Smart City Gnosys

Smart city article details

Title Resistance To Cybersecurity Attacks In A Novel Network For Autonomous Vehicles
ID_Doc 46048
Authors Brocklehurst C.; Radenkovic M.
Year 2022
Published Journal of Sensor and Actuator Networks, 11, 3
DOI http://dx.doi.org/10.3390/jsan11030035
Abstract The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic. © 2022 by the authors.
Author Keywords opportunistic networks; security; VANETS


Similar Articles


Id Similarity Authors Title Published
31055 View0.896Gul B.; Ertam F.In-Vehicle Communication Cyber Security: A Comprehensive Review Of Challenges And SolutionsVehicular Communications, 50 (2024)
11021 View0.891Alwasel A.; Mishra S.; AlShehri M.Attacks On The Vehicle Ad-Hoc Network From CyberspaceInternational Journal of Advanced Computer Science and Applications, 14, 7 (2023)
16986 View0.87Yigit Y.; Panitsas I.; Maglaras L.; Tassiulas L.; Canberk B.Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection For Vehicular Ad-Hoc NetworksIEEE International Conference on Communications (2024)
57297 View0.869Doan H.H.; Paul A.A.; Zeindlinger H.; Zhang Y.; Khan S.; Svetinovic D.Threat Modeling For Ml-Based Topology Prediction In Vehicular Edge Computing Architecture2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023 (2023)
15025 View0.864Ilavendhan A.; Saruladha K.Comparative Analysis Of Various Approaches For Dos Attack Detection In VanetsProceedings of the International Conference on Electronics and Sustainable Communication Systems, ICESC 2020 (2020)
37148 View0.864Dean A.; Huber B.; Kandah F.Mitigating Location-Based Attacks Using Predication Models In Vehicular Ad-Hoc NetworksProceedings - IEEE Consumer Communications and Networking Conference, CCNC (2022)
44548 View0.862Bangui H.; Buhnova B.Recent Advances In Machine-Learning Driven Intrusion Detection In Transportation: SurveyProcedia Computer Science, 184 (2021)
39278 View0.861Alhindawi N.; Al Zamil M.G.H.I.; Alsakran J.; Muard O.; Alzyoud A.Node-Replication Attack Detection In Vehicular Ad-Hoc Networks Based On Automatic ApproachInformation Sciences Letters, 11, 3 (2022)
2469 View0.859Rabah N.B.; Idoudi H.A Machine Learning Framework For Intrusion Detection In Vanet CommunicationsEmerging Trends in Cybersecurity Applications (2022)
17014 View0.859Kim K.; Kim J.S.; Jeong S.; Park J.-H.; Kim H.K.Cybersecurity For Autonomous Vehicles: Review Of Attacks And DefenseComputers and Security, 103 (2021)