This work explores model-based attack injection technique to analyse the severity of attacks to a platoon made of autonomous vehicles. Once the model of the cyber-physical system has been defined and built, we proceed to the identification of the threats that may be used to exploit the vulnerabilities of the control system of the autonomous car. Then we design driving and attack scenarios, and run several simulations in case of platoon under attack. We explore different combinations of attack parameters and driving scenarios by using the Design Space Exploration. Finally, we use the collected simulation traces to improve the knowledge on the resiliency of the system to the attacks; as well as to gauge the severity of the attacks and the possible relations between the attack parameter and the effect on the overall behavior of the system. The methodology provides quantitative evidence for risk assessment and reveals critical vulnerabilities in platoon coordination mechanisms.

Severity of Attacks in a Vehicle Platoon by Model-Based Simulation

Cinzia Bernardeschi;Giuseppe Lettieri;Dario Pagani;
In corso di stampa

Abstract

This work explores model-based attack injection technique to analyse the severity of attacks to a platoon made of autonomous vehicles. Once the model of the cyber-physical system has been defined and built, we proceed to the identification of the threats that may be used to exploit the vulnerabilities of the control system of the autonomous car. Then we design driving and attack scenarios, and run several simulations in case of platoon under attack. We explore different combinations of attack parameters and driving scenarios by using the Design Space Exploration. Finally, we use the collected simulation traces to improve the knowledge on the resiliency of the system to the attacks; as well as to gauge the severity of the attacks and the possible relations between the attack parameter and the effect on the overall behavior of the system. The methodology provides quantitative evidence for risk assessment and reveals critical vulnerabilities in platoon coordination mechanisms.
File in questo prodotto:
File Dimensione Formato  
preprint.pdf

accesso aperto

Tipologia: Documento in Pre-print
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.91 MB
Formato Adobe PDF
1.91 MB Adobe PDF Visualizza/Apri
extended abstract.pdf

accesso aperto

Descrizione: Extended abstract pubblicato sul sito della conferenza
Tipologia: Abstract
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 299.45 kB
Formato Adobe PDF
299.45 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1349649
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact