Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0002-6217-0828
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0003-0148-533X
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0001-5224-9412
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0001-9536-4269
Show others and affiliations
2022 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this work, we evaluate the safety of a platoon offour vehicles under jamming attacks. The platooning applicationis provided by Plexe-veins, which is a cooperative drivingframework, and the vehicles in the platoon are equipped withcooperative adaptive cruise control controllers to represent thevehicles’ behavior. The jamming attacks investigated are modeledby extending ComFASE (a Communication Fault and AttackSimulation Engine) and represent three real-world attacks,namely, destructive interference, barrage jamming, and deceptivejamming. The attacks are injected in the physical layer of theIEEE 802.11p communication protocol simulated in Veins (avehicular network simulator). To evaluate the safety implicationsof the injected attacks, the experimental results are classifiedby using the deceleration profiles and collision incidents of thevehicles. The results of our experiments show that jammingattacks on the communication can jeopardize vehicle safety,causing emergency braking and collision incidents. Moreover,we describe the impact of different attack injection parameters(such as, attack start time, attack duration and attack value) onthe behavior of the vehicles subjected to the attacks.

Place, publisher, year, edition, pages
2022. p. 12-
Keywords [en]
attack injection, jamming, V2V communication, platooning, simulation-based system
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:ri:diva-61312OAI: oai:DiVA.org:ri-61312DiVA, id: diva2:1715767
Conference
27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2022) November 28-December 1, 2022, Beijing, China
Projects
VALU3S
Note

This work was supported by VALU3S project, which has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey

Available from: 2022-12-02 Created: 2022-12-02 Last updated: 2023-06-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Link

Authority records

Maleki, MehdiMalik, MateenFolkesson, PeterSangchoolie, Behrooz

Search in DiVA

By author/editor
Maleki, MehdiMalik, MateenFolkesson, PeterSangchoolie, Behrooz
By organisation
Electrification and Reliability
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 78 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf