Security vulnerabilities of connected vehicle streams and their impact on cooperative driving

Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also illustrate how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.

[1]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[2]  Sebastian Thrun,et al.  Towards fully autonomous driving: Systems and algorithms , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[3]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[4]  Burton Rosenberg,et al.  Handbook of Financial Cryptography and Security , 2010 .

[5]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[6]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[7]  Marko Wolf,et al.  Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.

[8]  Jalel Ben-Othman,et al.  Detection of Radio Interference Attacks in VANET , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[10]  Ciarán Bryce,et al.  Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) , 2008, WISTP.

[11]  Xin Zhang,et al.  VANET alert endorsement using multi-source filters , 2010, VANET '10.

[12]  Hui Deng,et al.  Platoon management with cooperative adaptive cruise control enabled by VANET , 2015, Veh. Commun..

[13]  Mario Gerla,et al.  Congestion Attacks to Autonomous Cars Using Vehicular Botnets , 2015 .

[14]  William Whyte,et al.  A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.

[15]  Bart Van Arem,et al.  Driver and Vehicle Characteristics and Platoon and Traffic Flow Stability , 2010 .