Proceedings 2015 Workshop on Security of Emerging Networking Technologies 2015
DOI: 10.14722/sent.2015.23001
|View full text |Cite
|
Sign up to set email alerts
|

Congestion Attacks to Autonomous Cars Using Vehicular Botnets

Abstract: The increasing popularity and acceptance of VANETs will make the deployment of autonomous vehicles easier and faster since the VANET will reduce dependence on expensive sensors. However, these benefits are counterbalanced by possible security attacks. We demonstrate a VANET-based botnet attack in an autonomous vehicle scenario that can cause serious congestion by targeting hot spot road segments. We show via simulation that the attack can increase the trip times of the cars in the targeted area by orders of ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 22 publications
0
23
0
1
Order By: Relevance
“…Mevlut et al [8] demonstrate the problems vehicular botnets introduce to the autonomous car setting via a simulation study. In their work, they focus on producing physical congestion on a given road segment and do not discuss the effects of network level congestion through botnets of compromised cars.…”
Section: B Network Layer Attacksmentioning
confidence: 99%
“…Mevlut et al [8] demonstrate the problems vehicular botnets introduce to the autonomous car setting via a simulation study. In their work, they focus on producing physical congestion on a given road segment and do not discuss the effects of network level congestion through botnets of compromised cars.…”
Section: B Network Layer Attacksmentioning
confidence: 99%
“…We achieve this by taking advantage of powerful adversarial entities-vehicular botnets. Since methods for compromising a single vehicle have been demonstrated in [21] and [23], we show in [10] that compromising multiple vehicles and organizing them into botnets is very feasible. Vehicular botnets allow powerful attacks that are impossible with a single compromised vehicle.…”
Section: Introductionmentioning
confidence: 97%
“…Although privacy is an important concern for systems collecting user data, it is unfortunately not the only risk, as widespread vulnerabilities [2], [3], [4] can be exploited by attackers to inject false data into the system. For example, attackers can inject fake data in crowdsourced vehicular services [5], [6], [7], [8] to cause non-existent congestion alarms and accidents that never happened, triggering the services to automatically reroute traffic because of false information.…”
Section: Introductionmentioning
confidence: 99%