This work explores model-based attack injection technique to analyse the severity of attacks to a platoon made of autonomous vehicles. Once the model of the cyber-physical system has been defined and built, we proceed to the identification of the threats that may be used to exploit the vulnerabilities of the control system of the autonomous car. Then we design driving and attack scenarios, and run several simulations in case of platoon under attack. We explore different combinations of attack parameters and driving scenarios by using the Design Space Exploration. Finally, we use the collected simulation traces to improve the knowledge on the resiliency of the system to the attacks; as well as to gauge the severity of the attacks and the possible relations between the attack parameter and the effect on the overall behavior of the system. The methodology provides quantitative evidence for risk assessment and reveals critical vulnerabilities in platoon coordination mechanisms.
Severity of Attacks in a Vehicle Platoon by Model-Based Simulation
Cinzia Bernardeschi;Giuseppe Lettieri;Dario Pagani;
In corso di stampa
Abstract
This work explores model-based attack injection technique to analyse the severity of attacks to a platoon made of autonomous vehicles. Once the model of the cyber-physical system has been defined and built, we proceed to the identification of the threats that may be used to exploit the vulnerabilities of the control system of the autonomous car. Then we design driving and attack scenarios, and run several simulations in case of platoon under attack. We explore different combinations of attack parameters and driving scenarios by using the Design Space Exploration. Finally, we use the collected simulation traces to improve the knowledge on the resiliency of the system to the attacks; as well as to gauge the severity of the attacks and the possible relations between the attack parameter and the effect on the overall behavior of the system. The methodology provides quantitative evidence for risk assessment and reveals critical vulnerabilities in platoon coordination mechanisms.| File | Dimensione | Formato | |
|---|---|---|---|
|
preprint.pdf
accesso aperto
Tipologia:
Documento in Pre-print
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
1.91 MB
Formato
Adobe PDF
|
1.91 MB | Adobe PDF | Visualizza/Apri |
|
extended abstract.pdf
accesso aperto
Descrizione: Extended abstract pubblicato sul sito della conferenza
Tipologia:
Abstract
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
299.45 kB
Formato
Adobe PDF
|
299.45 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


