Application level attacks on Connected Vehicle Protocols

Connected vehicles (CV) applications are an emerging new technology that promises to revolutionize transportation systems. CV applications can improve safety, efficiency, and capacity of transportation systems while reducing their environmental footprints. A large number of CV applications have been proposed towards these goals, with the US Department of Transportation (US DOT) recently initiating three deployment sites. Unfortunately, the security of these protocols has not been considered carefully, and due to the fact that they affect the control of vehicles, vulnerabilities can lead to breakdowns in safety (causing accidents), performance (causing congestion and reducing capacity), or fairness (vehicles cheating the intersection management system). In this paper, we perform a detailed analysis of a recently published CV-based application protocol, Cooperative Adaptive Cruise Control (CACC), and use this analysis to classify the types of vulnerabilities that occur in the context of connected Cyber-physical systems such as CV. We show using simulations that these attacks can be extremely dangerous: we illustrate attacks that cause crashes or stall emergency vehicles. We also carry out a more systematic analysis of the impact of the attacks showing that even an individual attacker can have substantial effects on traffic flow and safety even in the presence of message security standard developed by US DOT. We believe that these attacks can be carried over to other CV applications if they are not carefully designed. The paper also explores a defense framework to mitigate these classes of vulnerabilities in CV applications.

[1]  Wei Huang,et al.  Automatic multi-vehicle tracking using video cameras: An improved CAMShift approach , 2013 .

[2]  Ryan M. Eustice,et al.  Risk Assessment for Cooperative Automated Driving , 2016, CPS-SPC '16.

[3]  Hui Deng,et al.  Platoon management with cooperative adaptive cruise control enabled by VANET , 2015, Veh. Commun..

[4]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[5]  Frank Perry,et al.  Dedicated Short Range Communications Roadside Unit Specifications , 2017 .

[6]  Mike Lukuc,et al.  Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .

[7]  M M Minderhoud,et al.  Extended time-to-collision measures for road traffic safety assessment. , 2001, Accident; analysis and prevention.

[8]  Tang-Hsien Chang,et al.  Traffic Monitoring and Vehicle Tracking using Roadside Cameras , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[9]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[10]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[11]  M. Barth,et al.  Intelligent Transportation Systems and Greenhouse Gas Reductions , 2015, Current Sustainable/Renewable Energy Reports.

[12]  Yiheng Feng,et al.  Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.