Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving

被引:300
作者
Amoozadeh, Mani [1 ]
Raghuramu, Arun [2 ]
Chuah, Chen-Nee [3 ]
Ghosal, Dipak [4 ]
Zhang, H. Michael [5 ]
Rowe, Jeff [6 ]
Levitt, Karl [2 ]
机构
[1] Univ Calif Davis, ECE Dept, Davis, CA 95616 USA
[2] Univ Calif Davis, Comp Sci, Davis, CA 95616 USA
[3] Univ Calif Davis, Elect & Comp Engn, Davis, CA 95616 USA
[4] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[5] Univ Calif Davis, Dept Civil & Environm Engn, Davis, CA 95616 USA
[6] Univ Calif Davis, Davis, CA 95616 USA
基金
美国国家科学基金会;
关键词
Control system synthesis - Real time systems - Communication channels (information theory) - Maneuverability - Vehicle to vehicle communications;
D O I
10.1109/MCOM.2015.7120028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also illustrate how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.
引用
收藏
页码:126 / 132
页数:7
相关论文
共 15 条
[1]  
Amoozadeh M., 2015, Vehic. Commun. J
[2]  
[Anonymous], HDB FINANCIAL CRYPTO
[3]  
[Anonymous], P INF SEC CRYPT 11
[4]  
Blum J., 2004, IT Professional, V6, P24, DOI 10.1109/MITP.2004.1265539
[5]   VANET security surveys [J].
Engoulou, Richard Gilles ;
Bellaiche, Martine ;
Pierre, Samuel ;
Quintero, Alejandro .
COMPUTER COMMUNICATIONS, 2014, 44 :1-13
[6]  
Garip M.T., 2015, Congestion attacks to autonomous cars using vehicular botnets
[7]  
Golle P., 2004, P 1 ACM INT WORKSH V, P29
[8]  
Guettel G, 2008, LECT NOTES COMPUT SC, V5019, P106, DOI 10.1007/978-3-540-79966-5_8
[9]  
Hamieh A., 2009, PROC IEEE GLOBECOM 0, P1
[10]  
Kim T.H.-J., 2010, P 7 ACM INT WORKSHOP, P51