SwePub
Sök i LIBRIS databas

  Utökad sökning

id:"swepub:oai:DiVA.org:kth-313167"
 

Sökning: id:"swepub:oai:DiVA.org:kth-313167" > Attack Impact and M...

Attack Impact and Misbehavior Detection in Vehicular Platoons

Kalogiannis, Konstantinos (författare)
KTH,Programvaruteknik och datorsystem, SCS,Networked Systems Security Group
Khodaei, Mohammad (författare)
KTH,Programvaruteknik och datorsystem, SCS,Networked Systems Security Group
Bayaa, Weaam Mostafa Nemr Mohamed (författare)
KTH,Programvaruteknik och datorsystem, SCS,Networked Systems Security Group
visa fler...
Papadimitratos, Panagiotis (författare)
KTH,Programvaruteknik och datorsystem, SCS,Networked Systems Security Group
visa färre...
 (creator_code:org_t)
2022-05-16
2022
Engelska.
Ingår i: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22). - New York, USA : ACM Digital Library. ; , s. 45-59
  • Konferensbidrag (refereegranskat)
Abstract Ämnesord
Stäng  
  • Cooperative Adaptive Cruise Control (CACC), a promising Vehicular Ad-hoc Network (VANET) application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on messages by other vehicles, to keep appropriate distances for safety. Towards deploying secure CACC, several proposals in academia and standardization leave significant questions unanswered. Thwarting adversaries is hard: cryptographic protection ensures access control (authentication and authorization) but falsified kinematic information by faulty insiders (platoon members with credentials, even the platoon leader) can cause platoon instability or vehicle crashes. Filtering out such adversarial data is challenging (computational cost and high false positive rates) but, most important, state-of-the-art misbehavior detection algorithms completely fail during platoon maneuvering. In this paper, we systematically investigate how and to what extent controllers for existing platooning applications are vulnerable, mounting a gamut of attacks, ranging from falsification attacks to jamming and collusion;  including two novel attacks during maneuvering. We show how the existing middle-join and leave processes are vulnerable to falsification or 'privilege escalation' attacks. We mitigate such vulnerabilities and enable vehicles joining and exiting from any position (middle-join and middle-exit). We propose a misbehavior detection system that achieves an F1 score of ≈87 on identifying attacks throughout the lifetime of the platoon formation, including maneuvers. Our cyberphysical simulation framework can be extended to assess any other driving automation functionality in the presence of attackers.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)

Nyckelord

Falsification Attacks
Connected Vehicles
Internal Adversaries
Platoon Maneuvers
Misbehavior Detection
Hidden Markov Models
Datalogi
Computer Science

Publikations- och innehållstyp

ref (ämneskategori)
kon (ämneskategori)

Till lärosätets databas

Hitta mer i SwePub

Av författaren/redakt...
Kalogiannis, Kon ...
Khodaei, Mohamma ...
Bayaa, Weaam Mos ...
Papadimitratos, ...
Om ämnet
TEKNIK OCH TEKNOLOGIER
TEKNIK OCH TEKNO ...
och Elektroteknik oc ...
och Datorsystem
Artiklar i publikationen
Av lärosätet
Kungliga Tekniska Högskolan

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy