since the battery can deliver or does not deliver
energy, there is always a winner and a loser. In this
scenario, RICAV provides a trade-off between energy
and security. It prioritizes security if the risk is high
and prioritizes energy saving if the risk is low. In the
red energetic state, we consider a battery in the red
zone where the energy becomes very critical. In this
case, we obtain a Nash equilibrium only in the case
where the risk is very low (r=0.05) since the energy
system is not allowed to supply energy in this zone.
That means, the equilibrium probability when the risk
is low (r=0.05) is not related to the decision of the
energy management system. In this scenario RICAV
prioritizes energy saving.
5 CONCLUSION
In this work, we proposed a risk-based context-aware
security solution for the intra-electric vehicle sensor
network. This solution allows the system to preserve
energy as it adapts the security according to the risk
and the vehicular context (energy, distance to
charging station, traffic, etc). RICAV is modelled
using game theory. The game is composed of two
players: the security system and the energy
management system. The security system adapts the
security level according to the identified intrusion
risk. The energy management system provides the
energy amount required by the security system
according to the vehicle context. Simulations show
that the robustness of the system grows when the risk
decreases. Therefore, RICAV prioritizes the energy
saving process if the risk is low. It prioritizes security
if the energy is available and the risk is high or
medium. For future works, we intend to improve
RICAV by developing a trust model for the intra-EV
network intrusion risk assessment based on the
vehicle current context and its previous experience.
Indeed, considering the risk trust value could enhance
the energy saving process. For example: if the risk is
high and the trust is low, the system can ask for a low
security level improving this way the energy saving
process.
REFERENCES
Arfaoui, Amel, Ali Kribeche, Sidi Mohammed Senouci,
and Mohamed Hamdi. 2018. “Game-Based Adaptive
Risk Management in Wireless Body Area Networks.”
In 2018 14th International Wireless Communications &
Mobile Computing Conference (IWCMC), IEEE, 1087–
93.
Atlam, Hany F. et al. 2020. “Risk-Based Access Control
Model: A Systematic Literature Review.” Future
Internet 12(6): 1–23.
Corbett, Christopher et al. 2018. “Leveraging Hardware
Security to Secure Connected Vehicles.” SAE
Technical Paper Series 1: 1–12.
ETSI. 2017. “Intelligent Transport Systems (ITS); Security;
Threat, Vulnerability and Risk Analysis (TVRA).” 1:
1–88.
Fraiji, Yosra et al. 2019. “Adaptive Security for the Intra-
Electric Vehicular Wireless Networks.” 2019 15th
International Wireless Communications & Mobile
Computing Conference (IWCMC): 1215–20.
Gebrie, Mattias T, and Habtamu Abie. 2017. “Risk-Based
Adaptive Authentication for Internet of Things in Smart
Home EHealth.” In Proceedings of the 11th European
Conference on Software Architecture: Companion
Proceedings, , 102–8.
Hamdi, Mohamed, and Habtamu Abie. 2014. “Game-Based
Adaptive Security in the Internet of Things for
EHealth.” 2014 IEEE International Conference on
Communications, ICC 2014: 920–25.
Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin
Heaslip, Ryan Gerdes. 2019. “Intelligent
Transportation System Security : Networks.”
Liang, Xiannuan, and Yang Xiao. 2013. “Game Theory for
Network Security.” IEEE Communications Surveys &
Tutorials 15(1): 472–86.
Manshaei, Mohammad Hossein et al. 2013. 45 ACM
Computing Surveys Game Theory Meets Network
Security and Privacy.
Marotta, Antonio et al. 2013. “Applying the SecRAM
Methodology in a CLOUD-Based ATM Environment.”
Proceedings - 2013 International Conference on
Availability, Reliability and Security, ARES 2013
(December): 807–13.
Nie, Sen, Ling Liu, and Yuefeng Du. 2017. “Free-Fall:
Hacking Tesla from Wireless to Can Bus.” Defcon: 1–
16.
NIST. 2012. “NIST Special Publication 800-30 Revision 1
- Guide for Conducting Risk Assessments.” NIST
Special Publication (September): 95.
Pan, L et al. 2017. “Journal of Information Security and
Applications Cyber Security Attacks to Modern
Vehicular Systems.” Journal of Information Security
and Applications 36: 90–100.
Pham, Congduc, Abdallah Makhoul, and Rachid Saadi.
2011. “Risk-Based Adaptive Scheduling in Randomly
Deployed Video Sensor Networks for Critical
Surveillance Applications.” Journal of Network and
Computer Applications 34(2): 783–95.
Reinhard, Jan Peter, Marcel Kneib, Martin Ring, and Oleg
Schell. 2020. “Assessment of Current Intrusion
Detection System Concepts for Intra-Vehicle
Communication.” : 1–2.
Ruddle, Alastair, and David Ward. 2009. “Security
Requirements for Automotive On-Board Networks
Based on Dark-Side Scenarios.” (1): 138.
Sfar, Arbia Riahi, Yacine Challal, Pascal Moyal, and Enrico
Natalizio. 2019. “A Game Theoretic Approach for