Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275607
T. Berisha, C. Mecklenbräuker
The recent developments in automotive industry are tending to satisfy the mobile users' demands for low delay and high bandwidth data to current and future cellular networks. To fulfil the needs of mobile users on mobility, the proper design of wireless communication is necessary. The design of wireless links without prior knowledge of obstructions, base station locations, and cell load is not realistic and challenging. To address this issue we implement realistic Line of Sight (LOS)/Non-Line of Sight (NLOS) urban maps and conduct field measurements in Long Term Evolution (LTE) 1800 MHz live network. The campaign is supported by knowing crucial information such as base station locations. The field measurements are carried out on-board of a commercial small vehicle which causes up to 3.9 dB penetration loss. The focus of this paper is on performance evaluation of diversity and multiplexing by Rank Indicators (RIs).
{"title":"2D LOS/NLOS urban maps and LTE MIMO performance evaluation for vehicular use cases","authors":"T. Berisha, C. Mecklenbräuker","doi":"10.1109/VNC.2017.8275607","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275607","url":null,"abstract":"The recent developments in automotive industry are tending to satisfy the mobile users' demands for low delay and high bandwidth data to current and future cellular networks. To fulfil the needs of mobile users on mobility, the proper design of wireless communication is necessary. The design of wireless links without prior knowledge of obstructions, base station locations, and cell load is not realistic and challenging. To address this issue we implement realistic Line of Sight (LOS)/Non-Line of Sight (NLOS) urban maps and conduct field measurements in Long Term Evolution (LTE) 1800 MHz live network. The campaign is supported by knowing crucial information such as base station locations. The field measurements are carried out on-board of a commercial small vehicle which causes up to 3.9 dB penetration loss. The focus of this paper is on performance evaluation of diversity and multiplexing by Rank Indicators (RIs).","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275602
Do-hyung Kim, I. Yeom, Tae-Jin Lee
Broadcasting/multicasting may be an efficient way to disseminate delay-sensitive content in vehicular networks. However, conventional broadcasting schemes have suffered from reliability issues, since they cannot go along with ACK and RTS/CTS. In this paper, we design a novel receiver-driven broadcast scheme for periodic messaging in vehicular applications, where receivers request broadcasting to their neighbors and data is broadcast as a response. Via simulation study, it is shown that the proposed scheme effectively 1) controls contention and 2) mitigates hidden node effects in broadcast communication.
{"title":"Receiver-driven broadcast for vehicular applications","authors":"Do-hyung Kim, I. Yeom, Tae-Jin Lee","doi":"10.1109/VNC.2017.8275602","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275602","url":null,"abstract":"Broadcasting/multicasting may be an efficient way to disseminate delay-sensitive content in vehicular networks. However, conventional broadcasting schemes have suffered from reliability issues, since they cannot go along with ACK and RTS/CTS. In this paper, we design a novel receiver-driven broadcast scheme for periodic messaging in vehicular applications, where receivers request broadcasting to their neighbors and data is broadcast as a response. Via simulation study, it is shown that the proposed scheme effectively 1) controls contention and 2) mitigates hidden node effects in broadcast communication.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127290422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275616
C. B. Math, Hong Li, S. Groot, I. Niemegeers
Channel congestion Is one of the most critical Issues In IEEE 802.11p-based vehicular ad hoc networks as it leads to unreliability of safety applications. As a counter measure, the European Telecommunications Standard Institute (ETSI), proposes a mandatory Decentralized Congestion Control (DCC) framework to control the channel load, by tuning transmission parameters, such as message-rate or data-rate. This paper defines a novel decentralized combined message-rate and data-rate congestion control (MD-DCC) scheme, which provides a fair and effective way of message-rate and data-rate allocation among vehicles to avoid congestion and satisfy application requirements. We discuss several implementation aspects such as the selection of parameters of MD-DCC and their relation with the application requirements. Simulations studies are presented to show the performance of MD-DCC in terms of application reliability and fairness. Our results show that, for various application requirements in a synthetic highway scenario and for various vehicular densities, MD-DCC outperforms other approaches that adapt only message-rate or data-rate. We conclude that MD-DCC takes the best of both message-rate and data-rate algorithms, resulting in superior application reliability as well as a dramatic increase in the maximum supported vehicular density.
{"title":"A combined fair decentralized message-rate and data-rate congestion control for V2V communication","authors":"C. B. Math, Hong Li, S. Groot, I. Niemegeers","doi":"10.1109/VNC.2017.8275616","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275616","url":null,"abstract":"Channel congestion Is one of the most critical Issues In IEEE 802.11p-based vehicular ad hoc networks as it leads to unreliability of safety applications. As a counter measure, the European Telecommunications Standard Institute (ETSI), proposes a mandatory Decentralized Congestion Control (DCC) framework to control the channel load, by tuning transmission parameters, such as message-rate or data-rate. This paper defines a novel decentralized combined message-rate and data-rate congestion control (MD-DCC) scheme, which provides a fair and effective way of message-rate and data-rate allocation among vehicles to avoid congestion and satisfy application requirements. We discuss several implementation aspects such as the selection of parameters of MD-DCC and their relation with the application requirements. Simulations studies are presented to show the performance of MD-DCC in terms of application reliability and fairness. Our results show that, for various application requirements in a synthetic highway scenario and for various vehicular densities, MD-DCC outperforms other approaches that adapt only message-rate or data-rate. We conclude that MD-DCC takes the best of both message-rate and data-rate algorithms, resulting in superior application reliability as well as a dramatic increase in the maximum supported vehicular density.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275634
Joshua Joy
Every day autonomous vehicles will independently generate terabytes of unverified data. In the case of an accident involving multiple stakeholders with various (dis)incentives to honestly report, the question arises how to reconstruct the accident scene with validated and authenticated data without relying on a centralized authority. In this paper, we introduce Proof of Physics (PoP), a consensus mechanism whereby environmental (sensor) data is persisted only after audit and computational agreement that the recorded event occurred. Vehicles perform permissionless (e.g., requiring no centralized authority) writes of the signatures of their recorded events and associated content. The blocktree aggregates the verified data enabling querying over validated historic events. We evaluate the blocktree security by analyzing the ability of a malicious attacker to successfully fork the vehicle blocktree. We show that the attacker's success probability approaches negligible as the number of vehicle witnesses and confirmations increases.
{"title":"Vehicular blocktrees","authors":"Joshua Joy","doi":"10.1109/VNC.2017.8275634","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275634","url":null,"abstract":"Every day autonomous vehicles will independently generate terabytes of unverified data. In the case of an accident involving multiple stakeholders with various (dis)incentives to honestly report, the question arises how to reconstruct the accident scene with validated and authenticated data without relying on a centralized authority. In this paper, we introduce Proof of Physics (PoP), a consensus mechanism whereby environmental (sensor) data is persisted only after audit and computational agreement that the recorded event occurred. Vehicles perform permissionless (e.g., requiring no centralized authority) writes of the signatures of their recorded events and associated content. The blocktree aggregates the verified data enabling querying over validated historic events. We evaluate the blocktree security by analyzing the ability of a malicious attacker to successfully fork the vehicle blocktree. We show that the attacker's success probability approaches negligible as the number of vehicle witnesses and confirmations increases.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275630
C. Olariu, Simon McLoughlin, Gary Thompson
This paper investigates the support that cloud services and applications bring to use-cases for enhanced driving situation awareness. The focus of these services is to support the decision an automated car needs to take when the situation dictates that a hand-over to the driver or a take-over by the automated driving system is required, in the context of driving scenarios proposed in VI-DAS by experts. Collaboration is viewed from a spatio-temporal perspective and as such the paper will elaborate on which kind of communication and what kind of context awareness suit driving scenarios.
{"title":"Cloud-support for collaborative services in connected cars scenarios","authors":"C. Olariu, Simon McLoughlin, Gary Thompson","doi":"10.1109/VNC.2017.8275630","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275630","url":null,"abstract":"This paper investigates the support that cloud services and applications bring to use-cases for enhanced driving situation awareness. The focus of these services is to support the decision an automated car needs to take when the situation dictates that a hand-over to the driver or a take-over by the automated driving system is required, in the context of driving scenarios proposed in VI-DAS by experts. Collaboration is viewed from a spatio-temporal perspective and as such the paper will elaborate on which kind of communication and what kind of context awareness suit driving scenarios.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275610
Takamasa Higuchi, O. Altintas
The emergence of new types of applications for connected cars is expected to increase data traffic in vehicular networks. A promising solution is to concurrently use multiple types of radios, dynamically selecting network interface(s) that are likely to achieve the highest performance (i.e., hybrid networking). In this paper, we propose an intelligent interface selection mechanism, tailored to hybrid vehicle-to-vehicle communications. We introduce a novel approach of hierarchical decision making, in which interface selection by vehicles is loosely controlled by a remote central server. The server provides vehicles with recommended interface selection strategy, which is optimized based on the statistical knowledge about road and network conditions. While the vehicles basically follow the recommended strategy, they are allowed to adjust it if they detect actual channel conditions deviating from the statistics on the server. The adjustments are carefully made based on the expected channel load information provided by the server, so that the changes of strategy do not harm the communication performance in neighboring geographical regions. Simulation results show that our solution can significantly reduce the end-to-end latency of packet delivery, compared to conventional selection mechanisms.
{"title":"Interface selection in hybrid V2V communications: A hierarchical approach","authors":"Takamasa Higuchi, O. Altintas","doi":"10.1109/VNC.2017.8275610","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275610","url":null,"abstract":"The emergence of new types of applications for connected cars is expected to increase data traffic in vehicular networks. A promising solution is to concurrently use multiple types of radios, dynamically selecting network interface(s) that are likely to achieve the highest performance (i.e., hybrid networking). In this paper, we propose an intelligent interface selection mechanism, tailored to hybrid vehicle-to-vehicle communications. We introduce a novel approach of hierarchical decision making, in which interface selection by vehicles is loosely controlled by a remote central server. The server provides vehicles with recommended interface selection strategy, which is optimized based on the statistical knowledge about road and network conditions. While the vehicles basically follow the recommended strategy, they are allowed to adjust it if they detect actual channel conditions deviating from the statistics on the server. The adjustments are carefully made based on the expected channel load information provided by the server, so that the changes of strategy do not harm the communication performance in neighboring geographical regions. Simulation results show that our solution can significantly reduce the end-to-end latency of packet delivery, compared to conventional selection mechanisms.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117199335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275613
E. Bentley, J. Suprenant, S. Reichhart
With the emergence of big data and the tremendous increase in traffic loads that accompanies it, there is a resurgence in the reliance on “SneakerNet” where data is stored on some sort of storage drive at the source location and the storage drive is physically taken to the destination point, rather than transmitting the data over a network. Validation experiments in a resource-limited, RF-challenged environment were completed to demonstrate the gains that can be achieved when the file size to be transferred is large enough to make it advantageous to offload traffic to a close-by vehicle and physically moving the data to the destination.
{"title":"Vehicular data offloading for resource-limited delay tolerant networks","authors":"E. Bentley, J. Suprenant, S. Reichhart","doi":"10.1109/VNC.2017.8275613","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275613","url":null,"abstract":"With the emergence of big data and the tremendous increase in traffic loads that accompanies it, there is a resurgence in the reliance on “SneakerNet” where data is stored on some sort of storage drive at the source location and the storage drive is physically taken to the destination point, rather than transmitting the data over a network. Validation experiments in a resource-limited, RF-challenged environment were completed to demonstrate the gains that can be achieved when the file size to be transferred is large enough to make it advantageous to offload traffic to a close-by vehicle and physically moving the data to the destination.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122782210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275615
Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, H. Treharne
In this paper, we propose a novel secure and privacy-preserving solution for V2X systems leveraging widely accepted trusted computing technologies. Our approach systematically addresses all key aspects, i.e., security, privacy and accountability (revocation). By reflecting on state-of-the-art pseudonym architectures, we identify their limitations focusing on pseudonym reusage policies and revocation mechanisms. We propose the use of Direct Anonymous Attestation (DAA) algorithms to enhance existing V2X security architectures. The novelty of our proposed solution is its decentralized approach in shifting trust from the infrastructure to vehicles. Applying DAA in V2X enables enhanced privacy protection than is possible in current architectures through user-controlled linkability. The paper presents the incorporation of DAA algorithms within V2X together with rigorous security and privacy arguments.
