Abstract

The communication network of autonomous vehicles is composed of multiple sensors working together, and its dynamic topology makes it vulnerable to common attacks such as black hole attack, gray hole attack, rushing attack, and flooding attack, which pose a threat to the safety of passengers and vehicles; most of the existing safety detection mechanisms for a vehicle can only detect attacks but cannot intelligently defend against attacks. To this end, an efficient protection mechanism based on self-adaptive decision (SD-EPM) is proposed, which is divided into the offline phase and the online phase. The online phase consists of two parts: intrusion detection and efficient response. Attack detection and defense in the vehicular ad hoc networks (VANETs) are performed in terms of the attack credibility value (AC), the network performance attenuation value (NPA), and the list of self-adaptive decision. The simulation results show that the proposed mechanism can correctly identify the attack and respond effectively to different attack types. And, the negative impact on VANETs is small.

Highlights

  • With the promotion of autonomous vehicles in life, the safety of vehicular ad hoc networks (VANETs) has become crucial

  • VANET is an adaptive wireless network that connects mobile vehicles in which mobile vehicles work together by transmitting data packets to each other. e working principle of an autonomous vehicle is shown in Figure 1. e sensors, the communication system, and the on-board units (OBU) cowork to provide a wide range of services for vehicles and the infrastructure [1]

  • Autonomous vehicles require the latest motion data, communication protocols, and assistance of positioning systems to achieve efficient and reliable exchange of information with each other. e autonomous vehicle transmits a warning message and a cooperative awareness message (CAM) over the wireless network to transmit its own state to other vehicles within the radio coverage to determine the motion state of each vehicle, ensuring the normal operation of the vehicle system. e devices on autonomous vehicles play a vital role in providing short-range wireless ad hoc networks for transmitting the required motion and control data to the vehicle network, helping to improve the efficiency and safety of traffic [2]

Read more

Summary

Introduction

With the promotion of autonomous vehicles in life, the safety of vehicular ad hoc networks (VANETs) (explanations of all abbreviations in the text are given in the end) has become crucial. Autonomous vehicles require the latest motion data, communication protocols, and assistance of positioning systems to achieve efficient and reliable exchange of information with each other. E devices on autonomous vehicles play a vital role in providing short-range wireless ad hoc networks for transmitting the required motion and control data to the vehicle network, helping to improve the efficiency and safety of traffic [2]. The random movement of the vehicle, the stalling at any time, the speed of the vehicle, the high dynamic topology, the lack of a fixed security system, and the peak period of the road [3] will enable the intruder to launch an attack without physical access, which brings serious security problems to VANETs. Traditional systems cannot protect the sensitive information or control data of a communication system or the host device from internal/external attacks. Traditional systems cannot protect the sensitive information or control data of a communication system or the host device from internal/external attacks. erefore, Mobile Information Systems

Electronically controlled steering or throttle or brake
Select response behavior Selected intrusion response
No punishment
Simulation Results and Analysis
No punishment Attacker bypass Full isolation
Rushing Black hole and gray and gray

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.