Simulation of Cyberattacks in ITS-G5 Systems

2020 
Connected vehicles bring new challenges for communication technologies. Vehicles become capable of performing actions depending on wireless V2X communications (ex: automatic emergency braking, crossing paths with other vehicles, handling platooning situations). Despite being essential in the case of industrial deployments, cybersecurity also acts as a scientific lock to secure the system from its conception. Facing with the increasing number of cyberattacks, but also with the increasing of the attack surface of vehicles, the securing of V2X communications is necessary. However, all existing attacks cannot always be tested with proper hardware. The simulation software approach allows us to free ourselves from this constraint. In this paper, we investigate the security vulnerabilities of ITS-G5 (European DSRC) communications in the presence of outside attackers. We considered 4 attacks: jamming, replay, falsification and network congestion. We used VENTOS platform to execute the different scenarios and demonstrated with it that these attacks have a real impact on vehicle’s driving.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    11
    References
    0
    Citations
    NaN
    KQI
    []