{"title":"Privacy-enhanced capabilities for VANETs using direct anonymous attestation","authors":"Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, H. Treharne","doi":"10.1109/VNC.2017.8275615","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275615","url":null,"abstract":"In this paper, we propose a novel secure and privacy-preserving solution for V2X systems leveraging widely accepted trusted computing technologies. Our approach systematically addresses all key aspects, i.e., security, privacy and accountability (revocation). By reflecting on state-of-the-art pseudonym architectures, we identify their limitations focusing on pseudonym reusage policies and revocation mechanisms. We propose the use of Direct Anonymous Attestation (DAA) algorithms to enhance existing V2X security architectures. The novelty of our proposed solution is its decentralized approach in shifting trust from the infrastructure to vehicles. Applying DAA in V2X enables enhanced privacy protection than is possible in current architectures through user-controlled linkability. The paper presents the incorporation of DAA algorithms within V2X together with rigorous security and privacy arguments.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/VNC.2017.8275595
Lei Kang, Suman Banerjee
Sensing various driving behaviors, such as accelerations, brakes, turns, and change lanes — is of great interest to many applications, e.g., understanding drive quality, detecting road conditions, and more. Many such applications rely on using smartphone placed in a vehicle to collect such data for ease of deployment and use. However, several driving analytics techniques in the recent past, including our own, make simplifying assumptions that the smartphone is stably fixed with certain orientation and the car is driving on flat roads. Our deployment experience reveals that existing approaches may cause orientation misalignment and acceleration over/under estimation due to road slopes and human interactions, which lead to significant sensing errors for driving analytics applications. In this paper, we present several innovative techniques to improve the overall accuracy and usability of smartphone sensors. First, we use machine learning techniques to detect smartphone's relative orientation changes caused by human interactions. Second, we design a slope-aware alignment algorithm to improve alignment accuracy. Third, we track the linear acceleration of the vehicle to address acceleration over/under estimation problems. Fourth, we evaluate the tradeoffs between GPS and inertial sensors, and fuse inertial sensors with GPS to improve the overall accuracy and usability. We develop a smartphone application called XSense that adopts the novel techniques to improve the overall accuracy on driving analytics. Our evaluation of XSense is conducted through measurements of more than 2,000 trips (more than 13,000 miles) from 16 drivers in the past three years, and shows that XSense improves the 75-percentile accuracy by 5x comparing with well-tuned inertial sensors in traditional approach.
{"title":"Practical driving analytics with smartphone sensors","authors":"Lei Kang, Suman Banerjee","doi":"10.1109/VNC.2017.8275595","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275595","url":null,"abstract":"Sensing various driving behaviors, such as accelerations, brakes, turns, and change lanes — is of great interest to many applications, e.g., understanding drive quality, detecting road conditions, and more. Many such applications rely on using smartphone placed in a vehicle to collect such data for ease of deployment and use. However, several driving analytics techniques in the recent past, including our own, make simplifying assumptions that the smartphone is stably fixed with certain orientation and the car is driving on flat roads. Our deployment experience reveals that existing approaches may cause orientation misalignment and acceleration over/under estimation due to road slopes and human interactions, which lead to significant sensing errors for driving analytics applications. In this paper, we present several innovative techniques to improve the overall accuracy and usability of smartphone sensors. First, we use machine learning techniques to detect smartphone's relative orientation changes caused by human interactions. Second, we design a slope-aware alignment algorithm to improve alignment accuracy. Third, we track the linear acceleration of the vehicle to address acceleration over/under estimation problems. Fourth, we evaluate the tradeoffs between GPS and inertial sensors, and fuse inertial sensors with GPS to improve the overall accuracy and usability. We develop a smartphone application called XSense that adopts the novel techniques to improve the overall accuracy on driving analytics. Our evaluation of XSense is conducted through measurements of more than 2,000 trips (more than 13,000 miles) from 16 drivers in the past three years, and shows that XSense improves the 75-percentile accuracy by 5x comparing with well-tuned inertial sensors in traditional approach.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114888946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-16DOI: 10.1109/VNC.2017.8275598
R. V. D. Heijden, Thomas Lukaseder, F. Kargl
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.
{"title":"Analyzing attacks on cooperative adaptive cruise control (CACC)","authors":"R. V. D. Heijden, Thomas Lukaseder, F. Kargl","doi":"10.1109/VNC.2017.8275598","DOIUrl":"https://doi.org/10.1109/VNC.2017.8275598","url":null,"abstract":"Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127438436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}