Connected Vehicles: Surveillance Threat and Mitigation
نویسندگان
چکیده
Intelligent Transportation Systems (ITSs) are an upcoming technology that allow vehicles and road-side infrastructure to communicate to increase traffic efficiency and safety. To enable cooperative awareness, vehicles continually broadcast messages containing their location. These messages can be received by anyone, jeopardizing location privacy. A misconception is that such attacks are only possible by a global attacker with extensive resources (e.g. sniffing stations at every intersections giving a full city-wide coverage). In this paper, we demonstrate the feasibility of location tracking attack in an ITS in the presence of a mid-sized attacker (i.e. an attacker that has partial network coverage but can choose which parts to cover). We conduct an empirical study on the campus of the University of Twente by deploying ITS hardware on a small scale. As road intersections are likely targets for an attacker to eavesdrop, we propose a graph-based approach to determine which intersections an attacker should cover. We also derive a cost analysis that gives an indication of the financial resources an attacker needs to track a vehicle. To mitigate location tracking attacks, we assess the benefit of pseudonym change strategies and propose a privacy metric to quantify a vehicle’s level of privacy in the presence of mid-sized attackers. Experiment results demonstrate that tracking is feasible even if such an attacker covers a small number of intersections. For example, with only two sniffing stations, a mid-sized attacker can track the target vehicle on a zone-level 78% of the time, and on a road-level 40% of the time. Pseudonym schemes harden tracking by increasing the number of sniffing stations required.
منابع مشابه
Incorporating attacker capabilities in risk estimation and mitigation
The risk exposure of a given threat to an information system is a function of the likelihood of the threat and the severity of its impacts. Existing methods for estimating threat likelihood assume that the attacker is able to cause a given threat, that exploits existing vulnerabilities, if s/he has the required opportunities (e.g., sufficient attack time) and means (e.g., tools and skills), whi...
متن کاملThreat Modeling for Automotive Security Analysis
Connected and intelligent vehicles create new risks to cybersecurity and road safety. Threat modeling is a building block in automotive security engineering that identifies potential threats for corresponding mitigations. In this paper, we address how to conduct threat modeling for automotive security analysis during the development lifecycle. We propose a practical and efficient approach to th...
متن کاملA Survey of Security and Privacy in Connected Vehicles
Electronic Control Units (ECUs) of a vehicle control the behavior of its devices–e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and Road Side Units (RSUs) through Vehicular Ad-hoc Networks (VANets), with personal devices through Wireless Personal Area Networks (WPANs), and with service center systems through cellular networks. A...
متن کاملContext-based semantic labeling of human-vehicle interactions in persistent surveillance systems
The improved Situational awareness in Persistent Surveillance Systems (PSS) is an ongoing research effort of the Department of Defense. Most PSS generate huge volume of raw data and they heavily rely on human operators to interpret and inference data in order to detect potential threats. Many outdoor apprehensive activities involve vehicles as their primary source of transportation to and from ...
متن کاملOutwitting dengue threat and epidemics resurgence in Asia-Pacific countries: strengthening integrated dengue surveillance, monitoring and response systems
Dengue is still a substantial vector-borne viral disease threat and burden of public health importance worldwide. This situation is complicated by dengue virus unprecedented resurgence and persistence of varied serotypes in endemic-prone areas, and man-made and natural activities consequences that promote vector emergence, transmission dynamics and spread across the Asia-Pacific region. There i...
متن کامل