Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything PDF Author: Geoff Twardokus
Publisher:
ISBN:
Category : Ad hoc networks (Computer networks)
Languages : en
Pages : 70

Get Book Here

Book Description
"Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-to-vehicle (V2V) communication will allow vehicles to directly exchange messages, improving their situational awareness and allowing drivers or (semi-)autonomous vehicles to avoid collisions, particularly in non-line-of-sight scenarios. Thus, V2V has the potential to reduce annual vehicular crashes and fatalities by hundreds of thousands. Cellular Vehicle-to-Everything (C-V2X) is rapidly supplanting older V2V protocols and will play a critical role in achieving these outcomes. As extremely low latency is required to facilitate split-second collision avoidance maneuvers, ensuring the availability of C-V2X is imperative for safe and secure intelligent transportation systems. However, little work has analyzed the physical- (PHY) and MAC-layer resilience of C-V2X against intelligent, protocol-aware denial-of-service (DoS) attacks by stealthy adversaries. In this thesis, we expose fundamental security vulnerabilities in the PHY- and MAC-layer designs of C-V2X and demonstrate how they can be exploited to devastating effect by devising two novel, intelligent DoS attacks against C-V2X: targeted sidelink jamming and sidelink resource exhaustion. Our attacks demonstrate different ways an intelligent adversary can dramatically degrade the availability of C-V2X for one or many vehicles, increasing the likelihood of fatal vehicle collisions. Through hardware experiments with software-defined radios (SDRs) and state-of-the-art C-V2X devices in combination with extensive MATLAB simulation, we demonstrate the viability and effectiveness of our attacks. We show that targeted sidelink jamming can reduce a targeted vehicle's packet delivery ratio by 90% in a matter of seconds, while sidelink resource exhaustion can reduce C-V2X channel throughput by up to 50% in similarly short order. We further provide and validate detection techniques for each attack based on cluster and regression analysis techniques and propose promising, preliminary approaches to mitigate the underlying vulnerabilities that we expose in the PHY/MAC layers of C-V2X."--Abstract.

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything

Intelligent Lower-layer Denial-of-service Attacks Against Cellular Vehicle-to-everything PDF Author: Geoff Twardokus
Publisher:
ISBN:
Category : Ad hoc networks (Computer networks)
Languages : en
Pages : 70

Get Book Here

Book Description
"Vehicle-to-everything (V2X) communication promises a wide range of benefits for society. Within future V2X-enabled intelligent transportation systems, vehicle-to-vehicle (V2V) communication will allow vehicles to directly exchange messages, improving their situational awareness and allowing drivers or (semi-)autonomous vehicles to avoid collisions, particularly in non-line-of-sight scenarios. Thus, V2V has the potential to reduce annual vehicular crashes and fatalities by hundreds of thousands. Cellular Vehicle-to-Everything (C-V2X) is rapidly supplanting older V2V protocols and will play a critical role in achieving these outcomes. As extremely low latency is required to facilitate split-second collision avoidance maneuvers, ensuring the availability of C-V2X is imperative for safe and secure intelligent transportation systems. However, little work has analyzed the physical- (PHY) and MAC-layer resilience of C-V2X against intelligent, protocol-aware denial-of-service (DoS) attacks by stealthy adversaries. In this thesis, we expose fundamental security vulnerabilities in the PHY- and MAC-layer designs of C-V2X and demonstrate how they can be exploited to devastating effect by devising two novel, intelligent DoS attacks against C-V2X: targeted sidelink jamming and sidelink resource exhaustion. Our attacks demonstrate different ways an intelligent adversary can dramatically degrade the availability of C-V2X for one or many vehicles, increasing the likelihood of fatal vehicle collisions. Through hardware experiments with software-defined radios (SDRs) and state-of-the-art C-V2X devices in combination with extensive MATLAB simulation, we demonstrate the viability and effectiveness of our attacks. We show that targeted sidelink jamming can reduce a targeted vehicle's packet delivery ratio by 90% in a matter of seconds, while sidelink resource exhaustion can reduce C-V2X channel throughput by up to 50% in similarly short order. We further provide and validate detection techniques for each attack based on cluster and regression analysis techniques and propose promising, preliminary approaches to mitigate the underlying vulnerabilities that we expose in the PHY/MAC layers of C-V2X."--Abstract.

Vehicle Safety Communications

Vehicle Safety Communications PDF Author: Tao Zhang
Publisher: John Wiley & Sons
ISBN: 1118452194
Category : Technology & Engineering
Languages : en
Pages : 314

Get Book Here

Book Description
Provides an up-to-date, in-depth look at the current research, design, and implementation of cooperative vehicle safety communication protocols and technology Improving traffic safety has been a top concern for transportation agencies around the world and the focus of heavy research and development efforts sponsored by both governments and private industries. Cooperative vehicle systems—which use sensors and wireless technologies to reduce traffic accidents—can play a major role in making the world's roads safer. Vehicle Safety Communications: Protocols, Security, and Privacy describes fundamental issues in cooperative vehicle safety and recent advances in technologies for enabling cooperative vehicle safety. It gives an overview of traditional vehicle safety issues, the evolution of vehicle safety technologies, and the need for cooperative systems where vehicles work together to reduce the number of crashes or mitigate damage when crashes become unavoidable. Authored by two top industry professionals, the book: Summarizes the history and current status of 5.9 GHz Dedicated Short Range Communications (DSRC) technology and standardization, discussing key issues in applying DSRC to support cooperative vehicle safety Features an in-depth overview of on-board equipment (OBE) and roadside equipment (RSE) by describing sample designs to illustrate the key issues and potential solutions Takes on security and privacy protection requirements and challenges, including how to design privacy-preserving digital certificate management systems and how to evict misbehaving vehicles Includes coverage of vehicle-to-infrastructure (V2I) communications like intersection collision avoidance applications and vehicle-to-vehicle (V2V) communications like extended electronic brake lights and intersection movement assist Vehicle Safety Communications is ideal for anyone working in the areas of—or studying—cooperative vehicle safety and vehicle communications.

