Search Results

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything

Download or Read eBook Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything PDF written by Geoff Twardokus and published by . This book was released on 2021 with total page 70 pages. Available in PDF, EPUB and Kindle.
Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything
Author :
Publisher :
Total Pages : 70
Release :
ISBN-10 : OCLC:1292477302
ISBN-13 :
Rating : 4/5 (02 Downloads)

Book Synopsis Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything by : Geoff Twardokus

Book excerpt: "Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-to-vehicle (V2V) communication will allow vehicles to directly exchange messages, improving their situational awareness and allowing drivers or (semi-)autonomous vehicles to avoid collisions, particularly in non-line-of-sight scenarios. Thus, V2V has the potential to reduce annual vehicular crashes and fatalities by hundreds of thousands. Cellular Vehicle-to-Everything (C-V2X) is rapidly supplanting older V2V protocols and will play a critical role in achieving these outcomes. As extremely low latency is required to facilitate split-second collision avoidance maneuvers, ensuring the availability of C-V2X is imperative for safe and secure intelligent transportation systems. However, little work has analyzed the physical- (PHY) and MAC-layer resilience of C-V2X against intelligent, protocol-aware denial-of-service (DoS) attacks by stealthy adversaries. In this thesis, we expose fundamental security vulnerabilities in the PHY- and MAC-layer designs of C-V2X and demonstrate how they can be exploited to devastating effect by devising two novel, intelligent DoS attacks against C-V2X: targeted sidelink jamming and sidelink resource exhaustion. Our attacks demonstrate different ways an intelligent adversary can dramatically degrade the availability of C-V2X for one or many vehicles, increasing the likelihood of fatal vehicle collisions. Through hardware experiments with software-defined radios (SDRs) and state-of-the-art C-V2X devices in combination with extensive MATLAB simulation, we demonstrate the viability and effectiveness of our attacks. We show that targeted sidelink jamming can reduce a targeted vehicle's packet delivery ratio by 90% in a matter of seconds, while sidelink resource exhaustion can reduce C-V2X channel throughput by up to 50% in similarly short order. We further provide and validate detection techniques for each attack based on cluster and regression analysis techniques and propose promising, preliminary approaches to mitigate the underlying vulnerabilities that we expose in the PHY/MAC layers of C-V2X."--Abstract.


Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything Related Books

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything
Language: en
Pages: 70
Authors: Geoff Twardokus
Categories: Ad hoc networks (Computer networks)
Type: BOOK - Published: 2021 - Publisher:

DOWNLOAD EBOOK

"Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-
Vehicle Safety Communications
Language: en
Pages: 314
Authors: Tao Zhang
Categories: Technology & Engineering
Type: BOOK - Published: 2012-09-04 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology I
Vehicular Social Networks
Language: en
Pages: 192
Authors: Anna Maria Vegni
Categories: Computers
Type: BOOK - Published: 2017-03-31 - Publisher: CRC Press

DOWNLOAD EBOOK

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects app
Security and Privacy Vision in 6G
Language: en
Pages: 389
Authors: Pawani Porambage
Categories: Technology & Engineering
Type: BOOK - Published: 2023-08-08 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication with this comprehensive study 6G is the next frontier in mobile communication,
Advanced Applications of Blockchain Technology
Language: en
Pages: 278
Authors: Shiho Kim
Categories: Technology & Engineering
Type: BOOK - Published: 2019-09-24 - Publisher: Springer Nature

DOWNLOAD EBOOK

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and
Scroll to top