A collaborative approach for improving the security of vehicular scenarios: The case of platooning

Abstract Autonomous vehicles platooning has received considerable attention in recent years, due to its potential to significantly benefit road transportation, improving traffic efficiency, enhancing road safety and reducing fuel consumption. The Vehicular ad hoc Networks and the de facto vehicular networking standard IEEE 802.11p communication protocol are key tools for the deployment of platooning applications, since the cooperation among vehicles is based on a reliable communication structure. However, vehicular networks can suffer different security threats. Indeed, in collaborative driving applications, the sudden appearance of a malicious attack can mainly compromise: (i) the correctness of data traffic flow on the vehicular network by sending malicious messages that alter the platoon formation and its coordinated motion; (ii) the safety of platooning application by altering vehicular network communication capability. In view of the fact that cyber attacks can lead to dangerous implications for the security of autonomous driving systems, it is fundamental to consider their effects on the behavior of the interconnected vehicles, and to try to limit them from the control design stage. To this aim, in this work we focus on some relevant types of malicious threats that affect the platoon safety, i.e. application layer attacks (Spoofing and Message Falsification) and network layer attacks (Denial of Service and Burst Transmission), and we propose a novel collaborative control strategy for enhancing the protection level of autonomous platoons. The control protocol is designed and validated in both analytically and experimental way, for the appraised malicious attack scenarios and for different communication topology structures. The effectiveness of the proposed strategy is shown by using PLEXE, a state of the art inter-vehicular communications and mobility simulator that includes basic building blocks for platooning. A detailed experimental analysis discloses the robustness of the proposed approach and its capabilities in reacting to the malicious attack effects.

[1]  Xinlei Zhang,et al.  Using trust model to ensure reliable data acquisition in VANETs , 2017, Ad Hoc Networks.

[2]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[3]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[4]  D. D. Perlmutter,et al.  Stability of time‐delay systems , 1972 .

[5]  Antonio Saverio Valente,et al.  Adaptive multi-agents synchronization for collaborative driving of autonomous vehicles with multiple communication delays , 2018 .

[6]  Weihua Zhuang,et al.  Mobility impact in IEEE 802.11p infrastructureless vehicular networks , 2012, Ad Hoc Networks.

[7]  Cristina Alcaraz,et al.  OCPP Protocol: Security Threats and Challenges , 2017, IEEE Transactions on Smart Grid.

[8]  Hui Deng,et al.  Platoon management with cooperative adaptive cruise control enabled by VANET , 2015, Veh. Commun..

[9]  Saneeha Ahmed,et al.  Misbehaviour detection in vehicular networks using logistic trust , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[10]  Geert J. Heijenk,et al.  Connect & Drive: design and evaluation of cooperative adaptive cruise control for congestion reduction , 2011 .

[11]  Swaroop Darbha,et al.  Intelligent Cruise Control Systems And Traffic Flow Stability , 1998 .

[12]  Pabitra Mohan Khilar,et al.  Vehicular communication: a survey , 2014 .

[13]  Xinping Guan,et al.  A comprehensive overview of cyber-physical systems: from perspective of feedback system , 2016, IEEE/CAA Journal of Automatica Sinica.

[14]  Mahmoud Al-Qutayri,et al.  Security and Privacy of Intelligent VANETs , 2010 .

[15]  Antonio Pescapè,et al.  MagNets - experiences from deploying a joint research-operational next-generation wireless access network testbed , 2007, 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities.

[16]  Le Yi Wang,et al.  Influence of information flow topology on closed-loop stability of vehicle platoon with rigid formation , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[17]  Corentin Briat,et al.  Linear Parameter-Varying and Time-Delay Systems , 2015 .

[18]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[19]  Soodeh Dadras,et al.  Vehicular Platooning in an Adversarial Environment , 2015, AsiaCCS.

[20]  Johan Löfberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .

[21]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[22]  Antonio Saverio Valente,et al.  Design, analysis and performance evaluation of a third order distributed protocol for platooning in the presence of time-varying delays and switching topologies , 2017 .

[23]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[24]  Wenwu Yu,et al.  An Overview of Recent Progress in the Study of Distributed Multi-Agent Coordination , 2012, IEEE Transactions on Industrial Informatics.

[25]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[26]  Md. Sazzad Hossain,et al.  Security Challenges And Implementation Mechanism For Vehicular Ad Hoc Network , 2013 .

[27]  Tongwen Chen,et al.  An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[28]  Azzedine Boukerche,et al.  Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems , 2008, Comput. Commun..

[29]  Florian Dotzer,et al.  VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[30]  Jim Euchner Design , 2014, Catalysis from A to Z.

[31]  Hannes Hartenstein,et al.  Designing fail-safe and traffic efficient 802.11p-based rear-end collision avoidance , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[32]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[33]  Jianqiang Wang,et al.  Stability and Scalability of Homogeneous Vehicular Platoon: Study on the Influence of Information Flow Topologies , 2016, IEEE Transactions on Intelligent Transportation Systems.

[34]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[35]  J. Hedrick,et al.  String stability of interconnected systems , 1995, Proceedings of 1995 American Control Conference - ACC'95.

[36]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[37]  Falko Dressler,et al.  Plexe: A platooning extension for Veins , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[38]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[39]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[40]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[41]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .

[42]  Emilia Fridman,et al.  Introduction to Time-Delay Systems: Analysis and Control , 2014 .

[43]  Giovanni Fiengo,et al.  A control strategy for reducing traffic waves in delayed vehicular networks , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[44]  Antonio Saverio Valente,et al.  A Consensus-Based Approach for Platooning with Intervehicular Communications and Its Validation in Realistic Scenarios , 2017, IEEE Transactions on Vehicular Technology.

[45]  F. Lewis,et al.  Leader‐following control for multiple inertial agents , 2011 .

[46]  Jean-Pierre Richard,et al.  Time-delay systems: an overview of some recent advances and open problems , 2003, Autom..

[47]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[48]  Gábor Orosz,et al.  Nonlinear dynamics of connected vehicle systems with communication delays , 2015, 2015 American Control Conference (ACC).

[49]  Vijay Laxmi,et al.  Trust Establishment Techniques in VANET , 2013, Wireless Networks and Security.

[50]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[51]  Xiaodong Lin,et al.  Security in service-oriented vehicular networks , 2009, IEEE Wirel. Commun..

[52]  Antonio Pescapè,et al.  A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks , 2017, 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).

[53]  Bruno Sinopoli,et al.  Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.

[54]  Mohammad S. Obaidat,et al.  Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.

[55]  Injoo Kim,et al.  Security issues in vehicular networks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[56]  Antonio Pescapè,et al.  Quality of service statistics over heterogeneous networks: Analysis and applications , 2008, Eur. J. Oper. Res..

[57]  Maxim Raya,et al.  Security Aspects of Inter-Vehicle Communications , 2005 .

[58]  Haojin Zhu,et al.  Secure and Safe Automated Vehicle Platooning , 2016 .

[59]  Antonio Saverio Valente,et al.  Adaptive synchronization of linear multi-agent systems with time-varying multiple delays , 2017, J. Frankl. Inst..

[60]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[61]  Ronald J. Patton,et al.  A Note on Hurwitz Stability of Matrices , 1998, Autom..

[62]  Mo-Yuen Chow,et al.  A Reputation-Based Secure Distributed Control Methodology in D-NCS , 2014, IEEE Transactions on Industrial Electronics.

[63]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[64]  Muthucumaru Maheswaran,et al.  A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[65]  Antonio Pescapè,et al.  Experimental evaluation and characterization of the magnets wireless backbone , 2006, WINTECH.

[66]  Doina Bucur,et al.  Applying time series analysis and neighbourhood voting in a decentralised approach for fault detection and classification in WSNs , 2013, SoICT.

[67]  Liang Zhou,et al.  Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..

[68]  Amit Kumar Saha,et al.  Modeling mobility for vehicular ad-hoc networks , 2004, VANET '04.

[69]  Rajesh Rajamani,et al.  Vehicle dynamics and control , 2005 .

[70]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[71]  Jianqiang Wang,et al.  An overview of vehicular platoon control under the four-component framework , 2015, 2015 IEEE Intelligent Vehicles Symposium (IV).

[72]  Mario Gerla,et al.  Congestion Attacks to Autonomous Cars Using Vehicular Botnets , 2015 .

[73]  Mikael Asplund Poster: Securing vehicular platoon membership , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[74]  Arun Somani,et al.  Distributed fault detection of wireless sensor networks , 2006, DIWANS '06.

[75]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[76]  S. Solyom,et al.  All aboard the robotic road train , 2012, IEEE Spectrum.

[77]  K. Stromberg Introduction to classical real analysis , 1981 .

[78]  Urbano Nunes,et al.  Multiplatooning Leaders Positioning and Cooperative Behavior Algorithms of Communicant Automated Vehicles for High Traffic Capacity , 2015, IEEE Transactions on Intelligent Transportation Systems.

[79]  Albin Severinson,et al.  Design and Experimental Validation of a Cooperative Driving Control Architecture for the Grand Cooperative Driving Challenge 2016 , 2018, IEEE Transactions on Intelligent Transportation Systems.

[80]  Juan-Carlos Cano,et al.  T-VNets: A novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS , 2016, Comput. Commun..

[81]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[82]  Emilia Fridman,et al.  Exponential stability of linear distributed parameter systems with time-varying delays , 2009, Autom..

[83]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[84]  Steven Lake Waslander,et al.  MPC based collaborative adaptive cruise control with rear end collision avoidance , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.