Konstantinos Kalogiannis, A. Henriksson, Panos Papadimitratos
{"title":"车辆协同机动的脆弱性分析","authors":"Konstantinos Kalogiannis, A. Henriksson, Panos Papadimitratos","doi":"10.1109/EuroSPW59978.2023.00006","DOIUrl":null,"url":null,"abstract":"Intelligent Transport Systems (ITS) latest standardization efforts focus on a Maneuver Coordination Service (MCS), for automated vehicles to cooperatively perform maneuvers. The goal is to avoid degrading to lower levels of automation, i.e., human input for maneuvering, e.g., when an obstacle ahead needs to be avoided. MCS-equipped vehicles communicate with nearby vehicles that are possibly affected by the impending maneuver, to establish that a maneuver can safely take place. An MCS-equipped vehicle that misbehaves can be catastrophic: transmitting falsified MCS messages or preventing their reception can mislead victim vehicles into aborting a maneuver, being delayed and, worse even, collide. In this work, we investigate the robustness of existing Maneuver Coordination Protocols (MCPs) and analyze the effect of falsification and jamming attacks. Our analysis shows an increased probability for neck injuries, i.e., whiplash, and potentially more severe injuries. As a first step towards thwarting attacks targeting MCPs, we extend MCPs to take into account on-board vehicle sensors, along with MCP messaging, before committing to a maneuver. Our results demonstrate the MCP vulnerability, the improvement thanks to the sensors, and the need to further improve MCP security. We conclude with a road-map towards a resilient MCS.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Vulnerability Analysis of Vehicular Coordinated Maneuvers\",\"authors\":\"Konstantinos Kalogiannis, A. Henriksson, Panos Papadimitratos\",\"doi\":\"10.1109/EuroSPW59978.2023.00006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intelligent Transport Systems (ITS) latest standardization efforts focus on a Maneuver Coordination Service (MCS), for automated vehicles to cooperatively perform maneuvers. The goal is to avoid degrading to lower levels of automation, i.e., human input for maneuvering, e.g., when an obstacle ahead needs to be avoided. MCS-equipped vehicles communicate with nearby vehicles that are possibly affected by the impending maneuver, to establish that a maneuver can safely take place. An MCS-equipped vehicle that misbehaves can be catastrophic: transmitting falsified MCS messages or preventing their reception can mislead victim vehicles into aborting a maneuver, being delayed and, worse even, collide. In this work, we investigate the robustness of existing Maneuver Coordination Protocols (MCPs) and analyze the effect of falsification and jamming attacks. Our analysis shows an increased probability for neck injuries, i.e., whiplash, and potentially more severe injuries. As a first step towards thwarting attacks targeting MCPs, we extend MCPs to take into account on-board vehicle sensors, along with MCP messaging, before committing to a maneuver. Our results demonstrate the MCP vulnerability, the improvement thanks to the sensors, and the need to further improve MCP security. We conclude with a road-map towards a resilient MCS.\",\"PeriodicalId\":220415,\"journal\":{\"name\":\"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)\",\"volume\":\"1 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EuroSPW59978.2023.00006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerability Analysis of Vehicular Coordinated Maneuvers
Intelligent Transport Systems (ITS) latest standardization efforts focus on a Maneuver Coordination Service (MCS), for automated vehicles to cooperatively perform maneuvers. The goal is to avoid degrading to lower levels of automation, i.e., human input for maneuvering, e.g., when an obstacle ahead needs to be avoided. MCS-equipped vehicles communicate with nearby vehicles that are possibly affected by the impending maneuver, to establish that a maneuver can safely take place. An MCS-equipped vehicle that misbehaves can be catastrophic: transmitting falsified MCS messages or preventing their reception can mislead victim vehicles into aborting a maneuver, being delayed and, worse even, collide. In this work, we investigate the robustness of existing Maneuver Coordination Protocols (MCPs) and analyze the effect of falsification and jamming attacks. Our analysis shows an increased probability for neck injuries, i.e., whiplash, and potentially more severe injuries. As a first step towards thwarting attacks targeting MCPs, we extend MCPs to take into account on-board vehicle sensors, along with MCP messaging, before committing to a maneuver. Our results demonstrate the MCP vulnerability, the improvement thanks to the sensors, and the need to further improve MCP security. We conclude with a road-map towards a resilient MCS.