Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3565287.3617981acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
poster
Public Access

Poster: Decentralized Simulation Workflow for Enhancing Connected Vehicle Security

Published: 16 October 2023 Publication History

Abstract

While centralized security methods such as Public Key Infrastructure (PKI) have fortified connected vehicles (CVs) security, decentralized approaches show promise in distributing security responsibilities and reducing vulnerability to cyber threats. Implementing a decentralized architecture can decrease susceptibility to large-scale cyber-attacks and enhance overall system robustness. Consensus-based trust models present avenue for scalable, decentralized security protocols in CV networks. While numerous consensus-based trust algorithms have been proposed, their validation often relied on non-representative datasets, prompting the development of more accurate simulation methodologies. This research enhances the simulation workflow by diversifying noise models, using a benchmark consensus-based trust algorithm, and addressing persistent attack model limitations.

References

[1]
S. Khan et al., "Survey on issues and recent advances in vehicular public-key infrastructure (VPKI)". IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp.1574--1601, 2022.
[2]
L. Barbieri et al., "Decentralized federated learning for extended sensing in 6G connected vehicles". Vehicular Communications, 33, p.100396, 2022.
[3]
Y. He, A. Jolfaei, X. Zheng, "Cyber-Physical Systems in Transportation. In: Garg, S., Aujla, G.S., Kaur, K., Hassan Ahmed Shah, S. (eds) Intelligent Cyber-Physical Systems for Autonomous Transportation. Internet of Things. Springer, Cham, 2022.
[4]
T. Li et al. "Poster: Fault-tolerant consensus for connected vehicles: A case study". In IEEE Vehicular Networking Conference (VNC), pp. 133--134, 2021.
[5]
H. Rathore and H. Griffith, "GNN-RL: Dynamic Reward Mechanism for Connected Vehicle Security using Graph Neural Networks and Reinforcement Learning," IEEE International Conference on Smart Computing (SMARTCOMP), pp. 201--203, 2023.
[6]
Department of Transportation, https://data.transportation.gov/Automobiles/Tampa-CV-Pilot-Basic-Safety-Messages-BSM-Sample/nm7w-nvbm [Accessed on August 11, 2023].
[7]
H. Griffith, M. Farooq and H. Rathore, "A Data Generation Workflow for Consensus-Based Connected Vehicle Security," IEEE International Conference on Consumer Electronics (ICCE), 2023, pp. 1--2, 2023.
[8]
Y. Zhou, and R. Bridgelall, "Review of usage of real-world connected vehicle data". Transportation Research Record, 2674(10), pp.939--950, 2020.
[9]
D. Suo, "Towards security by design of connected and automated vehicles: cyber and physical threats, mitigations, and architectures" (Doctoral dissertation, Massachusetts Institute of Technology), 2021.
[10]
G. Zacharia and P. Maes. "Trust management through reputation mechanisms". Applied Artificial Intelligence, 14(9):881--907, 2000.
[11]
A. Angelogianni, I. Krontiris and T. Giannetsos, "Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security," 2023 IEEE Vehicular Networking Conference (VNC), pp. 199--206, 2023.
[12]
Abhishek B. Sharma, Leana Golubchik, and Ramesh Govindan. 2010. "Sensor faults: Detection methods and prevalence in real-world datasets". ACM Trans. Sen. Netw. 6, 3, Article 23, 2010.
[13]
https://github.com/heena7sept/acmreuns.git

Cited By

View all
  • (2024)A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle Security2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454856(714-720)Online publication date: 6-Jan-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
October 2023
621 pages
ISBN:9781450399265
DOI:10.1145/3565287
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2023

Check for updates

Author Tags

  1. connected vehicles
  2. security
  3. basic safety messages
  4. attacks
  5. sensor fault
  6. decentralized security

Qualifiers

  • Poster

Funding Sources

Conference

MobiHoc '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 296 of 1,843 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)6
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle Security2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454856(714-720)Online publication date: 6-Jan-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media