论文标题

用于模拟排网攻击排的CAD框架

A CAD Framework for Simulation of Network Level Attack on Platoons

论文作者

Koley, Ipsita, Adhikary, Sunandan, Rohit, Rohit, Dey, Soumyajit

论文摘要

智能移动域的最新发展已将汽车转变为网络运输代理,以帮助实现新时代的大规模智能运输系统(ITS)。这种联网运输背后的动机是提高道路安全性和交通效率。在此设置中,车辆可以共享有关其速度和/或加速度值的信息,而基础架构可以与他们共享流量信号数据。这使连接的车辆(CVS)能够在移动时了解其周围环境。但是,车辆间通信通道可显着拓宽攻击表面。车辆间网络使攻击者能够远程启动攻击。攻击者可以通过降低交通效率来造成碰撞以及妨碍性能。因此,必须在CVS开发周期的早期阶段考虑安全漏洞。据我们所知,没有使用这种自动模拟工具使用工程师可以在攻击者存在下验证简历原型的性能。在这项工作中,我们提出了一个自动化的工具流,该工具流有助于虚假数据注射攻击合成和对可定制的排结构和车辆动力学的模拟。该工具可用于模拟和设计和验证CVS的控制理论轻重量攻击检测和缓解算法。

Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents helping realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among themselves and infrastructures can share traffic signal data with them. This enables the connected vehicles (CVs) to stay informed about their surroundings while moving. However, the inter-vehicle communication channels significantly broaden the attack surface. The inter-vehicle network enables an attacker to remotely launch attacks. An attacker can create collision as well as hamper performance by reducing the traffic efficiency. Thus, security vulnerabilities must be taken into consideration in the early phase of the development cycle of CVs. To the best of our knowledge, there exists no such automated simulation tool using which engineers can verify the performance of CV prototypes in the presence of an attacker. In this work, we present an automated tool flow that facilitates false data injection attack synthesis and simulation on customizable platoon structure and vehicle dynamics. This tool can be used to simulate as well as design and verify control-theoretic light-weight attack detection and mitigation algorithms for CVs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源