hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Effects of Colluding Sybil Nodes in Message Falsification Attacks for Vehicular Platooning
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Federal University of Rio Grande do Sul, Porto Alegre, Brazil & Linköping University, Linköping, Sweden.
Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
Federal University of Rio Grande do Sul, Porto Alegre, Brazil.ORCID iD: 0000-0003-4655-8889
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).ORCID iD: 0000-0003-4894-4134
Show others and affiliations
2017 (English)In: 2017 IEEE Vehicular Networking Conference (VNC) / [ed] Onur Altintas, Claudio Casetti, Nicholas Kirsch, Renato Lo Cigno & Rui Meireles, 2017Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Platooning employs Inter-Vehicular Communication (IVC) to control a group of vehicles. It uses broadcast information such as acceleration, position, and velocity to operate a longitudinal control law. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of network communication to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. To carry out this study, we evaluate five scenarios to quantify the potential impact of such attacks, identifying how platoons behave under varying Sybil attack conditions and what are the associated safety risks. This research also presents the use of location hijacking attack. In this attack, innocent vehicles that are not part of a platoon are used as a way to create trust bond between the false identities and the physical vehicles. We demonstrate that the ability to create false identities increases the effectiveness of message falsification attacks by making them easier to deploy and harder to detect in time.

Place, publisher, year, edition, pages
2017.
Keywords [en]
Acceleration, Vehicular ad hoc networks, Authentication, Vehicles, Privacy, Safety, Road transportation
National Category
Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:hh:diva-35822DOI: 10.1109/VNC.2017.8275641ISBN: 978-1-5386-0986-6 (electronic)ISBN: 978-1-5386-0985-9 (electronic)ISBN: 978-1-5386-0987-3 (print)OAI: oai:DiVA.org:hh-35822DiVA, id: diva2:1165262
Conference
2017 IEEE Vehicular Networking Conference (VNC), Torino, Italy, November 27-29, 2017
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile CommunicationsAvailable from: 2017-12-13 Created: 2017-12-13 Last updated: 2018-03-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Boeira, FelipePignaton de Freitas, EdisonVinel, Alexey

Search in DiVA

By author/editor
Boeira, FelipePignaton de Freitas, EdisonVinel, Alexey
By organisation
Halmstad Embedded and Intelligent Systems Research (EIS)Centre for Research on Embedded Systems (CERES)
Communication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 88 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf