kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Kalogiannis, KonstantinosORCID iD iconorcid.org/0000-0002-4656-2565
Publications (4 of 4) Show all publications
Li, H., Kalogiannis, K., Hussain, A. M. & Papadimitratos, P. (2025). AttentionGuard: Transformer-based Misbehavior Detection for Secure Vehicular Platoons. In: PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025: . Paper presented at 2025 Workshop on Wireless Security and Machine Learning-WISEML, JUL 03, 2025, Arlington, VA (pp. 8-13). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>AttentionGuard: Transformer-based Misbehavior Detection for Secure Vehicular Platoons
2025 (English)In: PROCEEDINGS OF THE 2025 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2025, Association for Computing Machinery (ACM) , 2025, p. 8-13Conference paper, Published paper (Refereed)
Abstract [en]

Vehicle platooning, with vehicles traveling in close formation coordinated through Vehicle-to-Everything (V2X) communications, offers significant benefits in fuel efficiency and road utilization. However, it is vulnerable to sophisticated falsification attacks by authenticated insiders that can destabilize the formation and potentially cause catastrophic collisions. This paper addresses this challenge: misbehavior detection in vehicle platooning systems. We present AttentionGuard, a transformer-based framework for misbehavior detection that leverages the self-attention mechanism to identify anomalous patterns in mobility data. Our proposal employs a multi-head transformer-encoder to process sequential kinematic information, enabling effective differentiation between normal mobility patterns and falsification attacks across diverse platooning scenarios, including steady-state (no-maneuver) operation, join, and exit maneuvers. Our evaluation uses an extensive simulation dataset featuring various attack vectors (constant, gradual, and combined falsifications) and operational parameters (controller types, vehicle speeds, and attacker positions). Experimental results demonstrate that AttentionGuard achieves up to 0.95 F1-score in attack detection, with robust performance maintained during complex maneuvers. Notably, our system performs effectively with minimal latency (100ms decision intervals), making it suitable for real-time transportation safety applications. Comparative analysis reveals superior detection capabilities and establishes the transformer-encoder as a promising approach for securing Cooperative Intelligent Transport Systems (C-ITS) against sophisticated insider threats.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
Transformer Encoder, Anomaly Detection, Vehicular Platoons, V2X, Maneuvering
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-374032 (URN)10.1145/3733965.3733966 (DOI)001539259600003 ()979-8-4007-1531-0 (ISBN)
Conference
2025 Workshop on Wireless Security and Machine Learning-WISEML, JUL 03, 2025, Arlington, VA
Note

QC 20251216

Available from: 2025-12-16 Created: 2025-12-16 Last updated: 2025-12-16Bibliographically approved
Kalogiannis, K., Hartmann, M. & Papadimitratos, P. (2024). PRIME: Platoon Restructuring for Incident Mitigation and Exclusion. In: 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024: . Paper presented at 20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024, Paris, France, October 21-23, 2024 (pp. 172-177). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>PRIME: Platoon Restructuring for Incident Mitigation and Exclusion
2024 (English)In: 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 172-177Conference paper, Published paper (Refereed)
Abstract [en]

Platooning has shown promising results in improving transportation safety and decreasing fuel consumption. Vehicles enter these formations, to form convoys, while traveling to similar destinations. However, this implies trust in the information received by the other platoon members. Insider attackers performing falsification attacks can destabilize the platoon or cause catastrophic vehicle collisions. Detecting this type of misbehavior is not without shortcomings: benign mobility deviations can be, erroneously, flagged as misbehavior. Further, even when an attack is detected, the vehicles remain affected until the attacker is excluded from the formation. Thus, in this work, we address the need for a reliable mitigation approach. We propose a platoon restructuring scheme aiming to mitigate attacks and reduce the attacker's potential for further misbehavior. Our results, and analysis, show the feasibility of our approach, which manages to restore the formation's stability even when an attack is ongoing.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Attack Mitigation, Falsification Attacks, Platoon Restructuring, Platoon Stability, Platooning, Vehicle Exclusion
National Category
Control Engineering Computer Sciences
Identifiers
urn:nbn:se:kth:diva-358883 (URN)10.1109/WiMob61911.2024.10770319 (DOI)001429383200039 ()2-s2.0-85214704364 (Scopus ID)
Conference
20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024, Paris, France, October 21-23, 2024
Note

Part of ISBN 979-8-3503-8744-5

QC 20250124

Available from: 2025-01-23 Created: 2025-01-23 Last updated: 2025-04-01Bibliographically approved
Kalogiannis, K., Henriksson, A. & Papadimitratos, P. (2023). Vulnerability Analysis of Vehicular Coordinated Maneuvers. In: Proceedings: 8th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2023. Paper presented at 8th IEEE European Symposium on Security and Privacy, Delft, Netherlands, July 3-7, 2023 (pp. 11-20). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Vulnerability Analysis of Vehicular Coordinated Maneuvers
2023 (English)In: Proceedings: 8th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2023, Institute of Electrical and Electronics Engineers Inc. , 2023, p. 11-20Conference paper, Published paper (Refereed)
Abstract [en]

Intelligent Transport Systems (ITS) latest standardization efforts focus on a Maneuver Coordination Service (MCS), for automated vehicles to cooperatively perform maneuvers. The goal is to avoid degrading to lower levels of automation, i.e., human input for maneuvering, e.g., when an obstacle ahead needs to be avoided. MCS-equipped vehicles communicate with nearby vehicles that are possibly affected by the impending maneuver, to establish that a maneuver can safely take place. An MCS-equipped vehicle that misbehaves can be catastrophic: transmitting falsified MCS messages or preventing their reception can mislead victim vehicles into aborting a maneuver, being delayed and, worse even, collide. In this work, we investigate the robustness of existing Maneuver Coordination Protocols (MCPs) and analyze the effect of falsification and jamming attacks. Our analysis shows an increased probability for neck injuries,i.e., whiplash, and potentially more severe injuries. As a first step towards thwarting attacks targeting MCPs, we extendMCPs to take into account on-board vehicle sensors, along with MCP messaging, before committing to a maneuver. Our results demonstrate the MCP vulnerability, the improvement thanks to the sensors, and the need to further improve MCP security. We conclude with a road-map towards a resilient MCS.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Falsification Attacks, Maneuver Coordination Protocols, Maneuver Coordination Service, Smart Vehicles, Vehicular Systems, Vulnerability Analysis
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-330989 (URN)10.1109/EuroSPW59978.2023.00006 (DOI)001046699200002 ()2-s2.0-85168239888 (Scopus ID)
Conference
8th IEEE European Symposium on Security and Privacy, Delft, Netherlands, July 3-7, 2023
Note

Part of ISBN 9798350327205

QC 20231002

Available from: 2023-07-04 Created: 2023-07-04 Last updated: 2023-10-02Bibliographically approved
Kalogiannis, K., Khodaei, M., Bayaa, W. M. & Papadimitratos, P. (2022). Attack Impact and Misbehavior Detection in Vehicular Platoons. In: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22): . Paper presented at WiSeC '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 16–19, 2022, San Antonio, TX, USA. (pp. 45-59). New York, USA: ACM Digital Library
Open this publication in new window or tab >>Attack Impact and Misbehavior Detection in Vehicular Platoons
2022 (English)In: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), New York, USA: ACM Digital Library, 2022, p. 45-59Conference paper, Published paper (Refereed)
Abstract [en]

Cooperative Adaptive Cruise Control (CACC), a promising Vehicular Ad-hoc Network (VANET) application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on messages by other vehicles, to keep appropriate distances for safety. Towards deploying secure CACC, several proposals in academia and standardization leave significant questions unanswered. Thwarting adversaries is hard: cryptographic protection ensures access control (authentication and authorization) but falsified kinematic information by faulty insiders (platoon members with credentials, even the platoon leader) can cause platoon instability or vehicle crashes. Filtering out such adversarial data is challenging (computational cost and high false positive rates) but, most important, state-of-the-art misbehavior detection algorithms completely fail during platoon maneuvering. In this paper, we systematically investigate how and to what extent controllers for existing platooning applications are vulnerable, mounting a gamut of attacks, ranging from falsification attacks to jamming and collusion;  including two novel attacks during maneuvering. We show how the existing middle-join and leave processes are vulnerable to falsification or 'privilege escalation' attacks. We mitigate such vulnerabilities and enable vehicles joining and exiting from any position (middle-join and middle-exit). We propose a misbehavior detection system that achieves an F1 score of ≈87 on identifying attacks throughout the lifetime of the platoon formation, including maneuvers. Our cyberphysical simulation framework can be extended to assess any other driving automation functionality in the presence of attackers.

Place, publisher, year, edition, pages
New York, USA: ACM Digital Library, 2022
Keywords
Falsification Attacks, Connected Vehicles, Internal Adversaries, Platoon Maneuvers, Misbehavior Detection, Hidden Markov Models
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-313167 (URN)10.1145/3507657.3528552 (DOI)000927874700009 ()2-s2.0-85130797516 (Scopus ID)
Conference
WiSeC '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 16–19, 2022, San Antonio, TX, USA.
Note

Part of proceedings ISBN 978-1-4503-9216-7

QC 20220629

Available from: 2022-06-01 Created: 2022-06-01 Last updated: 2023-03-20Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-4656-2565

Search in DiVA

Show all publications