Network Security Attacks and Countermeasures

Network Security Attacks and Countermeasures PDF Author: G., Dileep Kumar
Publisher: IGI Global
ISBN: 1466687622
Category : Computers
Languages : en
Pages : 374

Get Book Here

Book Description
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Advanced Applications of Blockchain Technology

Advanced Applications of Blockchain Technology PDF Author: Shiho Kim
Publisher: Springer Nature
ISBN: 9811387753
Category : Technology & Engineering
Languages : en
Pages : 278

Get Book Here

Book Description
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

The Art of Intrusion

The Art of Intrusion PDF Author: Kevin D. Mitnick
Publisher: John Wiley & Sons
ISBN: 0470503823
Category : Computers
Languages : en
Pages : 354

Get Book Here

Book Description
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Advanced Technologies for Intelligent Transportation Systems

Advanced Technologies for Intelligent Transportation Systems PDF Author: Marco Picone
Publisher: Springer
ISBN: 3319106686
Category : Technology & Engineering
Languages : en
Pages : 252

Get Book Here

Book Description
This book focuses on emerging technologies in the field of Intelligent Transportation Systems (ITSs) namely efficient information dissemination between vehicles, infrastructures, pedestrians and public transportation systems. It covers the state-of-the-art of Vehicular Ad-hoc Networks (VANETs), with centralized and decentralized (Peer-to-Peer) communication architectures, considering several application scenarios. With a detailed treatment of emerging communication paradigms, including cross networking and distributed algorithms. Unlike most of the existing books, this book presents a multi-layer overview of information dissemination systems, from lower layers (MAC) to high layers (applications). All those aspects are investigated considering the use of mobile devices, such as smartphones/tablets and embedded systems, i.e. technologies that during last years completely changed the current market, the user expectations, and communication networks. The presented networking paradigms are supported and validated by means of extensive simulative analysis and real field deployments in different application scenarios. This book represents a reference for professional technologist, postgraduates and researchers in the area of Intelligent Transportation Systems (ITSs), wireless communication and distributed systems.

Deep Learning in Personalized Healthcare and Decision Support

Deep Learning in Personalized Healthcare and Decision Support PDF Author: Harish Garg
Publisher: Elsevier
ISBN: 0443194149
Category : Computers
Languages : en
Pages : 402

Get Book Here

Book Description
Deep Learning in Personalized Healthcare and Decision Support discusses the potential of deep learning technologies in the healthcare sector. The book covers the application of deep learning tools and techniques in diverse areas of healthcare, such as medical image classification, telemedicine, clinical decision support system, clinical trials, electronic health records, precision medication, Parkinson disease detection, genomics, and drug discovery. In addition, it discusses the use of DL for fraud detection and internet of things. This is a valuable resource for researchers, graduate students and healthcare professionals who are interested in learning more about deep learning applied to the healthcare sector. Although there is an increasing interest by clinicians and healthcare workers, they still lack enough knowledge to efficiently choose and make use of technologies currently available. This book fills that knowledge gap by bringing together experts from technology and clinical fields to cover the topics in depth. Discusses the application of deep learning in several areas of healthcare, including clinical trials, telemedicine and health records management Brings together experts in the intersection of deep learning, medicine, healthcare and programming to cover topics in an interdisciplinary way Uncovers the stakes and possibilities involved in realizing personalized healthcare services through efficient and effective deep learning technologies

Intelligent Vehicles

Intelligent Vehicles PDF Author: Felipe Jiménez
Publisher: Butterworth-Heinemann
ISBN: 012813108X
Category : Technology & Engineering
Languages : en
Pages : 505

Get Book Here

Book Description
Intelligent Road Vehicles examines specific aspects of intelligent vehicles such as enabling technologies, human factors and an analysis of social and economic impacts. The book is an invaluable resource for those pursuing deeper knowledge in the intelligent vehicles field, providing readers with an idea of current and future technologies, current projects and developments and the future of intelligent vehicles. Intelligent road vehicles are becoming a challenging area of research worldwide. Apart from the final applications and systems in vehicles, there are many enabling technologies that should be introduced. Communications and automation are two key areas for future automobiles. This book benefits from collaboration on the Thematic Network on Intelligent Vehicles led by Felipe Jimenez. Provides a general overview of different aspects related to intelligent road vehicles (sensors, applications, communications, automation, human factors, etc.) Addresses the different components and building blocks of intelligent vehicles in a single, comprehensive reference Explains how sensors are interpreted, including how different sensor readings are fused Addresses issues involved with avoiding collisions and other factors such as pot holes, unclear road lines or markings, and unexpected weather conditions

Intelligent Vehicular Networks and Communications

Intelligent Vehicular Networks and Communications PDF Author: Anand Paul
Publisher: Elsevier
ISBN: 0128095466
Category : Transportation
Languages : en
Pages : 244

Get Book Here

Book Description
Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today’s Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles. Proposes cooperative, cognitive, intelligent vehicular networks Examines how intelligent transportation systems make more efficient transportation in urban environments Outlines next generation vehicular networks technology

AI and Blockchain Technology in 6G Wireless Network

AI and Blockchain Technology in 6G Wireless Network PDF Author: Malaya Dutta Borah
Publisher: Springer Nature
ISBN: 9811928681
Category : Computers
Languages : en
Pages : 263

Get Book Here

Book Description
This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.