Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles

The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that...

Full description

Bibliographic Details
Main Authors: Callum Brocklehurst, Milena Radenkovic
Format: Article
Language:English
Published: MDPI AG 2022-07-01
Series:Journal of Sensor and Actuator Networks
Subjects:
Online Access:https://www.mdpi.com/2224-2708/11/3/35
_version_ 1797486018459336704
author Callum Brocklehurst
Milena Radenkovic
author_facet Callum Brocklehurst
Milena Radenkovic
author_sort Callum Brocklehurst
collection DOAJ
description The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic.
first_indexed 2024-03-09T23:27:11Z
format Article
id doaj.art-3c6c2e2dd8c242bcbf1fbecacb0feee2
institution Directory Open Access Journal
issn 2224-2708
language English
last_indexed 2024-03-09T23:27:11Z
publishDate 2022-07-01
publisher MDPI AG
record_format Article
series Journal of Sensor and Actuator Networks
spelling doaj.art-3c6c2e2dd8c242bcbf1fbecacb0feee22023-11-23T17:15:06ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082022-07-011133510.3390/jsan11030035Resistance to Cybersecurity Attacks in a Novel Network for Autonomous VehiclesCallum Brocklehurst0Milena Radenkovic1School of Computer Science, The University of Nottingham, Nottingham NG8 1BB, UKSchool of Computer Science, The University of Nottingham, Nottingham NG8 1BB, UKThe increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic.https://www.mdpi.com/2224-2708/11/3/35VANETSopportunistic networkssecurity
spellingShingle Callum Brocklehurst
Milena Radenkovic
Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
Journal of Sensor and Actuator Networks
VANETS
opportunistic networks
security
title Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
title_full Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
title_fullStr Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
title_full_unstemmed Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
title_short Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
title_sort resistance to cybersecurity attacks in a novel network for autonomous vehicles
topic VANETS
opportunistic networks
security
url https://www.mdpi.com/2224-2708/11/3/35
work_keys_str_mv AT callumbrocklehurst resistancetocybersecurityattacksinanovelnetworkforautonomousvehicles
AT milenaradenkovic resistancetocybersecurityattacksinanovelnetworkforautonomousvehicles