polito.it
Politecnico di Torino (logo)

Simulating Malicious Attacks on VANETs for Connected and Autonomous Vehicles

Erasmo Notaro

Simulating Malicious Attacks on VANETs for Connected and Autonomous Vehicles.

Rel. Antonio Lioy. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2023

[img]
Preview
PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (14MB) | Preview
Abstract:

In recent years, the automotive industry has witnessed remarkable technological advancements. Modern vehicles have become increasingly connected and autonomous, serving as the cornerstone for the development of Cooperative Intelligent Transportation Systems (C-ITS) and the implementation of future Smart Cities. This necessitates the employment of hundreds of Electronic Control Units (ECUs), a growing number of in-vehicle Cyber-Physical Systems (CPS), and the adoption of new wireless communication technologies that support the deployment of Vehicular Ad-Hoc Networks (VANETs). This phenomenon has garnered the interest of researchers worldwide who have conducted various case studies on unaltered passenger vehicles, demonstrating the feasibility of remotely compromising safety-critical ECUs. The resulting approach highlights how exploiting a chain of vulnerabilities, from a wireless entry point to safety-critical ECUs, might allow remote control of the vehicles. Indeed, with the advent of inter-vehicle communication (IVC) technologies, today's vehicles are equipped with vehicle-to-everything (V2X) wireless interfaces, such as Dedicated Short-Range Communications (DSRC) for the ETSI ITS-G5 standard, which is responsible for expanding the vehicle's remote attack surface. Additionally, due to cooperative driving automation that grants partial or complete control of the vehicle to V2X Applications, there is an increased impact on the safety of passengers and Vulnerable Road Users (VRUs) in the case of both in-vehicle and V2X security threats. Originating from these problems, this thesis work aims to demonstrate a possible implementation of realistic malicious attacks on VANETs, compliant with the ETSI ITS-G5 standard and based on the Artery open-source V2X Simulation Framework. The thesis also proposes a feasibility evaluation of the simulated malicious attacks in the presence of VANET with secured ITS communications and validates these attacks on the FEV Hardware in the Loop (HiL) platform, which is equipped with the CohdaWireless MK5 device.

Relatori: Antonio Lioy
Anno accademico: 2023/24
Tipo di pubblicazione: Elettronica
Numero di pagine: 127
Soggetti:
Corso di laurea: Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Aziende collaboratrici: Fev Italia Srl
URI: http://webthesis.biblio.polito.it/id/eprint/29324
Modifica (riservato agli operatori) Modifica (riservato agli operatori)