Takafumi Harada, Keita Hasegawa, Yu Dan, T. Washio, Yoshihito Oshima
{"title":"Security analysis for cits-soc using sensor data from connected vehicles: demo abstract","authors":"Takafumi Harada, Keita Hasegawa, Yu Dan, T. Washio, Yoshihito Oshima","doi":"10.1145/3302509.3313333","DOIUrl":null,"url":null,"abstract":"Cooperative ITS (CITS) is expected to contribute to a safer and more efficient transportation society by using sensor data shared from connected vehicles. To ensure the safety of such systems, we are working on technology for detecting and responding to cyber attacks via malicious information transmission against CITS. In this demonstration, the following two scenarios are visualized based on the assumption that a service providing the optimum route using sensor-probe information will be implemented in the near future. In the first scenario, using simulations of the Tokyo Metropolitan Expressway traffic flow, we show the potential threats of false-data-injection attacks on transmitted sensor information. In the second scenario, we show that our new detect-and-respond technology can mitigate these threats.","PeriodicalId":413733,"journal":{"name":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3302509.3313333","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cooperative ITS (CITS) is expected to contribute to a safer and more efficient transportation society by using sensor data shared from connected vehicles. To ensure the safety of such systems, we are working on technology for detecting and responding to cyber attacks via malicious information transmission against CITS. In this demonstration, the following two scenarios are visualized based on the assumption that a service providing the optimum route using sensor-probe information will be implemented in the near future. In the first scenario, using simulations of the Tokyo Metropolitan Expressway traffic flow, we show the potential threats of false-data-injection attacks on transmitted sensor information. In the second scenario, we show that our new detect-and-respond technology can mitigate these threats.