Connected vehicles promise to enable a wide range of new automotive services that will improve road safety, ease traffic management, and make the overall travel experience more enjoyable. However, they also open significant new surfaces for attacks on the electronics that control most of modern vehicle operations. In particular, the emergence of vehicle-to-vehicle (V2V) communication risks to lay fertile ground for self-propagating mobile malware that targets automobile environments. In this work, we perform a first study on the dynamics of vehicular malware epidemics in a large-scale road network, and unveil how a reasonably fast worm can easily infect thousands of vehicles in minutes. We determine how such dynamics are affected by a numbe...
Epidemic or gossip-based algorithms have been proposed for data dissemination in vehicular networks....
Part of the wider development and monitoring of smart environments for an intelligent cities approac...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...
Abstract—Connected vehicles promise to enable a wide range of new automotive services that will impr...
The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to significant...
Abstract—The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to si...
Network attacking using malware has become very popular on the Internet and in many other networks, ...
VANETs are the essential component of the intelligent transport system, which attract research and i...
The propagation of software viruses over a vehicular network where vehicles communicate via V2V link...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
In this study we developed a macroscopic model for simulating the vehicle to vehicle communication p...
The increased interest in autonomous vehicles has led to the development of novel networking protoco...
Abstract—The increasing popularity and acceptance of VANETs will make the deployment of autonomous v...
Mobility can be exploited to spread malware among wireless nodes moving across network domains. Beca...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Epidemic or gossip-based algorithms have been proposed for data dissemination in vehicular networks....
Part of the wider development and monitoring of smart environments for an intelligent cities approac...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...
Abstract—Connected vehicles promise to enable a wide range of new automotive services that will impr...
The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to significant...
Abstract—The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to si...
Network attacking using malware has become very popular on the Internet and in many other networks, ...
VANETs are the essential component of the intelligent transport system, which attract research and i...
The propagation of software viruses over a vehicular network where vehicles communicate via V2V link...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
In this study we developed a macroscopic model for simulating the vehicle to vehicle communication p...
The increased interest in autonomous vehicles has led to the development of novel networking protoco...
Abstract—The increasing popularity and acceptance of VANETs will make the deployment of autonomous v...
Mobility can be exploited to spread malware among wireless nodes moving across network domains. Beca...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Epidemic or gossip-based algorithms have been proposed for data dissemination in vehicular networks....
Part of the wider development and monitoring of smart environments for an intelligent cities approac...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...