R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego
{"title":"Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance","authors":"R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego","doi":"10.1109/NetSoft54395.2022.9844055","DOIUrl":null,"url":null,"abstract":"The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"29 9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NetSoft54395.2022.9844055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.