2021
DOI: 10.1186/s13638-021-01971-x
|View full text |Cite
|
Sign up to set email alerts
|

CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks

Abstract: The main goal of the H2020-CARAMEL project is to address the cybersecurity gaps introduced by the new technological domains adopted by modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques. As a result, CARAMEL enhances the protection against threats related to automated driving, smart charging of Electric Vehicles, and communication among vehicles or between vehicles and the roadside infrastructure. This work focuses on the latter and presents the CARAMEL arc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…Such malicious GPS signals can be verified via the location information retrieved from the base station [154]. However, security vulnerabilities that exist in IEEE 802.11p and C-V2X technologies can lead to geolocation data poisoning attacks in cases of verifying valid GPS satellite information via RSUs or base stations [116], [154]. The severity of GPS spoofing attack is generally moderate, but it can be particularly critical for high-level AVs.…”
Section: Attack Classificationmentioning
confidence: 99%
“…Such malicious GPS signals can be verified via the location information retrieved from the base station [154]. However, security vulnerabilities that exist in IEEE 802.11p and C-V2X technologies can lead to geolocation data poisoning attacks in cases of verifying valid GPS satellite information via RSUs or base stations [116], [154]. The severity of GPS spoofing attack is generally moderate, but it can be particularly critical for high-level AVs.…”
Section: Attack Classificationmentioning
confidence: 99%
“…Saturating/Jamming the lidar [18], blinding the camera [18], spoofing the signal of GPS [18] or the lidar [17] are some of the attacks that can have a significant effect on the vehicle's behavior. For instance, Vitale et al [24] focus on the H2020-CARAMEL project, which addresses the cybersecurity gaps introduced by the new technological domains. More specifically, in [24], the potential threats and vulnerabilities on the vehicle's sensors, i.e., the GPS receiver, have been presented.…”
Section: B Attacks On Sensors Exploiting Their Vulnerabilitiesmentioning
confidence: 99%
“…For instance, Vitale et al [24] focus on the H2020-CARAMEL project, which addresses the cybersecurity gaps introduced by the new technological domains. More specifically, in [24], the potential threats and vulnerabilities on the vehicle's sensors, i.e., the GPS receiver, have been presented. In sensor attacks, it is assumed that the attacker is outside the vehicle and targets sensor data acquisition.…”
Section: B Attacks On Sensors Exploiting Their Vulnerabilitiesmentioning
confidence: 99%
“…Once again, each vehicle estimates only its own state. Localizing either vehicles or unmanned aerial vehicles in the presence of position outliers caused by cyberattacks or GPSdenied environments are discussed in [7] and [8]. The former formulates a centralized convex optimization problem in order to robustify position estimations, while the latter makes use of the renowned multi-dimensional scaling algorithm for centralized inter-and intra-cluster relative localization.…”
Section: Introductionmentioning
confidence: 99%