Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Security Benchmarking Approach for Cooperative Driving Automation (CDA) Applications
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability.ORCID iD: 0000-0003-0148-533X
RISE Research Institutes of Sweden, Safety and Transport, Electrification and Reliability. Chalmers University of Technology, Sweden.ORCID iD: 0000-0001-9536-4269
Chalmers University of Technology, Sweden.
2025 (English)In: Article in journal (Refereed) Accepted
Abstract [en]

This paper proposes a reference model for defining security benchmarks for the safety assessment of Cooperative Driving Automation (CDA) applications. Our reference model provides a systematic approach to benchmark the resilience of CDA applications against malicious attacks through extensive system simulations. It enables the test repeatability and comparison of results across different implementations of CDA applications. In our approach, a benchmark is defined as a series of tests that expose the target system to specific attacks while recording its response. Using this model, we define a benchmark for evaluating the resilience of Cooperative Adaptive Cruise Control (CACC) algorithms against barrage jamming attacks targeting the physical layer of the IEEE 802.11p communication standard. We apply this benchmark to assess and compare the performance of four CACC algorithms: P1, Flatbed, Ploeg, and Consensus. The benchmark measures reveal that the Consensus algorithm demonstrates the highest resilience against jamming attacks, primarily due to its heavy reliance on onboard sensors and the use of sensor data from all other vehicles for decision-making. In contrast, the P1 algorithm, which depends mainly on vehicle-to-vehicle (V2V) communication, proves to be the most vulnerable. Furthermore, the results indicate that vehicles are most susceptible to jamming attacks during acceleration phases, making these periods critical for security evaluation. These findings validate the effectiveness of our benchmarking framework in identifying strengths and vulnerabilities of CACC algorithms under cyberattacks.

Place, publisher, year, edition, pages
2025.
Keywords [en]
Reference Modeling, Security Benchmarks, Cooperative Driving Automation, Simulation-based testing, Jamming Attacks, Platooning System
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:ri:diva-78779OAI: oai:DiVA.org:ri-78779DiVA, id: diva2:1995490
Available from: 2025-09-05 Created: 2025-09-05 Last updated: 2025-09-23Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records

Malik, MateenSangchoolie, Behrooz

Search in DiVA

By author/editor
Malik, MateenSangchoolie, Behrooz
By organisation
Electrification and Reliability
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 14 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf