kth.sePublikationer KTH
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Attack Impact and Misbehavior Detection in Vehicular Platoons
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. (Networked Systems Security Group)ORCID-id: 0000-0002-4656-2565
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. (Networked Systems Security Group)ORCID-id: 0000-0003-1778-1416
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. (Networked Systems Security Group)ORCID-id: 0000-0003-2279-9792
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. (Networked Systems Security Group)ORCID-id: 0000-0002-3267-5374
2022 (Engelska)Ingår i: Proceedings of the 15th ACMConference on Security and Privacy in Wireless and Mobile Networks (WiSec’22), New York, USA: ACM Digital Library, 2022, s. 45-59Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Cooperative Adaptive Cruise Control (CACC), a promising Vehicular Ad-hoc Network (VANET) application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on messages by other vehicles, to keep appropriate distances for safety. Towards deploying secure CACC, several proposals in academia and standardization leave significant questions unanswered. Thwarting adversaries is hard: cryptographic protection ensures access control (authentication and authorization) but falsified kinematic information by faulty insiders (platoon members with credentials, even the platoon leader) can cause platoon instability or vehicle crashes. Filtering out such adversarial data is challenging (computational cost and high false positive rates) but, most important, state-of-the-art misbehavior detection algorithms completely fail during platoon maneuvering. In this paper, we systematically investigate how and to what extent controllers for existing platooning applications are vulnerable, mounting a gamut of attacks, ranging from falsification attacks to jamming and collusion;  including two novel attacks during maneuvering. We show how the existing middle-join and leave processes are vulnerable to falsification or 'privilege escalation' attacks. We mitigate such vulnerabilities and enable vehicles joining and exiting from any position (middle-join and middle-exit). We propose a misbehavior detection system that achieves an F1 score of ≈87 on identifying attacks throughout the lifetime of the platoon formation, including maneuvers. Our cyberphysical simulation framework can be extended to assess any other driving automation functionality in the presence of attackers.

Ort, förlag, år, upplaga, sidor
New York, USA: ACM Digital Library, 2022. s. 45-59
Nyckelord [en]
Falsification Attacks, Connected Vehicles, Internal Adversaries, Platoon Maneuvers, Misbehavior Detection, Hidden Markov Models
Nationell ämneskategori
Datorsystem
Forskningsämne
Datalogi
Identifikatorer
URN: urn:nbn:se:kth:diva-313167DOI: 10.1145/3507657.3528552ISI: 000927874700009Scopus ID: 2-s2.0-85130797516OAI: oai:DiVA.org:kth-313167DiVA, id: diva2:1662719
Konferens
WiSeC '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, May 16–19, 2022, San Antonio, TX, USA.
Anmärkning

Part of proceedings ISBN 978-1-4503-9216-7

QC 20220629

Tillgänglig från: 2022-06-01 Skapad: 2022-06-01 Senast uppdaterad: 2023-03-20Bibliografiskt granskad

Open Access i DiVA

attack_impact_and_detection_in_platooning(1792 kB)369 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 1792 kBChecksumma SHA-512
5d9cf1ec9788c7b4a7fe8459ee294b999c25aed768a91c1164e65d511a8740f06bc319cd009410a3652e9bbe412b1d5a6f52842eaad3e3be63003a3eb424103e
Typ fulltextMimetyp application/pdf

Övriga länkar

Förlagets fulltextScopus

Person

Kalogiannis, KonstantinosKhodaei, MohammadBayaa, Weaam Mostafa Nemr MohamedPapadimitratos, Panagiotis

Sök vidare i DiVA

Av författaren/redaktören
Kalogiannis, KonstantinosKhodaei, MohammadBayaa, Weaam Mostafa Nemr MohamedPapadimitratos, Panagiotis
Av organisationen
Programvaruteknik och datorsystem, SCS
Datorsystem

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 369 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 423 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf