Change search
Link to record
Permanent link

Direct link
Publications (8 of 8) Show all publications
Malik, M., Sangchoolie, B. & Karlsson, J. (2025). A Security Benchmarking Approach for Cooperative Driving Automation (CDA) Applications.
Open this publication in new window or tab >>A Security Benchmarking Approach for Cooperative Driving Automation (CDA) Applications
2025 (English)In: Article in journal (Refereed) Accepted
Abstract [en]

This paper proposes a reference model for defining security benchmarks for the safety assessment of Cooperative Driving Automation (CDA) applications. Our reference model provides a systematic approach to benchmark the resilience of CDA applications against malicious attacks through extensive system simulations. It enables the test repeatability and comparison of results across different implementations of CDA applications. In our approach, a benchmark is defined as a series of tests that expose the target system to specific attacks while recording its response. Using this model, we define a benchmark for evaluating the resilience of Cooperative Adaptive Cruise Control (CACC) algorithms against barrage jamming attacks targeting the physical layer of the IEEE 802.11p communication standard. We apply this benchmark to assess and compare the performance of four CACC algorithms: P1, Flatbed, Ploeg, and Consensus. The benchmark measures reveal that the Consensus algorithm demonstrates the highest resilience against jamming attacks, primarily due to its heavy reliance on onboard sensors and the use of sensor data from all other vehicles for decision-making. In contrast, the P1 algorithm, which depends mainly on vehicle-to-vehicle (V2V) communication, proves to be the most vulnerable. Furthermore, the results indicate that vehicles are most susceptible to jamming attacks during acceleration phases, making these periods critical for security evaluation. These findings validate the effectiveness of our benchmarking framework in identifying strengths and vulnerabilities of CACC algorithms under cyberattacks.

Keywords
Reference Modeling, Security Benchmarks, Cooperative Driving Automation, Simulation-based testing, Jamming Attacks, Platooning System
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-78779 (URN)
Available from: 2025-09-05 Created: 2025-09-05 Last updated: 2025-09-23Bibliographically approved
Malik, M., Sangchoolie, B. & Karlsson, J. (2025). A Simulation-Based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications. Paper presented at 8th International Conference on Intelligent Transport Systems, INTSYS 2024. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 608 LNICST, 244-262
Open this publication in new window or tab >>A Simulation-Based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications
2025 (English)In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ISSN 1867-8211, E-ISSN 1867-822X, Vol. 608 LNICST, p. 244-262Article in journal (Refereed) Published
Abstract [en]

This paper presents our initial contributions toward defining security benchmarks for simulation-based assessment of Cooperative Driving Automation (CDA) applications. A security benchmark is a process or procedure for assessing and validating a system’s ability to achieve its operational objectives in the presence of specific security attacks. This work lays the groundwork for developing security benchmarks that assess the robustness of CDA applications against jamming attacks. The driving scenario and the attack model are the core components of our proposed security benchmark. We used two scenarios braking and sinusoidal as a stimulus for evaluating the robustness of a platooning application modeled in a simulation framework called Plexe. The platooning application is equipped with a Cooperative Adaptive Cruise Control (CACC) controller. We injected barrage jamming attacks into the physical layer of the wireless communication system modeled by the IEEE 802.11p protocol. We demonstrate that jamming attacks can compromise safety, leading to emergency braking and collision incidents among platooning vehicles. Our findings also indicate that the severity of jamming attacks varies with the driving scenario, with the most severe impacts (i.e., collisions) occurring when the attack is injected during vehicle acceleration. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2025
Keywords
Adaptive control systems; Automobile driver simulators; Benchmarking; Braking; Code division multiple access; Cooperative communication; Feedback control; Invariance; Jamming; Robustness (control systems); Attack modeling; Automation applications; Cooperative driving; Cooperative driving automation; Jamming attacks; Platooning system; Security attacks; Security benchmarks; Simulation-based jamming attack; Simulation-based security; Adaptive cruise control
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-78447 (URN)10.1007/978-3-031-86370-7_15 (DOI)2-s2.0-105002882586 (Scopus ID)
Conference
8th International Conference on Intelligent Transport Systems, INTSYS 2024
Available from: 2025-09-16 Created: 2025-09-16 Last updated: 2025-09-23Bibliographically approved
Malik, M., Ohlsson, L., Sharma, K., Sangchoolie, B. & Karlsson, J. (2025). Improving the Jamming Resilience of a Cooperative Adaptive Cruise Controller. In: : . Paper presented at International Conference on Intelligent Transport Systems.
Open this publication in new window or tab >>Improving the Jamming Resilience of a Cooperative Adaptive Cruise Controller
Show others...
2025 (English)Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents the results of extensive simulations to assess the resilience of several Cooperative Adaptive Cruise Control (CACC algorithms against barrage jamming. CACC is an extension of ACC that utilizes V2V communication to maintain string stability and appropriate inter-vehicle spacing in automotive platooning systems. We conduct simulations using four existing CACC algorithms: two employ a Constant Time Headway (CTH) policy, and two employ a Constant Vehicle Spacing (CVS) policy.CACC algorithms based on the CTH policy primarily rely on local sensor data, whereas those following the CVS policy depend mainly on information received from other vehicles via wireless communication.Our simulations show that CTH-based algorithms are resilient to barrage jamming attacks. In contrast, CVS-based algorithms are highly vulnerable due to the lack of fallback mechanisms for handling communication failures. However, since CVS enables higher traffic density and flow, we investigate whether a CVS-based algorithm can achieve jamming resilience comparable to that of CTH-based algorithms.To this end, we propose two extensions to one of the CVS-based CACC algorithms to improve its jamming resilience. Our results demonstrate that both extensions significantly reduce the number of collisions compared to the original CVS implementation. Notably, one of the proposed extensions enables the CVS-based CACC algorithm to achieve the same level of jamming resilience as the tested CTH algorithms.

Keywords
Simulation-based testing, Jamming attacks, Jamming resilience, Cooperative Adaptive Cruise Control (CACC), Platooning applications
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-79020 (URN)
Conference
International Conference on Intelligent Transport Systems
Available from: 2025-09-22 Created: 2025-09-22 Last updated: 2025-11-18
Malik, M., Sangchoolie, B. & Karlsson, J. (2024). A Simulation-based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications. Paper presented at EAI International Conference on Intelligent Transport Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Open this publication in new window or tab >>A Simulation-based Security Benchmarking Approach for Assessing Cooperative Driving Automation (CDA) Applications
2024 (English)In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications EngineeringArticle in journal (Refereed) Published
Abstract [en]

This paper presents our initial contributions toward defining security benchmarks for simulation-based assessment of Cooperative Driving Automation (CDA) applications. A security benchmark is a process or procedure for assessing and validating a system’s ability to achieve its operational objectives in the presence of specific security attacks. This work lays the groundwork for developing security benchmarks that assess the robustness of CDA applications against jamming attacks. The driving scenario and the attack model are the core components of our proposed security benchmark. We used two scenarios braking and sinusoidal as a stimulus for evaluating the robustness of a platooning application modeled in a simulation framework called Plexe. The platooning application is equipped with a Cooperative Adaptive Cruise Control (CACC) controller. We injected barrage jamming attacks into the physical layer of the wireless communication system modeled by the IEEE 802.11p protocol. We demonstrate that jamming attacks can compromise safety, leading to emergency braking and collision incidents among platooning vehicles. Our findings also indicate that the severity of jamming attacks varies with the driving scenario, with the most severe impacts (i.e., collisions) occurring when the attack is injected during vehicle acceleration.

Keywords
Security benchmarks, Cooperative Driving Automation (CDA), Simulation-based jamming attacks, Platooning system
National Category
Computer Systems Communication Systems
Identifiers
urn:nbn:se:ri:diva-76081 (URN)10.1007/s11036-025-02460-x (DOI)
Conference
EAI International Conference on Intelligent Transport Systems
Note

The work of this paper has been partly done in the context ofthe SUNRISE project, funded by the European Union’s Horizon Europe Research andInnovation Actions under grant agreement no.101069573. 

Available from: 2024-11-18 Created: 2024-11-18 Last updated: 2025-09-23Bibliographically approved
Malik, M., Aramrattana, M., Maleki, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2023). Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC: . Paper presented at 28th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2023. Singapore. 24 October 2023 through 27 October 2023 (pp. 23-29). IEEE Computer Society
Open this publication in new window or tab >>Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
Show others...
2023 (English)In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, IEEE Computer Society , 2023, p. 23-29Conference paper, Published paper (Refereed)
Abstract [en]

A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification. 

Place, publisher, year, edition, pages
IEEE Computer Society, 2023
Keywords
Control system synthesis; Denial-of-service attack; Failure (mechanical); Remote control; Safety engineering; Software testing; Vehicle to vehicle communications; Vehicle transmissions; Communication failure; Control software; Denialof- service attacks; Remote location; Remotely operated road vehicle; Road vehicles; Safety mechanisms; Software in the loops; Software-in-the-loop testing; Transmission delays; Specifications
National Category
Mechanical Engineering
Identifiers
urn:nbn:se:ri:diva-70583 (URN)10.1109/PRDC59308.2023.00012 (DOI)2-s2.0-85182390657 (Scopus ID)
Conference
28th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2023. Singapore. 24 October 2023 through 27 October 2023
Note

This work was supported by VALU3S project, which hasreceived funding from the ECSEL Joint Undertaking (JU)under grant agreement No 876852. We also would like toexpress our sincere gratitude to Stepan Kar ´ asek and Beata Davidova from Roboauto, who provided us with invaluable ´support to test their system in the simulation environment.

Available from: 2024-01-22 Created: 2024-01-22 Last updated: 2025-09-23Bibliographically approved
Malik, M., Aramrattana, M., Maleki, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2023). Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks. In: 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023): . Paper presented at Pacific Rim International Symposium on Dependable Computing. IEEE conference proceedings
Open this publication in new window or tab >>Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
Show others...
2023 (English)In: 28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023), IEEE conference proceedings, 2023Conference paper, Published paper (Other academic)
Abstract [en]

A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2023
Keywords
remotely operated road vehicle (RORV), communication failures, denial-of-service (DoS) attacks, safety mechanisms, software-in-the-loop (SIL) testing
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-67577 (URN)
Conference
Pacific Rim International Symposium on Dependable Computing
Available from: 2023-10-31 Created: 2023-10-31 Last updated: 2025-09-23Bibliographically approved
Malik, M., Maleki, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2022). ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles. In: 52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022): . Paper presented at 52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022). Jun 27, 2022 - Jun 30, 2022. Baltimore, Maryland, USA.
Open this publication in new window or tab >>ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles
Show others...
2022 (English)In: 52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022), 2022Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents ComFASE, a communication fault and attack simulation engine. ComFASE is used to identify and evaluate potentially dangerous behaviours of interconnected automated vehicles in the presence of faults and attacks in wireless vehicular networks. ComFASE is built on top of OMNET++ (a network simulator) and integrates SUMO (a traffic simulator) and Veins (a vehicular network simulator). The tool is flexible in modelling different types of faults and attacks and can be effectively used to study the interplay between safety and cybersecurity attributes by injecting cybersecurity attacks and evaluating their safety implications. To demonstrate the tool, we present results from a series of simulation experiments, where we injected delay and denial-of-service attacks on wireless messages exchanged between vehicles in a platooning application. The results show how different variants of attacks influence the platooning system in terms of collision incidents.

Keywords
attack injection, fault injection, simulation-based system, V2V communication, platooning, cybersecurity attack
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-59789 (URN)
Conference
52nd annual IEEE/IFIP international conference on dependable systems and networks (DSN2022). Jun 27, 2022 - Jun 30, 2022. Baltimore, Maryland, USA
Projects
VALU3S
Available from: 2022-07-11 Created: 2022-07-11 Last updated: 2025-09-23Bibliographically approved
Maleki, M., Malik, M., Folkesson, P., Sangchoolie, B. & Karlsson, J. (2022). Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles. In: : . Paper presented at 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2022) November 28-December 1, 2022, Beijing, China (pp. 12).
Open this publication in new window or tab >>Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles
Show others...
2022 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this work, we evaluate the safety of a platoon offour vehicles under jamming attacks. The platooning applicationis provided by Plexe-veins, which is a cooperative drivingframework, and the vehicles in the platoon are equipped withcooperative adaptive cruise control controllers to represent thevehicles’ behavior. The jamming attacks investigated are modeledby extending ComFASE (a Communication Fault and AttackSimulation Engine) and represent three real-world attacks,namely, destructive interference, barrage jamming, and deceptivejamming. The attacks are injected in the physical layer of theIEEE 802.11p communication protocol simulated in Veins (avehicular network simulator). To evaluate the safety implicationsof the injected attacks, the experimental results are classifiedby using the deceleration profiles and collision incidents of thevehicles. The results of our experiments show that jammingattacks on the communication can jeopardize vehicle safety,causing emergency braking and collision incidents. Moreover,we describe the impact of different attack injection parameters(such as, attack start time, attack duration and attack value) onthe behavior of the vehicles subjected to the attacks.

Keywords
attack injection, jamming, V2V communication, platooning, simulation-based system
National Category
Computer Systems
Identifiers
urn:nbn:se:ri:diva-61312 (URN)
Conference
27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2022) November 28-December 1, 2022, Beijing, China
Projects
VALU3S
Note

This work was supported by VALU3S project, which has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 876852. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Austria, Czech Republic, Germany, Ireland, Italy, Portugal, Spain, Sweden, Turkey

Available from: 2022-12-02 Created: 2022-12-02 Last updated: 2025-09-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0148-533X

Search in DiVA

Show all publications