Research Article
BibTex RIS Cite
Year 2020, , 936 - 947, 01.10.2020
https://doi.org/10.16984/saufenbilder.670273

Abstract

References

  • B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.
  • F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
  • S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.
  • S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.
  • V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.
  • S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.
  • S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.
  • A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.
  • H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.
  • Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.
  • P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.
  • M. Y. Abualhoul, M. Marouf, O. Shagdar, and F. Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.
  • W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.
  • X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.
  • X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.
  • S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.
  • M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.
  • R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7'h International Conference on Intelligent Systems and Control (ISCO 2013)
  • Y. Zhang and G. Cao, "V-PADA: Vehicle-Platoon-Aware Data Access in VANETs," IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.
  • M. Su. and S. Ahn, "Autonomous platoon formation for VANET-enabled vehicles," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.
  • [21] H. Hexmoor, S. Alsamaraee and M. Almaghshi, "BlockChain for Improved Platoon Security," International Journal of Information Systems and Computer Sciences, vol. 7, no. 2, pp. 1-6, 2018.
  • M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, "Vehicle platoon control with multi-configuration ability," Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.
  • M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.
  • J. Liu, D. Ma, A. Weimerskirch and H. Zhu, "Secure and Safe Automated Vehicle Platooning," IEEE Reliability Society, Detroit, 2016.
  • MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.

CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

Year 2020, , 936 - 947, 01.10.2020
https://doi.org/10.16984/saufenbilder.670273

Abstract

The platooning is an emerging concept in VANETS that involves a group of vehicles behaving as a single unit via the coordination of movement. The emergence of autonomous vehicles has bolstered the evolution of platooning as a trend in mobility and transportation. The autonomous vehicles and the elimination of individual and manual capabilities introduces new risks. The safety of the cargos, passenger and the advanced technology had increased the complication of the security concerns in platooning as it may attract malicious actors. In improving the security of the platoon, the threat and their potential impacts on the vehicular systems should be identified to ensure the development of security features that will secure against the identified risks. In this paper, two critical types of security breaches were identified those are Sybil attack and Delay attacks. Those security attacks can be somewhat disruptive and dangerous to the regular operation of the platoon leading to severe injuries, increased fuel consumption and delay the performance of the network. The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.

