CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

The platooning is an emerging concept in VANETS that involves a group of vehicles behaving as a single unit via the coordination of movement. The emergence of autonomous vehicles has bolstered the evolution of platooning as a trend in mobility and transportation. The autonomous vehicles and the elimination of individual and manual capabilities introduces new risks. The safety of the cargos, passenger and the advanced technology had increased the complication of the security concerns in platooning as it may attract malicious actors. In improving the security of the platoon, the threat and their potential impacts on the vehicular systems should be identified to ensure the development of security features that will secure against the identified risks. In this paper, two critical types of security breaches were identified those are Sybil attack and Delay attacks. Those security attacks can be somewhat disruptive and dangerous to the regular operation of the platoon leading to severe injuries, increased fuel consumption and delay the performance of the network. The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.

___

  • B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.
  • F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
  • S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.
  • S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.
  • V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.
  • S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.
  • S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.
  • A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.
  • H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.
  • Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.
  • P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.
  • M. Y. Abualhoul, M. Marouf, O. Shagdar, and F. Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.
  • W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.
  • X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.
  • X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.
  • S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.
  • M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.
  • R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7'h International Conference on Intelligent Systems and Control (ISCO 2013)
  • Y. Zhang and G. Cao, "V-PADA: Vehicle-Platoon-Aware Data Access in VANETs," IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.
  • M. Su. and S. Ahn, "Autonomous platoon formation for VANET-enabled vehicles," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.
  • [21] H. Hexmoor, S. Alsamaraee and M. Almaghshi, "BlockChain for Improved Platoon Security," International Journal of Information Systems and Computer Sciences, vol. 7, no. 2, pp. 1-6, 2018.
  • M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, "Vehicle platoon control with multi-configuration ability," Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.
  • M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.
  • J. Liu, D. Ma, A. Weimerskirch and H. Zhu, "Secure and Safe Automated Vehicle Platooning," IEEE Reliability Society, Detroit, 2016.
  • MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.
Sakarya University Journal of Science-Cover
  • Yayın Aralığı: Yılda 6 Sayı
  • Başlangıç: 1997
  • Yayıncı: Sakarya Üniversitesi
Sayıdaki Diğer Makaleler

Low Power-High Gain Bulk-Driven 3 Stages CMOS Miller OTA in 130nm Technology

Engin AFACAN

Groundwater Pollution Connected to Multiple Effect: A Case Study Kaman (Kırşehir, Turkey)

Tülay EKEMEN KESKİN, Bahadır SUBAŞI, Feyza GİRİŞEN, Zeynel BAŞIBÜYÜK

Phytochemical Screening of Bioactive Components of Medicinal Plant Ajuga chamaepitys subsp. laevigata (Banks & Sol.) P.H.Davis and Ajuga bombycina Boiss. by GC-MS Analysis

Alevcan KAPLAN

Theoretical and Experimental Comparison of Micro-hardness and Bulk Modulus of Orthorhombic YBa2Cu3-xZnxO Superconductor Nanoparticles Manufactured using Sol-Gel Method

Elif AŞIKUZUN, Özgür ÖZTÜRK

On a Generalized Difference Sequence Spaces of Fractional Order associated with Multiplier Sequence Defined by A Modulus Function

Taja YAYING

CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

Mohammed AL SHEIKHLY, Sefer KURNAZ

The Role of Sodium Lauryl Sulfate on the Film Properties of Styrene-Butyl Acrylate-Acrylic Acid Copolymer Latex

Bilge EREN, Yasemin SOLMAZ

Classification of Breast Cancer Images Using Ensembles of Transfer Learning

Kadir GUZEL, Gokhan BILGIN

Ontology-based Instantaneous Route Suggestion of Enemy Warplanes with Unknown Mission Profile

Emre ÇİNTAŞ, Barış ÖZYER, Sinan HANAY

Investigation of the Frequency and Voltage Dependent Dielectric Properties of Au/n-SiC Metal Semiconductor (MS) and Au/Al2O3/n-SiC Metal-Insulator-Semiconductor (MIS) Structures

Gülçin ERSÖZ DEMİR, İbrahim YÜCEDAĞ