105 research outputs found

    Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)

    Full text link
    Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.Comment: 8 pages (author version), 5 Figures, Accepted at 2017 IEEE Vehicular Networking Conference (VNC

    Digital forensics model of smart city automated vehicles challenges

    Get PDF
    The current cyber society is full of complications. Internet has brought so many convenient services to our society but Internet is also a mine field. Mass surveillance from smart phone to PC, from automated car to smart television, any online device seems could be turn to privacy breach toolkit. In order to protect privacy data, including PII, against Cyberstalking and other cybercrimes, a Digital Forensics Model is in progress served for Smart City Automated Vehicles. The proposed development is still on going. Here, an update is reported for discussions

    ATHENA : a pagerank-based scheme to solve the thundering herd in authentication

    Get PDF
    Vehicles in intelligent transport systems (ITS) react to an emergency situation by broadcasting critical messages like Decentralized Environmental Notification Messages (DENMs). A digital signature is attached to each message to secure the integrity of communication, and this message is inoperative until the authentication completes. This creates a challenge for vehicles to verify massive messages in some scenarios where it could incur the thundering herd in authentication, if there is a critical situation happening in heavy road traffic. To address this problem, we propose ATHENA, a pagerank-based scheme to solve the thundering herd in ITS authentication that utilises the transmission of messages and pagerank algorithm to rank the broadcasting vehicles. Simulation results show the efficiency of ATHENA and the effectiveness of performance enhancements compared with others
    • …
    corecore