Detection and Mitigation of Data Tampering Attacks for Cooperative ACC Systems Based on C-V2X

Taisei Awaji, Rintaro Tashima, Ryogo Kubo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cooperative adaptive cruise control (CACC) systems allow vehicles to drive in platoon formations using wireless communication. However, CACC systems are exposed to network-induced cyberattacks, such as data tampering attacks, using fake base stations. This study proposes a detection and mitigation method for data tampering attacks on CACC systems based on cellular vehicle-to-everything (C-V2X) communication. Simulations confirm that a system using the proposed method can detect and mitigate data tampering attacks by using redundant C-V2X communication paths.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages149-150
Number of pages2
ISBN (Electronic)9781665470506
DOIs
Publication statusPublished - 2022
Event2022 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2022 - Taipei, Taiwan, Province of China
Duration: 2022 Jul 62022 Jul 8

Publication series

NameProceedings - 2022 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2022

Conference

Conference2022 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2022
Country/TerritoryTaiwan, Province of China
CityTaipei
Period22/7/622/7/8

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Hardware and Architecture
  • Renewable Energy, Sustainability and the Environment
  • Electrical and Electronic Engineering
  • Media Technology
  • Health Informatics
  • Instrumentation

Fingerprint

Dive into the research topics of 'Detection and Mitigation of Data Tampering Attacks for Cooperative ACC Systems Based on C-V2X'. Together they form a unique fingerprint.

Cite this