Abstract
In this position paper we discuss various issues related to so-called stealth attacks. We elaborate on stealth attacks in the context of three common types of wireless networks, namely ad hoc networks, hybrid networks, and sensor networks. We consider the relevance of these settings to various vehicular environments; e.g., emergency and rescue operations, military operations, and theft recovery. Along with this, we discuss adversarial models. We furthermore explore the level of threat in a set of example situations and discuss potential tools that could be used to reduce the severity of stealth attacks in these contexts.
Original language | English |
---|---|
Pages (from-to) | 1218-1222 |
Number of pages | 5 |
Journal | IEEE Vehicular Technology Conference |
Volume | 60 |
Issue number | 2 |
State | Published - 2004 |
Event | 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security - Los Angeles, CA, United States Duration: 26 Sep 2004 → 29 Sep 2004 |