Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention

11/29/2017
by   Mhafuzul Islam, et al.
0

A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from connected vehicle applications. As cyberattacks can lead to severe traffic incidents, it has become one of the primary concerns in connected vehicle applications. In this paper, we investigate the impact of cyberattacks on the vehicle-to-infrastructure (V2I) network from a V2I application point of view. Then, we develop a novel V2I cybersecurity architecture, named CVGuard, which can detect and prevent cyberattacks on the V2I environment. In designing CVGuard, key challenges, such as scalability, resiliency and future usability were considered. A case study using a distributed denial of service (DDoS) on a V2I application, i.e., the Stop Sign Gap Assist (SSGA) application, shows that CVGuard was effective in mitigating the adverse effects created by a DDoS attack. In our case study, because of the DDoS attack, conflicts between the minor and major road vehicles occurred in an unsignalized intersection, which could have caused potential crashes. A reduction of conflicts between vehicles occurred because CVGuard was in operation. The reduction of conflicts was compared based on the number of conflicts before and after the implementation and operation of the CVGuard security platform. Analysis revealed that the strategies adopted by the CVGuard were successful in reducing the inter-vehicle conflicts by 60 unsignalized intersection.

READ FULL TEXT

page 8

page 17

research
10/14/2020

A microsimulation approach for the impact assessment of a Vehicle-to-Infrastructure based Road Hazard Warning system

Cooperative Intelligent Transportation Systems (C-ITS) constitute techno...
research
11/30/2018

Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment

Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
research
03/05/2020

Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment

Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
research
12/02/2018

Connected Vehicle Application Development Platform (CVDeP) for Edge-centric Cyber-Physical Systems

Connected vehicle (CV) application developers need a development platfor...
research
05/14/2023

ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems

Electric Vehicle (EV) has become one of the promising solutions to the e...
research
01/30/2022

5G enabled Mobile Edge Computing security for Autonomous Vehicles

The world is moving into a new era with the deployment of 5G communicati...

Please sign up or login with your details

Forgot password? Click here to reset