A Formal Security Assessment Framework for Cooperative Adaptive Cruise Control

For increased safety and fuel-efficiency, vehicle platoons use Cooperative Adaptive Cruise Control (CACC) where vehicles adapt their state, incl. speed and position, based on information exchanged between vehicles. Intruders, however, may carry out attacks against CACC platoons by exploiting the communication channels used to cause harm, e.g., a vehicle crash. Therefore, during design-phase, engineers should provide evidence supporting platoon security. This paper proposes a formal framework for the security verification of CACC platoons to provide such evidence based on precise mathematical models. Our vehicle platoon models support the specification of both cyber, e.g., communication protocols, and physical, e.g., speeds, position, vehicle behaviors. Moreover, we propose intruder models that are parametric on his capabilities of manipulating communication channels, i.e., message injection and blocking. Our model is implemented enabling the automated formal verification involving both platoon and intruder models. We validate our machinery with a number of attacks taken from the literature and novel attacks discovered by using our formal machinery.

[1]  Hyogon Kim,et al.  Vehicle-to-Vehicle (V2V) Message Content Plausibility Check for Platoons through Low-Power Beaconing † , 2019, Sensors.

[2]  Frank Kargl,et al.  Analyzing attacks on cooperative adaptive cruise control (CACC) , 2017, 2017 IEEE Vehicular Networking Conference (VNC).

[3]  Narciso Martí-Oliet,et al.  All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic , 2007, All About Maude.

[4]  Farhad Arbab,et al.  Soft Agents: Exploring Soft Constraints to Model Robust Adaptive Distributed Cyber-Physical Agent Systems , 2015, Software, Services, and Systems.

[5]  Theodore L. Willke,et al.  A survey of inter-vehicle communication protocols and their applications , 2009, IEEE Communications Surveys & Tutorials.

[6]  Carolyn Talcott,et al.  Formal Security Verification of Industry 4.0 Applications , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[7]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[8]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[9]  Francesca Rossi,et al.  Semiring-based constraint satisfaction and optimization , 1997, JACM.

[10]  Carolyn L. Talcott,et al.  Time, computational complexity, and probability in the analysis of distance-bounding protocols , 2017, J. Comput. Secur..

[11]  Patrizio Pelliccione,et al.  Formal Verification of the On-the-Fly Vehicle Platooning Protocol , 2016, SERENE.

[12]  Michael Fisher,et al.  Formal verification of autonomous vehicle platooning , 2016, Sci. Comput. Program..

[13]  Carolyn L. Talcott,et al.  Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders , 2016, ESORICS.

[14]  Doo-Hwan Bae,et al.  Statistical Verification Framework for Platooning System of Systems with Uncertainty , 2019, 2019 26th Asia-Pacific Software Engineering Conference (APSEC).

[15]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[16]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[17]  Fulvio Risso,et al.  Detecting Injection Attacks on Cooperative Adaptive Cruise Control , 2019, 2019 IEEE Vehicular Networking Conference (VNC).

[18]  Carolyn L. Talcott,et al.  A Framework for Analyzing Adaptive Autonomous Aerial Vehicles , 2017, SEFM Workshops.

[19]  Farhad Arbab,et al.  Formal Specification and Analysis of Robust Adaptive Distributed Cyber-Physical Systems , 2016, SFM.

[20]  Karl Henrik Johansson,et al.  Fuel-Efficient En Route Formation of Truck Platoons , 2017, IEEE Transactions on Intelligent Transportation Systems.