48 research outputs found

    Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)

    Full text link
    Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.Comment: 8 pages (author version), 5 Figures, Accepted at 2017 IEEE Vehicular Networking Conference (VNC

    Open issues in differentiating misbehavior and anomalies for VANETs

    Get PDF
    This position paper proposes new challenges in data-centric misbehavior detection for vehicular ad-hoc networks (VANETs). In VANETs, which aim to improve safety and efficiency of road transportation by enabling communication between vehicles, an important challenge is how vehicles can be certain that messages they receive are correct. Incorrectness of messages may be caused by malicious participants, damaged sensors, delayed messages or they may be triggered by software bugs. An essential point is that due to the wide deployment in these networks, we cannot assume that all vehicles will behave correctly. This effect is stronger due to the privacy requirements, as those requirements include multiple certificates per vehicle to hide its identity. To detect these incorrect messages, the research community has developed misbehavior data-centric detection mechanisms, which attempt to recognize the messages by semantically analyzing the content. The detection of anomalous messages can be used to detect and eventually revoke the certificate of the sender, if the message was malicious. However, this approach is made difficult by rare events –such as accidents–, which are essentially anomalous messages that may trigger the detection mechanisms. The idea we wish to explore in this paper is how attack detection may be improved by also considering the detection of specific types of anomalous events, such as accidents

    Misbehavior detection in vehicular ad-hoc networks

    Get PDF
    In this paper we discuss misbehavior detection for vehicular ad-hoc networks (VANETs), a special case of cyber-physical systems (CPSs). We evaluate the suitability of existing PKI approaches for insider misbehavior detection and propose a classification for novel detection schemes

    Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

    Full text link
    Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages. To perform correct deduction of message semantics or behavior analysis, accurate message type identification is an essential first step. However, identifying message types is particularly difficult for binary protocols, whose structural features are hidden in their densely packed data representation. We leverage the intrinsic structural features of binary protocols and propose an accurate method for discriminating message types. Our approach uses a similarity measure with continuous value range by comparing feature vectors where vector elements correspond to the fields in a message, rather than discrete byte values. This enables a better recognition of structural patterns, which remain hidden when only exact value matches are considered. We combine Hirschberg alignment with DBSCAN as cluster algorithm to yield a novel inference mechanism. By applying novel autoconfiguration schemes, we do not require manually configured parameters for the analysis of an unknown protocol, as required by earlier approaches. Results of our evaluations show that our approach has considerable advantages in message type identification result quality and also execution performance over previous approaches.Comment: 11 pages, 4 figures, to be published in IEEE International Conference on Computer Communications. INFOCOM. Beijing, China, 202

    Enhanced Position Verification for VANETs using Subjective Logic

    Full text link
    The integrity of messages in vehicular ad-hoc networks has been extensively studied by the research community, resulting in the IEEE~1609.2 standard, which provides typical integrity guarantees. However, the correctness of message contents is still one of the main challenges of applying dependable and secure vehicular ad-hoc networks. One important use case is the validity of position information contained in messages: position verification mechanisms have been proposed in the literature to provide this functionality. A more general approach to validate such information is by applying misbehavior detection mechanisms. In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic. We conduct extensive simulations using VEINS to study the impact of traffic density, as well as several types of attackers and fractions of attackers on our mechanisms. The obtained results show the proposed framework can validate position information as effectively as existing approaches in the literature, without tailoring the framework specifically for this use case.Comment: 7 pages, 18 figures, corrected version of a paper submitted to 2016 IEEE 84th Vehicular Technology Conference (VTC2016-Fall): revised the way an opinion is created with eART, and re-did the experiments (uploaded here as correction in agreement with TPC Chairs

    Misbehavior Detection in Vehicular Ad-hoc Networks

    Get PDF
    In this paper we discuss misbehavior detection for vehicular ad-hoc networks (VANETs), a special case of cyber-physical systems (CPSs). We evaluate the suitability of existing PKI approaches for insider misbehavior detection and propose a classification for novel detection schemes. Cyber-physical systems (CPSs) are digital systems that are closely embedded into the physical world with which they interact through sensors and actuators. In contrast to classical embedded systems, they often form networks with a large number of sensor or actuator devices. These devices sense information, process it in a distributed system, and then influence the physical world using actuators. Notable examples of CPS are wireless sensor networks (WSNs), smart factories, distributed eHealth systems, and VANETs. In this paper, we focus on VANETs, which are a prime example for CPS and will soon be deployed on a large scale. Vehicular ad-hoc networks (VANETs) are networks that are created by equipping vehicles with wireless transmission equipment. VANETs offer great potential to improve road safety and to provide information and entertainment applications for drivers and passengers

    Short-term Changes in Health-related Quality of Life of Patients Undergoing Radical Surgery for Upper Urinary Tract Urothelial Carcinoma: Results from a Prospective Phase 2 Clinical Trial

    Get PDF
    Background and objective: The possible negative impact of radical surgery on patients’ health-related quality of life (HRQoL) plays an important role in preoperative counseling. Here, we analyzed the HRQoL of patients treated for upper urinary tract urothelial carcinoma (UTUC) in the context of a single-arm phase 2 multicenter study, in which the safety and efficacy of a single preoperative intravesical instillation with mitomycin C were investigated. Our objective was to investigate early changes in HRQoL in patients undergoing radical surgery for UTUC and identify factors associated with these outcomes. Methods: Patients with pTanyN0-1M0 UTUC were prospectively included. HRQoL was assessed using the European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire C30 (EORTC QLQ-C30) questionnaire at baseline, and at 1 and 3 mo after surgery. A linear mixed model was used to evaluate the changes in HRQoL over time and identify the variables associated with these outcomes. The clinical effect size was used to assess the clinical impact and level of perceptibility of HRQoL changes for clinicians and/or patients based on given thresholds. Key findings and limitations: Between 2017 and 2020, 186 patients were included. At baseline, 1 mo after surgery, and 3 mo after surgery, response rates were 91%, 84%, and 78%, respectively. One month after surgery, a statistically significant and clinically relevant deterioration was observed in physical, role, and social functioning, and for the included symptom scales: constipation, fatigue, and pain. An improvement in emotional functioning was observed. At 3 mo, HRQoL returned to baseline levels, except emotional functioning, which improved at 1 mo and persisted to be better than that before surgery. Age >70 yr was associated with worse physical functioning, but better social and emotional functioning. Male patients reported better emotional functioning than females. Postoperative complications were negatively associated with social functioning. Conclusions and clinical implications: UTUC patients treated with radical surgery experienced a significant, albeit temporary, decline in HRQoL. Three months following surgery, HRQoL outcomes returned to baseline levels. This information can be used to counsel UTUC patients before undergoing radical surgery and contextualize recovery after surgery. Patient summary: We investigated the changes in quality of life as reported by patients who underwent surgery for upper tract urothelial carcinoma (UTUC). We found that patients experienced a decline in quality of life 1 mo after surgery, but this was temporary, with full recovery of quality of life 3 mo after surgery. These findings can help doctors and other medical staff in counseling UTUC patients before undergoing radical surgery
    corecore