Although vehicle platooning promises to improve transportation efficiency and safety by leveraging communication between convoy members, preliminary results in previous work suggest that cyber-attacks could deceive many Cooperative Adaptive Cruise Control algorithms, hence endangering the safety of every participant. This paper deeply analyzes the case of injection attacks. First, we introduce an extensive security analysis carried out through realistic simulations, to demonstrate how even slight and smooth falsification attacks do succeed in fooling the CACC controllers and cause numerous vehicle crashes. Second, we present a novel misbehavior detection technique. It leverages the correlation between multiple motion parameters concerning both single and consecutive vehicles to evaluate the plausibility of the information received from the other members. Extensive validation confirms the effectiveness of the technique proposed: overall, it succeeds to detect all the attacks simulated and prevents the occurrence of safety-critical situations.
Detecting Injection Attacks on Cooperative Adaptive Cruise Control / Iorio, Marco; Risso, FULVIO GIOVANNI OTTAVIO; Sisto, Riccardo; Buttiglieri, Alberto; Reineri, Massimo. - ELETTRONICO. - (2019), pp. 75-82. (Intervento presentato al convegno 2019 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2019) tenutosi a Los Angeles (USA) nel 4-6 Dicembre 2019) [10.1109/VNC48660.2019.9062798].
Detecting Injection Attacks on Cooperative Adaptive Cruise Control
Marco Iorio;Fulvio Risso;Riccardo Sisto;
2019
Abstract
Although vehicle platooning promises to improve transportation efficiency and safety by leveraging communication between convoy members, preliminary results in previous work suggest that cyber-attacks could deceive many Cooperative Adaptive Cruise Control algorithms, hence endangering the safety of every participant. This paper deeply analyzes the case of injection attacks. First, we introduce an extensive security analysis carried out through realistic simulations, to demonstrate how even slight and smooth falsification attacks do succeed in fooling the CACC controllers and cause numerous vehicle crashes. Second, we present a novel misbehavior detection technique. It leverages the correlation between multiple motion parameters concerning both single and consecutive vehicles to evaluate the plausibility of the information received from the other members. Extensive validation confirms the effectiveness of the technique proposed: overall, it succeeds to detect all the attacks simulated and prevents the occurrence of safety-critical situations.File | Dimensione | Formato | |
---|---|---|---|
1570593848.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
311.83 kB
Formato
Adobe PDF
|
311.83 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
1570593848.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
259.14 kB
Formato
Adobe PDF
|
259.14 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2784632