Connected Vehicles: Surveillance Threat and Mitigation

نویسندگان

  • Jonathan Petit
  • Djurrre Broekhuis
  • Michael Feiri
  • Frank Kargl
چکیده

Intelligent Transportation Systems (ITSs) are an upcoming technology that allow vehicles and road-side infrastructure to communicate to increase traffic efficiency and safety. To enable cooperative awareness, vehicles continually broadcast messages containing their location. These messages can be received by anyone, jeopardizing location privacy. A misconception is that such attacks are only possible by a global attacker with extensive resources (e.g. sniffing stations at every intersections giving a full city-wide coverage). In this paper, we demonstrate the feasibility of location tracking attack in an ITS in the presence of a mid-sized attacker (i.e. an attacker that has partial network coverage but can choose which parts to cover). We conduct an empirical study on the campus of the University of Twente by deploying ITS hardware on a small scale. As road intersections are likely targets for an attacker to eavesdrop, we propose a graph-based approach to determine which intersections an attacker should cover. We also derive a cost analysis that gives an indication of the financial resources an attacker needs to track a vehicle. To mitigate location tracking attacks, we assess the benefit of pseudonym change strategies and propose a privacy metric to quantify a vehicle’s level of privacy in the presence of mid-sized attackers. Experiment results demonstrate that tracking is feasible even if such an attacker covers a small number of intersections. For example, with only two sniffing stations, a mid-sized attacker can track the target vehicle on a zone-level 78% of the time, and on a road-level 40% of the time. Pseudonym schemes harden tracking by increasing the number of sniffing stations required.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incorporating attacker capabilities in risk estimation and mitigation

The risk exposure of a given threat to an information system is a function of the likelihood of the threat and the severity of its impacts. Existing methods for estimating threat likelihood assume that the attacker is able to cause a given threat, that exploits existing vulnerabilities, if s/he has the required opportunities (e.g., sufficient attack time) and means (e.g., tools and skills), whi...

متن کامل

Threat Modeling for Automotive Security Analysis

Connected and intelligent vehicles create new risks to cybersecurity and road safety. Threat modeling is a building block in automotive security engineering that identifies potential threats for corresponding mitigations. In this paper, we address how to conduct threat modeling for automotive security analysis during the development lifecycle. We propose a practical and efficient approach to th...

متن کامل

A Survey of Security and Privacy in Connected Vehicles

Electronic Control Units (ECUs) of a vehicle control the behavior of its devices–e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and Road Side Units (RSUs) through Vehicular Ad-hoc Networks (VANets), with personal devices through Wireless Personal Area Networks (WPANs), and with service center systems through cellular networks. A...

متن کامل

Context-based semantic labeling of human-vehicle interactions in persistent surveillance systems

The improved Situational awareness in Persistent Surveillance Systems (PSS) is an ongoing research effort of the Department of Defense. Most PSS generate huge volume of raw data and they heavily rely on human operators to interpret and inference data in order to detect potential threats. Many outdoor apprehensive activities involve vehicles as their primary source of transportation to and from ...

متن کامل

Outwitting dengue threat and epidemics resurgence in Asia-Pacific countries: strengthening integrated dengue surveillance, monitoring and response systems

Dengue is still a substantial vector-borne viral disease threat and burden of public health importance worldwide. This situation is complicated by dengue virus unprecedented resurgence and persistence of varied serotypes in endemic-prone areas, and man-made and natural activities consequences that promote vector emergence, transmission dynamics and spread across the Asia-Pacific region. There i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015