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 5,May 2012
Ant Colony Optimization To Enhance Game Theoretic Approach For Vanet Security
Full Text(PDF, )  PP.796-801  
Author(s)
Prabhakar M, Dr. J.N. Singh, Dr. Mahadevan
KEYWORDS
VANET security, Game theory, Ant Colony Optimization
ABSTRACT
With promising features, VANET is potentially used in extensive variety of applications. In the current vehicular communication VANETs security properties have established more awareness in research community. Prescribed and quantitative decision structure for VANET security wants to address the issues of Attack modeling, Optimization of response actions, Allocation of defense resources which may benefit. Game theory approaches address these problems as its features are able to handle VANET security.
References
[1] A. Aijaz, B. Bochow, F. Dtzer, A. Festag, M. Gerlach, R. Kroh and T. Leinmuller, ”Attacks on Inter-Vehicle Communication Systems – An Analysis” in Proceedings of the 3rd International Workshop on Intelligent Transportation (WIT 2006), March 2006

[2] B. Parno and A. Perrig, ”Challenges in Securing Vehicular Networks,” in Proceedings of the Workshop on Hot Topics in Networks (HotNets-IV), 2005

[3] G. Marfia, G. Pau, E. Giordano, E. De Sena, and M. Gerla, “Vanet: On Mobility Scenarios and Urban Infrastructure. A Case Study,” Proc. 2007 Mobile Networking Vehicular Environments, 2007.

[4] J. Grossklags, N. Christin, and J. Chuang, “Secure or Insure? A Game-Theoretic Analysis of Information Security Games,” Proc. 17th Int’l Conf. World Wide Web (WWW ’08), pp. 209-218, 2008.

[5] J. Grossklags, N. Christin, and J. Chuang, “Predicted and Observed User Behavior in the Weakest-Link Security Game,” Proc. First Conf. Usability, Psychology, and Security (UPSEC ’08), pp. 1-6, 2008.

[6] M. Backes and T. Gross ”Tailoring the DolevYao abstraction to web services realities - a comprehensive wish list” Proceedings of SWS’05, Nov. 2005

[7] M. Raya, A. Aziz, and J.-P. Hubaux. Efficient secure aggregation in VANETs. In VANET ’06: Proceedings of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks, pages 67–75, Sept. 2006.

[8] Marco Dorigoa,Christian Blum, “Ant colony optimization theory: A survey”, Theoretical Computer Science 344 (2005) 243 – 278

[9] R. Pucella and J. Y. Halpern, ”Modeling adversaries in a logic for security protocol analysis,” Proceedings of Formal Aspects of Security, 2003

[10] T. Basar and G.J. Olsder, Dynamic Non cooperative Game Theory, second ed. SIAM, 1999.

[11] Tansu Alpcan, and Sonja Buchegger, “Security Games for Vehicular Networks”, IEEE transactions on mobile computing,vol.10,no. 2, Feb 2011.

[12] U. Brandes. On variants of shortest-path betweenness centrality and their generic computation. Social Networks, 2008.

[13] Y. Do, S. Buchegger, T. Alpcan, and J.-P. Hubaux, “Centrality Analysis in Vehicular Ad-Hoc Networks,” technical report, EPFL/ T-Labs, 2008.

Untitled Page