Skip to main content

Simulation of Cyberattacks in ITS-G5 Systems

  • Conference paper
  • First Online:
Communication Technologies for Vehicles (Nets4Cars/Nets4Trains/Nets4Aircraft 2020)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 12574))

Included in the following conference series:

Abstract

Connected vehicles bring new challenges for communication technologies. Vehicles become capable of performing actions depending on wireless V2X communications (ex: automatic emergency braking, crossing paths with other vehicles, handling platooning situations). Despite being essential in the case of industrial deployments, cybersecurity also acts as a scientific lock to secure the system from its conception. Facing with the increasing number of cyberattacks, but also with the increasing of the attack surface of vehicles, the securing of V2X communications is necessary. However, all existing attacks cannot always be tested with proper hardware. The simulation software approach allows us to free ourselves from this constraint. In this paper, we investigate the security vulnerabilities of ITS-G5 (European DSRC) communications in the presence of outside attackers. We considered 4 attacks: jamming, replay, falsification and network congestion. We used VENTOS platform to execute the different scenarios and demonstrated with it that these attacks have a real impact on vehicle’s driving.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Wireless Access in Vehicular Environments - US access layer, equivalent to the European ITS-G5.

References

  1. Hackers Remotely Kill a Jeep on the Highway—With Me in It. Wired (2015). https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

  2. ETSI. EN 302 663 V1.2.0, Access layer specification for intelligent transport systems operating in the 5GHz frequency band (2012). https://www.etsi.org/deliver/etsi_en/302600_302699/302663/01.02.00_20/en_302663v010200a.pdf

  3. EuroNCAP Advanced Rewards - V2X Communication - Volkswagen Local Hazard Warning 2020 (2020). https://www.euroncap.com/fr/notations-et-r%C3%A9compenses/r%C3%A9compenses-euro-ncap-advanced/2020-volkswagen-local-hazard-warning

  4. ETSI. TS 102 687 V1.2.1, Decentralized Congestion Control mechanisms for Intelligent Transport Systems operating in the 5 GHz range; Access layer part (2018). https://www.etsi.org/deliver/etsi_ts/102900_102999/102941/01.01.01_60/ts_102941v010101p.pdf

  5. ETSI. TS 102 941 V1.1.1, Security, Trust and Privacy management (2012). https://www.etsi.org/deliver/etsi_ts/102900_102999/102941/01.01.01_60/ts_102941v010101p.pdf

  6. Amoozadeh, M., Deng, H., Chuah, C.-N., Zhang, H.M., Ghosal, D.: Platoon management with cooperative adaptive cruise control enabled by VANET. Veh. Commun. 2(2), 110–123 (2015)

    Google Scholar 

  7. Ucar, S., Ergen, S.C., Ozkasap, O.: Security vulnerabilities of ieee 802.11p and visible light communication based platoon. In: 2016 IEEE Vehicular Networking Conference (VNC), pp. 1–4 (2016)

    Google Scholar 

  8. Amoozadeh, M., et al.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015)

    Article  Google Scholar 

  9. Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Prof. 6(1), 24–29 (2004)

    Google Scholar 

  10. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2005, pp. 11–21. Association for Computing Machinery, New York (2005)

    Google Scholar 

  11. Shao, Y., Ge, Y., Yu, R., Wang, J.: A survey of vehicle to everything (V2X) testing. Sensors 19(01), 334 (2019)

    Google Scholar 

  12. Smith, C.: The car hacker’s handbook: a guide for the penetration tester. No Starch Press, San Francisco (2012)

    Google Scholar 

  13. Sommer, F., Dürrwang, J., Kriesten, R.: Survey and classification of auto-motive security attacks. Information (Switzerland), Information 10(04), 148 (2019)

    Google Scholar 

  14. Kunz, S., Ravi, T.: Threats to security in DSRC/WAVE. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS 4104, pp. 266–279. Springer, Berlin (2006). https://doi.org/10.1007/11814764_22

  15. Sommer, C., et al.: Veins – the open source vehicular network simulation framework. In: Virdis, A., Kirsche, M., (eds.) Recent Advances in Network Simulations. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12842-5_6

  16. Eckhoff, D., Sommer, C.: A Multi-Channel IEEE 1609.4 and 802.11p EDCA Model for the Veins Framework, p. 2 (2012)

    Google Scholar 

  17. Serageldin, A., Alturkostani, H., Krings, A.: On the reliability of DSRC safety applications: a case of jamming. In: 2013 International Conference on Connected Vehicles and Expo (ICCVE), pp. 501–506 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jean Cassou-Mounat or Houda Labiod .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cassou-Mounat, J., Labiod, H., Khatoun, R. (2020). Simulation of Cyberattacks in ITS-G5 Systems. In: Krief, F., Aniss, H., Mendiboure, L., Chaumette, S., Berbineau, M. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2020. Lecture Notes in Computer Science(), vol 12574. Springer, Cham. https://doi.org/10.1007/978-3-030-66030-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66030-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66029-1

  • Online ISBN: 978-3-030-66030-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics