Abstract
Connected vehicles bring new challenges for communication technologies. Vehicles become capable of performing actions depending on wireless V2X communications (ex: automatic emergency braking, crossing paths with other vehicles, handling platooning situations). Despite being essential in the case of industrial deployments, cybersecurity also acts as a scientific lock to secure the system from its conception. Facing with the increasing number of cyberattacks, but also with the increasing of the attack surface of vehicles, the securing of V2X communications is necessary. However, all existing attacks cannot always be tested with proper hardware. The simulation software approach allows us to free ourselves from this constraint. In this paper, we investigate the security vulnerabilities of ITS-G5 (European DSRC) communications in the presence of outside attackers. We considered 4 attacks: jamming, replay, falsification and network congestion. We used VENTOS platform to execute the different scenarios and demonstrated with it that these attacks have a real impact on vehicle’s driving.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Wireless Access in Vehicular Environments - US access layer, equivalent to the European ITS-G5.
References
Hackers Remotely Kill a Jeep on the Highway—With Me in It. Wired (2015). https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
ETSI. EN 302 663 V1.2.0, Access layer specification for intelligent transport systems operating in the 5GHz frequency band (2012). https://www.etsi.org/deliver/etsi_en/302600_302699/302663/01.02.00_20/en_302663v010200a.pdf
EuroNCAP Advanced Rewards - V2X Communication - Volkswagen Local Hazard Warning 2020 (2020). https://www.euroncap.com/fr/notations-et-r%C3%A9compenses/r%C3%A9compenses-euro-ncap-advanced/2020-volkswagen-local-hazard-warning
ETSI. TS 102 687 V1.2.1, Decentralized Congestion Control mechanisms for Intelligent Transport Systems operating in the 5 GHz range; Access layer part (2018). https://www.etsi.org/deliver/etsi_ts/102900_102999/102941/01.01.01_60/ts_102941v010101p.pdf
ETSI. TS 102 941 V1.1.1, Security, Trust and Privacy management (2012). https://www.etsi.org/deliver/etsi_ts/102900_102999/102941/01.01.01_60/ts_102941v010101p.pdf
Amoozadeh, M., Deng, H., Chuah, C.-N., Zhang, H.M., Ghosal, D.: Platoon management with cooperative adaptive cruise control enabled by VANET. Veh. Commun. 2(2), 110–123 (2015)
Ucar, S., Ergen, S.C., Ozkasap, O.: Security vulnerabilities of ieee 802.11p and visible light communication based platoon. In: 2016 IEEE Vehicular Networking Conference (VNC), pp. 1–4 (2016)
Amoozadeh, M., et al.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015)
Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Prof. 6(1), 24–29 (2004)
Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2005, pp. 11–21. Association for Computing Machinery, New York (2005)
Shao, Y., Ge, Y., Yu, R., Wang, J.: A survey of vehicle to everything (V2X) testing. Sensors 19(01), 334 (2019)
Smith, C.: The car hacker’s handbook: a guide for the penetration tester. No Starch Press, San Francisco (2012)
Sommer, F., Dürrwang, J., Kriesten, R.: Survey and classification of auto-motive security attacks. Information (Switzerland), Information 10(04), 148 (2019)
Kunz, S., Ravi, T.: Threats to security in DSRC/WAVE. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS 4104, pp. 266–279. Springer, Berlin (2006). https://doi.org/10.1007/11814764_22
Sommer, C., et al.: Veins – the open source vehicular network simulation framework. In: Virdis, A., Kirsche, M., (eds.) Recent Advances in Network Simulations. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12842-5_6
Eckhoff, D., Sommer, C.: A Multi-Channel IEEE 1609.4 and 802.11p EDCA Model for the Veins Framework, p. 2 (2012)
Serageldin, A., Alturkostani, H., Krings, A.: On the reliability of DSRC safety applications: a case of jamming. In: 2013 International Conference on Connected Vehicles and Expo (ICCVE), pp. 501–506 (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Cassou-Mounat, J., Labiod, H., Khatoun, R. (2020). Simulation of Cyberattacks in ITS-G5 Systems. In: Krief, F., Aniss, H., Mendiboure, L., Chaumette, S., Berbineau, M. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2020. Lecture Notes in Computer Science(), vol 12574. Springer, Cham. https://doi.org/10.1007/978-3-030-66030-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-66030-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66029-1
Online ISBN: 978-3-030-66030-7
eBook Packages: Computer ScienceComputer Science (R0)