Denial-of-Service Attacks on C-V2X Networks

by   Nataša Trkulja, et al.

Cellular Vehicle-to-Everything (C-V2X) networks are increasingly adopted by automotive original equipment manufacturers (OEMs). C-V2X, as defined in 3GPP Release 14 Mode 4, allows vehicles to self-manage the network in absence of a cellular base-station. Since C-V2X networks convey safety-critical messages, it is crucial to assess their security posture. This work contributes a novel set of Denial-of-Service (DoS) attacks on C-V2X networks operating in Mode 4. The attacks are caused by adversarial resource block selection and vary in sophistication and efficiency. In particular, we consider "oblivious" adversaries that ignore recent transmission activity on resource blocks, "smart" adversaries that do monitor activity on each resource block, and "cooperative" adversaries that work together to ensure they attack different targets. We analyze and simulate these attacks to showcase their effectiveness. Assuming a fixed number of attackers, we show that at low vehicle density, smart and cooperative attacks can significantly impact network performance, while at high vehicle density, oblivious attacks are almost as effective as the more sophisticated attacks.



There are no comments yet.


page 6

page 8

page 9


Smart Jamming Attacks in 5G New Radio: A Review

The fifth generation of wireless cellular networks (5G) is expected to b...

AdaptOver : Adaptive Overshadowing of LTE signals

We introduce AdaptOver, a new LTE signal overshadowing attack that allow...

CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks

Nowadays, vehicles have complex in-vehicle networks (IVNs) with millions...

DoS Attacks at Cooperative MAC

Cooperative networking brings performance improvement to most of the iss...

Study of the Impact of PHY and MAC Parameters in 3GPP C-V2V Mode 4

In the latest years, 3GPP has added short range cellular-vehicle-to-anyt...

Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios

In this letter, we propose three schemes designed to detect attacks over...

Exploiting Centrality: Attacks in Payment Channel Networks with Local Routing

Payment channel networks (PCN) enable scalable blockchain transactions w...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.