• English
    • Deutsch
  • English 
    • English
    • Deutsch
  • Login
View Item 
  •   Home
  • Universität Ulm
  • Publikationen
  • View Item
  •   Home
  • Universität Ulm
  • Publikationen
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Analyzing attacks on cooperative adaptive cruise control (CACC)

Thumbnail
VNC17_CACC_Attacks.p ... (525.1Kb)

peer-reviewed

Erstveröffentlichung
2017-11
Authors
Van der Heijden, Rens W.
Lukaseder, Thomas
Kargl, Frank
Beitrag zu einer Konferenz


Published in
2017 IEEE Vehicular Networking Conference (VNC) / Altintas, O ; Casetti, C ; LoCigno, R ; Meireles, R (Hrsg.). - New York : IEEE, 2017. - (IEEE Vehicular Networking Conference). - S. 45-52. - ISBN 978-1-5386-0986-6. - ISSN 2157-9857
Link to original publication
https://dx.doi.org/10.1109/VNC.2017.8275598
Faculties
Fakultät für Ingenieurwissenschaften, Informatik und Psychologie
Institutions
Institut für Verteilte Systeme
Document version
accepted version
Conference
2017 IEEE Vehicular Networking Conference (VNC), 2017-11-27 - 2017-11-29, Turin
Abstract
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles. In CACC, vehicles exchange information, which is relied on to partially automate driving; however, this reliance on cooperation requires resilience against attacks and other forms of misbehavior. In this paper, we propose a rigorous attacker model and an evaluation framework for this resilience by quantifying the attack impact, providing the necessary tools to compare controller resilience and attack effectiveness simultaneously. Although there are significant differences between the resilience of the three analyzed controllers, we show that each can be attacked effectively and easily through either jamming or data injection. Our results suggest a combination of misbehavior detection and resilient control algorithms with graceful degradation are necessary ingredients for secure and safe platoons.
Date created
2017-10-16
Subject headings
[GND]: Angriff
[LCSH]: Vehicular ad hoc networks (Computer networks)
[Free subject headings]: CACC | Platooning | Vehicular network | Attacks | Position falsification
[DDC subject group]: DDC 004 / Data processing & computer science
License
Standard (ohne Print-on-Demand)
https://oparu.uni-ulm.de/xmlui/license_opod_v1

Metadata
Show full item record

DOI & citation

Please use this identifier to cite or link to this item: http://dx.doi.org/10.18725/OPARU-4531

Van der Heijden, Rens W.; Lukaseder, Thomas; Kargl, Frank (2017): Analyzing attacks on cooperative adaptive cruise control (CACC). Open Access Repositorium der Universität Ulm und Technischen Hochschule Ulm. http://dx.doi.org/10.18725/OPARU-4531
Citation formatter >



Policy | kiz service OPARU | Contact Us
Impressum | Privacy statement
 

 

Advanced Search

Browse

All of OPARUCommunities & CollectionsPersonsInstitutionsPublication typesUlm SerialsDewey Decimal ClassesEU projects UlmDFG projects UlmOther projects Ulm

My Account

LoginRegister

Statistics

View Usage Statistics

Policy | kiz service OPARU | Contact Us
Impressum | Privacy statement