Simulating Malicious Attacks on VANETs for Connected and Autonomous
Vehicle Cybersecurity: A Machine Learning Dataset
- URL: http://arxiv.org/abs/2202.07704v1
- Date: Tue, 15 Feb 2022 20:08:58 GMT
- Title: Simulating Malicious Attacks on VANETs for Connected and Autonomous
Vehicle Cybersecurity: A Machine Learning Dataset
- Authors: Safras Iqbal, Peter Ball, Muhammad H Kamarudin, Andrew Bradley
- Abstract summary: Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation.
cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs.
This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks.
- Score: 0.4129225533930965
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks
with wireless communication between vehicles and roadside infrastructure to
support safe operation. However, cybersecurity attacks pose a threat to VANETs
and the safe operation of CAVs. This study proposes the use of simulation for
modelling typical communication scenarios which may be subject to malicious
attacks. The Eclipse MOSAIC simulation framework is used to model two typical
road scenarios, including messaging between the vehicles and infrastructure -
and both replay and bogus information cybersecurity attacks are introduced. The
model demonstrates the impact of these attacks, and provides an open dataset to
inform the development of machine learning algorithms to provide anomaly
detection and mitigation solutions for enhancing secure communications and safe
deployment of CAVs on the road.
Related papers
- Proactive security defense: cyber threat intelligence modeling for connected autonomous vehicles [18.956583063203738]
We suggest an automotive CTI modeling framework, Actim, to extract and analyse the interrelated relationships among cyber threat elements.
Experiment results show that the proposed BERT-DocHiatt-BiLSTM-LSTM model exceeds the performance of existing methods.
arXiv Detail & Related papers (2024-10-21T13:49:35Z) - Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks [82.3753728955968]
We introduce a novel Mixture-of-Experts (MoE)-based SemCom system.
This system comprises a gating network and multiple experts, each specializing in different security challenges.
The gating network adaptively selects suitable experts to counter heterogeneous attacks based on user-defined security requirements.
A case study in vehicular networks demonstrates the efficacy of the MoE-based SemCom system.
arXiv Detail & Related papers (2024-09-24T03:17:51Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Survey on Security Attacks in Connected and Autonomous Vehicular Systems [0.0]
This study provides a brief review of the state of cyber security in the CAVs environment.
It categorizes the multiple cybersecurity threats and weaknesses in the context of CAVs into three groups: attacks on the vehicles network, attacks on the Internet at large, and other attacks.
It details the most uptodate defense tactics for securing CAVs and analyzes how effective they are.
arXiv Detail & Related papers (2023-10-14T06:37:05Z) - Convergence of Communications, Control, and Machine Learning for Secure
and Autonomous Vehicle Navigation [78.60496411542549]
Connected and autonomous vehicles (CAVs) can reduce human errors in traffic accidents, increase road efficiency, and execute various tasks. Reaping these benefits requires CAVs to autonomously navigate to target destinations.
This article proposes solutions using the convergence of communication theory, control theory, and machine learning to enable effective and secure CAV navigation.
arXiv Detail & Related papers (2023-07-05T21:38:36Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in
The Internet of Vehicles [7.795462813462946]
Intrusion Detection Systems (IDSs) that can identify malicious cyber-attacks have been developed.
We propose a novel ensemble IDS framework named Leader Class and Confidence Decision Ensemble (LCCDE)
LCCDE is constructed by determining the best-performing ML model among three advanced algorithms.
arXiv Detail & Related papers (2022-08-05T22:30:34Z) - COOPERNAUT: End-to-End Driving with Cooperative Perception for Networked
Vehicles [54.61668577827041]
We introduce COOPERNAUT, an end-to-end learning model that uses cross-vehicle perception for vision-based cooperative driving.
Our experiments on AutoCastSim suggest that our cooperative perception driving models lead to a 40% improvement in average success rate.
arXiv Detail & Related papers (2022-05-04T17:55:12Z) - Cybersecurity Threats in Connected and Automated Vehicles based
Federated Learning Systems [7.979659145328856]
Federated learning (FL) aims at training an algorithm across decentralized entities holding their local data private.
Most cyber defense techniques depend on highly reliable and connected networks.
This paper explores falsified information attacks, which target the FL process that is ongoing at the RSU.
arXiv Detail & Related papers (2021-02-26T01:39:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.