References

  • B. Chen, “A cooperative control method for platoon and intelligent vehicles management,” pp. 1–5, 2017.
  • F. Sakiz and S. Sen, “A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV,” Ad Hoc Networks, vol. 61, pp. 33–50, 2017.
  • S. Zhao, T. Zhang, N. Wu, H. Ogai, and S. Tateno, “Vehicle to Vehicle Communication and Platooning for EV with Wireless Sensor Network,” pp. 1435–1440, 2015.
  • S. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, “Vehicular Ad-Hoc Networks ( VANETs ) - An Overview and Challenges,” vol. 3, no. 3, pp. 29–38, 2013.
  • V. L. Hybrid, “IEEE 802.11p and Visible Light Hybrid Communication Based Secure Autonomous Platoon,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8667–8681, 2018.
  • S. Ucar, S. C. Ergen, and O. Ozkasap, “Visible light communication in vehicular ad-hoc networks,” in 2016 24th Signal Processing and Communication Application Conference (SIU), 2016, pp. 881–884.
  • S. Ucar, B. Turan, S. Colen, O. Ozkasap, and M. Ergen, “Dimming Support for Visible Light Communication in Intelligent Transportation and Traffic System,” pp. 1193–1196, 2016.
  • A. Petrillo, A. Pescap, and S. Santini, “A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks,” pp. 110–115, 2017.
  • H. Menouar, “Visible Light Communication,” no. december, pp. 45–53, 2015.
  • Tseng, Y. Wei, A. Chen, H. Wu, H. Hsu, and H. Tsai, “Characterizing Link Asymmetry in Vehicle-to-Vehicle Visible Light Communications,”pp. 88–95, 2015.
  • P. Luo, Z. Ghassemlooy, H. Le Minh, and E. Bentley, “Performance analysis of a car-to-car visible light communication system,” no. March, 2015.
  • M. Y. Abualhoul, M. Marouf, O. Shagdar, and F. Nashashibi, “Platooning Control Using Visible Light Communications : A Feasibility Study,” no. Itsc, pp. 1535–1540, 2013.
  • W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, “A Security Credential Management System for V2V Communications,” pp. 1–8, 2013.
  • X. U. S. H. S. Hen and U. N. O. F. W. Aterloo, “Complementing Public Key Infrastructure To Secure Vehicular AD HOC Networks Albert Wasef And Rongxing L U , University Of Waterloo,” no. October, pp. 22–28, 2010.
  • X. Bin, Y. Bo, and G. Chuanshan, “Detection and localization of sybil nodes in VANETs,” DIWANS 2006 - Proc. 2006 Work. Dependability Issues Wirel. Ad Hoc Networks Sens. Networks (part MobiCom 2006), vol. 2006, pp. 1–8, 2006.
  • S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting Sybil attacks in urban vehicular networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1103–1114, 2012.
  • M. Stehlik, V. Matyas and A. Stetsko “Towards Better Selective Forwarding And Delay Attacks Detection in Wireless Sensor Networks,” no. April, 2016.
  • R. S. Sachan, M. Wazid, and R. H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction.” Proceedings of7'h International Conference on Intelligent Systems and Control (ISCO 2013)
  • Y. Zhang and G. Cao, "V-PADA: Vehicle-Platoon-Aware Data Access in VANETs," IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2326-2339, 2011.
  • M. Su. and S. Ahn, "Autonomous platoon formation for VANET-enabled vehicles," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 2016.
  • [21] H. Hexmoor, S. Alsamaraee and M. Almaghshi, "BlockChain for Improved Platoon Security," International Journal of Information Systems and Computer Sciences, vol. 7, no. 2, pp. 1-6, 2018.
  • M El-Zaher, B. Dafflon, F. Gechter, and J.-M. Contet, "Vehicle platoon control with multi-configuration ability," Procedia Computer Science, vol. 9, p. 1503 – 1512, 2012.
  • M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, M. H. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative," IEEE Communications Magazine, vol. 53, no. 6, pp. 126-132, 2015.
  • J. Liu, D. Ma, A. Weimerskirch and H. Zhu, "Secure and Safe Automated Vehicle Platooning," IEEE Reliability Society, Detroit, 2016.
  • MATLAB, R2019a (9.6.0.1072779), 64-bit(win 64), March 8, 2019, License Number 968398. Professional License.
There are 25 citations in total.

Details

Primary Language English
Subjects Electrical Engineering
Journal Section Research Articles
Authors

Mohammed Al Sheıkhly 0000-0003-4694-152X

Sefer Kurnaz 0000-0002-7666-2639

Publication Date October 1, 2020
Submission Date January 4, 2020
Acceptance Date July 8, 2020
Published in Issue Year 2020

Cite

APA Al Sheıkhly, M., & Kurnaz, S. (2020). CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. Sakarya University Journal of Science, 24(5), 936-947. https://doi.org/10.16984/saufenbilder.670273
AMA Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. October 2020;24(5):936-947. doi:10.16984/saufenbilder.670273
Chicago Al Sheıkhly, Mohammed, and Sefer Kurnaz. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science 24, no. 5 (October 2020): 936-47. https://doi.org/10.16984/saufenbilder.670273.
EndNote Al Sheıkhly M, Kurnaz S (October 1, 2020) CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. Sakarya University Journal of Science 24 5 936–947.
IEEE M. Al Sheıkhly and S. Kurnaz, “CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”, SAUJS, vol. 24, no. 5, pp. 936–947, 2020, doi: 10.16984/saufenbilder.670273.
ISNAD Al Sheıkhly, Mohammed - Kurnaz, Sefer. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science 24/5 (October 2020), 936-947. https://doi.org/10.16984/saufenbilder.670273.
JAMA Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. 2020;24:936–947.
MLA Al Sheıkhly, Mohammed and Sefer Kurnaz. “CSK Based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks”. Sakarya University Journal of Science, vol. 24, no. 5, 2020, pp. 936-47, doi:10.16984/saufenbilder.670273.
Vancouver Al Sheıkhly M, Kurnaz S. CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks. SAUJS. 2020;24(5):936-47.

30930 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.