@inproceedings{7cfe8a5360b04050a0f79e6c6c538fff,
title = "Analysis and comparison of secure localization schemes for intelligent transportation systems",
abstract = "In this work, we employ distance bounding (DB) and verifiable trilateration (VT) for secure localization in an intelligent transportation system (ITS). We first demonstrate several possible attack scenarios, and then establish an analytical framework to evaluate the security of these schemes. Results are derived in terms of the probability of a given position being spoofed by maliciously-controlled vehicles assuming randomly distributed colluding attackers. The results show that while VT outperforms DB, both methods have a high probability of being spoofed. Copyright is held by the author/owner(s).",
keywords = "Intelligent transportation systems, Secure localization",
author = "Bhaswati Deka and Ryan Gerdes and Ming Li and Kevin Heaslip",
year = "2014",
month = nov,
day = "3",
doi = "10.1145/2660267.2662364",
language = "English (US)",
isbn = "9781450329576",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",
pages = "1424--1426",
booktitle = "Proceedings of the ACM Conference on Computer and Communications Security",
note = "21st ACM Conference on Computer and Communications Security, CCS 2014 ; Conference date: 03-11-2014 Through 07-11-2014",
}