liu.seSearch for publications in DiVA
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Effects of Colluding Sybil Nodes in Message Falsification Attacks for Vehicular Platooning
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering. Univ Fed Rio Grande do Sul, Brazil; Halmstad Univ, Sweden.
Univ Fed Rio Grande do Sul, Brazil.
Univ Fed Rio Grande do Sul, Brazil.
Halmstad Univ, Sweden.
Show others and affiliations
2017 (English)In: 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), IEEE , 2017, p. 53-60Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies the impact of vulnerabilities associated with the Sybil attack (through falsification of multiple identities) and message falsification in vehicular platooning. Platooning employs Inter-Vehicular Communication (IVC) to control a group of vehicles. It uses broadcast information such as acceleration, position, and velocity to operate a longitudinal control law. Cooperation among vehicles allows platoons to reduce fuel consumption and risks associated with driver mistakes. In spite of these benefits, the use of network communication to control vehicles exposes a relevant attack surface that can be exploited by malicious actors. To carry out this study, we evaluate five scenarios to quantify the potential impact of such attacks, identifying how platoons behave under varying Sybil attack conditions and what are the associated safety risks. This research also presents the use of location hijacking attack. In this attack, innocent vehicles that are not part of a platoon are used as a way to create trust bond between the false identities and the physical vehicles. We demonstrate that the ability to create false identities increases the effectiveness of message falsification attacks by making them easier to deploy and harder to detect in time.

Place, publisher, year, edition, pages
IEEE , 2017. p. 53-60
Series
IEEE Vehicular Networking Conference, ISSN 2157-9857
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-147205DOI: 10.1109/VNC.2017.8275641ISI: 000426903100015ISBN: 978-1-5386-0986-6 (print)OAI: oai:DiVA.org:liu-147205DiVA, id: diva2:1197244
Conference
2017 IEEE Vehicular Networking Conference (VNC)
Note

Funding Agencies|Excellence Center at Linkoping-Lund in Information Technology (ELLIIT) strategic research environment

Available from: 2018-04-12 Created: 2018-04-12 Last updated: 2018-04-12

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Boeira, FelipeAsplund, Mikael
By organisation
Software and SystemsFaculty of Science & Engineering
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 52 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf