kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
PRIME: Platoon Restructuring for Incident Mitigation and Exclusion
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0002-4656-2565
KTH.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0002-3267-5374
2024 (English)In: 2024 20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 172-177Conference paper, Published paper (Refereed)
Abstract [en]

Platooning has shown promising results in improving transportation safety and decreasing fuel consumption. Vehicles enter these formations, to form convoys, while traveling to similar destinations. However, this implies trust in the information received by the other platoon members. Insider attackers performing falsification attacks can destabilize the platoon or cause catastrophic vehicle collisions. Detecting this type of misbehavior is not without shortcomings: benign mobility deviations can be, erroneously, flagged as misbehavior. Further, even when an attack is detected, the vehicles remain affected until the attacker is excluded from the formation. Thus, in this work, we address the need for a reliable mitigation approach. We propose a platoon restructuring scheme aiming to mitigate attacks and reduce the attacker's potential for further misbehavior. Our results, and analysis, show the feasibility of our approach, which manages to restore the formation's stability even when an attack is ongoing.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2024. p. 172-177
Keywords [en]
Attack Mitigation, Falsification Attacks, Platoon Restructuring, Platoon Stability, Platooning, Vehicle Exclusion
National Category
Control Engineering Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-358883DOI: 10.1109/WiMob61911.2024.10770319ISI: 001429383200039Scopus ID: 2-s2.0-85214704364OAI: oai:DiVA.org:kth-358883DiVA, id: diva2:1930536
Conference
20th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2024, Paris, France, October 21-23, 2024
Note

Part of ISBN 979-8-3503-8744-5

QC 20250124

Available from: 2025-01-23 Created: 2025-01-23 Last updated: 2025-04-01Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Kalogiannis, KonstantinosPapadimitratos, Panos

Search in DiVA

By author/editor
Kalogiannis, KonstantinosHartmann, MichaelPapadimitratos, Panos
By organisation
Software and Computer systems, SCSKTH
Control EngineeringComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 93 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf