Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability. (Dependable Transport Systems)ORCID iD: 0000-0003-0148-533X
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability. (Dependable Transport Systems)ORCID iD: 0000-0002-6217-0828
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability. (Dependable Transport Systems)ORCID iD: 0000-0001-5224-9412
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability. (Dependable Transport Systems)ORCID iD: 0000-0001-9536-4269
Show others and affiliations
2022 (English)In: 52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022), 2022Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents ComFASE, a communication fault and attack simulation engine. ComFASE is used to identify and evaluate potentially dangerous behaviours of interconnected automated vehicles in the presence of faults and attacks in wireless vehicular networks. ComFASE is built on top of OMNET++ (a network simulator) and integrates SUMO (a traffic simulator) and Veins (a vehicular network simulator). The tool is flexible in modelling different types of faults and attacks and can be effectively used to study the interplay between safety and cybersecurity attributes by injecting cybersecurity attacks and evaluating their safety implications. To demonstrate the tool, we present results from a series of simulation experiments, where we injected delay and denial-of-service attacks on wireless messages exchanged between vehicles in a platooning application. The results show how different variants of attacks influence the platooning system in terms of collision incidents.

Place, publisher, year, edition, pages
2022.
Keywords [en]
attack injection, fault injection, simulation-based system, V2V communication, platooning, cybersecurity attack
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:ri:diva-59789OAI: oai:DiVA.org:ri-59789DiVA, id: diva2:1682525
Conference
52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022). Jun 27, 2022 - Jun 30, 2022. Baltimore, Maryland, USA
Projects
VALU3SAvailable from: 2022-07-11 Created: 2022-07-11 Last updated: 2023-06-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records

Malik, MateenMaleki, MehdiFolkesson, PeterSangchoolie, Behrooz

Search in DiVA

By author/editor
Malik, MateenMaleki, MehdiFolkesson, PeterSangchoolie, Behrooz
By organisation
Electrification and Reliability
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 126 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf