On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS’s reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats – attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

[1]  Ilja Radusch,et al.  Realistic simulation of vehicular communication and vehicle-2-X applications , 2008, Simutools 2008.

[2]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[3]  Al-Sakib Khan Pathan,et al.  Wireless Networks and Security, Issues, Challenges and Research Trends , 2013, Wireless Networks and Security.

[4]  S. Hausberger Emission Factors from the Model PHEM for the HBEFA Version 3 , 2009 .

[5]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[6]  Ilja Radusch,et al.  Runtime infrastructure for simulating vehicle-2-x communication scenarios , 2008, VANET '08.

[7]  Meiyuan Zhao,et al.  Security challenges for the intelligent transportation system , 2012, SecurIT '12.

[8]  G. H. Raisoni,et al.  Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET Survey on security challenges in VANET , 2013 .

[9]  Stephan Olariu,et al.  Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..

[10]  Heekuck Oh,et al.  Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks , 2014, J. Inf. Process. Syst..

[11]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[12]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[13]  Irshad Ahmed Sumra,et al.  Effects of attackers and attacks on availability requirement in vehicular network: A survey , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[14]  Maxim Raya,et al.  TraCI: an interface for coupling road traffic and network simulators , 2008, CNS '08.

[15]  Sangjin Kim,et al.  Rethinking Vehicular Communications: Merging VANET with cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[16]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[17]  Ilja Radusch,et al.  Integration of Communication Security into Advanced Simulation Environments for ITS , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[18]  Ilja Radusch,et al.  Simulation of attacks and corresponding driver behavior in vehicular ad hoc networks with VSimRTI , 2011, SimuTools.

[19]  Pino Caballero-Gil Security Issues in Vehicular Ad Hoc Networks , 2011 .

[20]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[21]  Hong Liu,et al.  A new anti-jamming strategy for VANET metrics-directed security defense , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[22]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[23]  S. Siva Sathya,et al.  A Survey on Routing Protocols and its Issues in VANET , 2011 .

[24]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[25]  Matthias Gerlach,et al.  Implementing Trusted Vehicular Communications , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[26]  Björn Schünemann,et al.  V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems , 2011, Comput. Networks.

[27]  M. A. Razzaque,et al.  Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead , 2013, Wireless Networks and Security.

[28]  Christoph Meinel,et al.  Realistic Simulation of V2X Communication Scenarios , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[29]  Dr.Irshad Ahmed Sumra,et al.  Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .

[30]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[31]  Jelena V. Misic,et al.  DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[32]  Jetzabel Maritza Serna-Olvera A trust-driven privacy architecture for vehicular ad-hoc networks , 2013 .

[33]  Halabi Hasbullah,et al.  Denial of Service (DOS) Attack and Its Possible Solutions in VANET , 2010 .

[34]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[35]  Guobin Xu,et al.  On an efficient and effective Intelligent Transportation System (ITS) using field and simulation data , 2014, Sensing Technologies + Applications.

[36]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[37]  Stefan Hausberger,et al.  Update of Emission Factors for Euro 5 and Euro 6 Vehicles for the Hbefa Version 3.2 Final Report Update of Emission Factors for Euro 5 and Euro 6 Vehicles for the Hbefa Version 3.2 Final Report Content , 2013 .

[38]  N Ntlatlapa,et al.  Towards designing energy-efficient routing protocol for wireless mesh networks , 2009 .

[39]  Liana K. Qabajeh,et al.  A scalable and secure position-based routing protocols for ad-hoc networks , 2009 .

[40]  Michel Barbeau,et al.  Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.