48 research outputs found
Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications
of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and
faster transportation through cooperative behavior between vehicles. In CACC,
vehicles exchange information, which is relied on to partially automate
driving; however, this reliance on cooperation requires resilience against
attacks and other forms of misbehavior. In this paper, we propose a rigorous
attacker model and an evaluation framework for this resilience by quantifying
the attack impact, providing the necessary tools to compare controller
resilience and attack effectiveness simultaneously. Although there are
significant differences between the resilience of the three analyzed
controllers, we show that each can be attacked effectively and easily through
either jamming or data injection. Our results suggest a combination of
misbehavior detection and resilient control algorithms with graceful
degradation are necessary ingredients for secure and safe platoons.Comment: 8 pages (author version), 5 Figures, Accepted at 2017 IEEE Vehicular
Networking Conference (VNC
Open issues in differentiating misbehavior and anomalies for VANETs
This position paper proposes new challenges in data-centric misbehavior detection for vehicular ad-hoc networks (VANETs). In VANETs, which aim to improve safety and efficiency of road transportation by enabling communication between vehicles, an important challenge is how vehicles can be certain that messages they receive are correct. Incorrectness of messages may be caused by malicious participants, damaged sensors, delayed messages or they may be triggered by software bugs. An essential point is that due to the wide deployment in these networks, we cannot assume that all vehicles will behave correctly. This effect is stronger due to the privacy requirements, as those requirements include multiple certificates per vehicle to hide its identity. To detect these incorrect messages, the research community has developed misbehavior data-centric detection mechanisms, which attempt to recognize the messages by semantically analyzing the content. The detection of anomalous messages can be used to detect and eventually revoke the certificate of the sender, if the message was malicious. However, this approach is made difficult by rare events –such as accidents–, which are essentially anomalous messages that may trigger the detection mechanisms. The idea we wish to explore in this paper is how attack detection may be improved by also considering the detection of specific types of anomalous events, such as accidents
Misbehavior detection in vehicular ad-hoc networks
In this paper we discuss misbehavior detection for vehicular ad-hoc networks (VANETs), a special case of cyber-physical systems (CPSs). We evaluate the suitability of existing PKI approaches for insider misbehavior detection and propose a classification for novel detection schemes
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity
Protocol reverse engineering based on traffic traces infers the behavior of
unknown network protocols by analyzing observable network messages. To perform
correct deduction of message semantics or behavior analysis, accurate message
type identification is an essential first step. However, identifying message
types is particularly difficult for binary protocols, whose structural features
are hidden in their densely packed data representation. We leverage the
intrinsic structural features of binary protocols and propose an accurate
method for discriminating message types.
Our approach uses a similarity measure with continuous value range by
comparing feature vectors where vector elements correspond to the fields in a
message, rather than discrete byte values. This enables a better recognition of
structural patterns, which remain hidden when only exact value matches are
considered. We combine Hirschberg alignment with DBSCAN as cluster algorithm to
yield a novel inference mechanism. By applying novel autoconfiguration schemes,
we do not require manually configured parameters for the analysis of an unknown
protocol, as required by earlier approaches.
Results of our evaluations show that our approach has considerable advantages
in message type identification result quality and also execution performance
over previous approaches.Comment: 11 pages, 4 figures, to be published in IEEE International Conference
on Computer Communications. INFOCOM. Beijing, China, 202
Enhanced Position Verification for VANETs using Subjective Logic
The integrity of messages in vehicular ad-hoc networks has been extensively
studied by the research community, resulting in the IEEE~1609.2 standard, which
provides typical integrity guarantees. However, the correctness of message
contents is still one of the main challenges of applying dependable and secure
vehicular ad-hoc networks. One important use case is the validity of position
information contained in messages: position verification mechanisms have been
proposed in the literature to provide this functionality. A more general
approach to validate such information is by applying misbehavior detection
mechanisms. In this paper, we consider misbehavior detection by enhancing two
position verification mechanisms and fusing their results in a generalized
framework using subjective logic. We conduct extensive simulations using VEINS
to study the impact of traffic density, as well as several types of attackers
and fractions of attackers on our mechanisms. The obtained results show the
proposed framework can validate position information as effectively as existing
approaches in the literature, without tailoring the framework specifically for
this use case.Comment: 7 pages, 18 figures, corrected version of a paper submitted to 2016
IEEE 84th Vehicular Technology Conference (VTC2016-Fall): revised the way an
opinion is created with eART, and re-did the experiments (uploaded here as
correction in agreement with TPC Chairs
Misbehavior Detection in Vehicular Ad-hoc Networks
In this paper we discuss misbehavior detection for vehicular ad-hoc networks (VANETs), a special case of cyber-physical systems (CPSs). We evaluate the suitability of existing PKI approaches for insider misbehavior detection and propose a classification for novel detection schemes. Cyber-physical systems (CPSs) are digital systems that are closely embedded into the physical world with which they interact through sensors and actuators. In contrast to classical embedded systems, they often form networks with a large number of sensor or actuator devices. These devices sense information, process it in a distributed system, and then influence the physical world using actuators. Notable examples of CPS are wireless sensor networks (WSNs), smart factories, distributed eHealth systems, and VANETs. In this paper, we focus on VANETs, which are a prime example for CPS and will soon be deployed on a large scale. Vehicular ad-hoc networks (VANETs) are networks that are created by equipping vehicles with wireless transmission equipment. VANETs offer great potential to improve road safety and to provide information and entertainment applications for drivers and passengers
Short-term Changes in Health-related Quality of Life of Patients Undergoing Radical Surgery for Upper Urinary Tract Urothelial Carcinoma: Results from a Prospective Phase 2 Clinical Trial
Background and objective: The possible negative impact of radical surgery on patients’ health-related quality of life (HRQoL) plays an important role in preoperative counseling. Here, we analyzed the HRQoL of patients treated for upper urinary tract urothelial carcinoma (UTUC) in the context of a single-arm phase 2 multicenter study, in which the safety and efficacy of a single preoperative intravesical instillation with mitomycin C were investigated. Our objective was to investigate early changes in HRQoL in patients undergoing radical surgery for UTUC and identify factors associated with these outcomes. Methods: Patients with pTanyN0-1M0 UTUC were prospectively included. HRQoL was assessed using the European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire C30 (EORTC QLQ-C30) questionnaire at baseline, and at 1 and 3 mo after surgery. A linear mixed model was used to evaluate the changes in HRQoL over time and identify the variables associated with these outcomes. The clinical effect size was used to assess the clinical impact and level of perceptibility of HRQoL changes for clinicians and/or patients based on given thresholds. Key findings and limitations: Between 2017 and 2020, 186 patients were included. At baseline, 1 mo after surgery, and 3 mo after surgery, response rates were 91%, 84%, and 78%, respectively. One month after surgery, a statistically significant and clinically relevant deterioration was observed in physical, role, and social functioning, and for the included symptom scales: constipation, fatigue, and pain. An improvement in emotional functioning was observed. At 3 mo, HRQoL returned to baseline levels, except emotional functioning, which improved at 1 mo and persisted to be better than that before surgery. Age >70 yr was associated with worse physical functioning, but better social and emotional functioning. Male patients reported better emotional functioning than females. Postoperative complications were negatively associated with social functioning. Conclusions and clinical implications: UTUC patients treated with radical surgery experienced a significant, albeit temporary, decline in HRQoL. Three months following surgery, HRQoL outcomes returned to baseline levels. This information can be used to counsel UTUC patients before undergoing radical surgery and contextualize recovery after surgery. Patient summary: We investigated the changes in quality of life as reported by patients who underwent surgery for upper tract urothelial carcinoma (UTUC). We found that patients experienced a decline in quality of life 1 mo after surgery, but this was temporary, with full recovery of quality of life 3 mo after surgery. These findings can help doctors and other medical staff in counseling UTUC patients before undergoing radical surgery