Stealth attacks in vehicular technologies

Markus Jakobsson, Xiaofeng Wang, Susanne Wetzel

Research output: Contribution to journalConference articlepeer-review

6 Scopus citations

Abstract

In this position paper we discuss various issues related to so-called stealth attacks. We elaborate on stealth attacks in the context of three common types of wireless networks, namely ad hoc networks, hybrid networks, and sensor networks. We consider the relevance of these settings to various vehicular environments; e.g., emergency and rescue operations, military operations, and theft recovery. Along with this, we discuss adversarial models. We furthermore explore the level of threat in a set of example situations and discuss potential tools that could be used to reduce the severity of stealth attacks in these contexts.

Original languageEnglish
Pages (from-to)1218-1222
Number of pages5
JournalIEEE Vehicular Technology Conference
Volume60
Issue number2
StatePublished - 2004
Event2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security - Los Angeles, CA, United States
Duration: 26 Sep 200429 Sep 2004

Fingerprint

Dive into the research topics of 'Stealth attacks in vehicular technologies'. Together they form a unique fingerprint.

Cite this