Visible to the public Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks

TitleAnalysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsLastinec, Jan, Keszeli, Mario
Conference Name2019 7th International Symposium on Digital Forensics and Security (ISDFS)
Date Publishedjun
ISBN Number978-1-7281-2827-6
Keywordsadvanced attacks, attacks, automotive transportation, autonomous driving, common attacks, composability, disruptive innovations, Driver assistance systems, inter-vehicular communication, Metrics, OMNET++, OMNeT++ simulation environment, pubcrawl, realistic attack scenarios, replay attack, resilience, Resiliency, security, security countermeasures, Sybil attack, sybil attacks, sybil nodes, technological development, telecommunication security, unprecedented security concerns, V2V, VANET, vehicle ad-hoc networks, vehicle connectivity, vehicular ad hoc networks
Abstract

The pace of technological development in automotive and transportation has been accelerating rapidly in recent years. Automation of driver assistance systems, autonomous driving, increasing vehicle connectivity and emerging inter-vehicular communication (V2V) are among the most disruptive innovations, the latter of which also raises numerous unprecedented security concerns. This paper is focused on the security of V2V communication in vehicle ad-hoc networks (VANET) with the main goal of identifying realistic attack scenarios and evaluating their impact, as well as possible security countermeasures to thwart the attacks. The evaluation has been done in OMNeT++ simulation environment and the results indicate that common attacks, such as replay attack or message falsification, can be eliminated by utilizing digital signatures and message validation. However, detection and mitigation of advanced attacks such as Sybil attack requires more complex approach. The paper also presents a simple detection method of Sybil nodes based on measuring the signal strength of received messages and maintaining reputation of sending nodes. The evaluation results suggest that the presented method is able to detect Sybil nodes in VANET and contributes to the improvement of traffic flow.

URLhttps://ieeexplore.ieee.org/document/8757500
DOI10.1109/ISDFS.2019.8757500
Citation Keylastinec_analysis_2019