Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything
Author :
Publisher :
Total Pages : 70
Release :
ISBN-10 : OCLC:1292477302
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything by : Geoff Twardokus

Download or read book Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything written by Geoff Twardokus and published by . This book was released on 2021 with total page 70 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-to-vehicle (V2V) communication will allow vehicles to directly exchange messages, improving their situational awareness and allowing drivers or (semi-)autonomous vehicles to avoid collisions, particularly in non-line-of-sight scenarios. Thus, V2V has the potential to reduce annual vehicular crashes and fatalities by hundreds of thousands. Cellular Vehicle-to-Everything (C-V2X) is rapidly supplanting older V2V protocols and will play a critical role in achieving these outcomes. As extremely low latency is required to facilitate split-second collision avoidance maneuvers, ensuring the availability of C-V2X is imperative for safe and secure intelligent transportation systems. However, little work has analyzed the physical- (PHY) and MAC-layer resilience of C-V2X against intelligent, protocol-aware denial-of-service (DoS) attacks by stealthy adversaries. In this thesis, we expose fundamental security vulnerabilities in the PHY- and MAC-layer designs of C-V2X and demonstrate how they can be exploited to devastating effect by devising two novel, intelligent DoS attacks against C-V2X: targeted sidelink jamming and sidelink resource exhaustion. Our attacks demonstrate different ways an intelligent adversary can dramatically degrade the availability of C-V2X for one or many vehicles, increasing the likelihood of fatal vehicle collisions. Through hardware experiments with software-defined radios (SDRs) and state-of-the-art C-V2X devices in combination with extensive MATLAB simulation, we demonstrate the viability and effectiveness of our attacks. We show that targeted sidelink jamming can reduce a targeted vehicle's packet delivery ratio by 90% in a matter of seconds, while sidelink resource exhaustion can reduce C-V2X channel throughput by up to 50% in similarly short order. We further provide and validate detection techniques for each attack based on cluster and regression analysis techniques and propose promising, preliminary approaches to mitigate the underlying vulnerabilities that we expose in the PHY/MAC layers of C-V2X."--Abstract.


Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything Related Books

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything
Language: en
Pages: 70
Authors: Geoff Twardokus
Categories: Ad hoc networks (Computer networks)
Type: BOOK - Published: 2021 - Publisher:

DOWNLOAD EBOOK

"Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-
Vehicle Safety Communications
Language: en
Pages: 314
Authors: Tao Zhang
Categories: Technology & Engineering
Type: BOOK - Published: 2012-09-04 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology I
Network Security Attacks and Countermeasures
Language: en
Pages: 374
Authors: G., Dileep Kumar
Categories: Computers
Type: BOOK - Published: 2016-01-18 - Publisher: IGI Global

DOWNLOAD EBOOK

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingl
Advanced Applications of Blockchain Technology
Language: en
Pages: 278
Authors: Shiho Kim
Categories: Technology & Engineering
Type: BOOK - Published: 2019-09-24 - Publisher: Springer Nature

DOWNLOAD EBOOK

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and
The Art of Intrusion
Language: en
Pages: 354
Authors: Kevin D. Mitnick
Categories: Computers
Type: BOOK - Published: 2009-03-17 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now