Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-07-01
|
Series: | Journal of Sensor and Actuator Networks |
Subjects: | |
Online Access: | https://www.mdpi.com/2224-2708/11/3/35 |
_version_ | 1797486018459336704 |
---|---|
author | Callum Brocklehurst Milena Radenkovic |
author_facet | Callum Brocklehurst Milena Radenkovic |
author_sort | Callum Brocklehurst |
collection | DOAJ |
description | The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic. |
first_indexed | 2024-03-09T23:27:11Z |
format | Article |
id | doaj.art-3c6c2e2dd8c242bcbf1fbecacb0feee2 |
institution | Directory Open Access Journal |
issn | 2224-2708 |
language | English |
last_indexed | 2024-03-09T23:27:11Z |
publishDate | 2022-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Journal of Sensor and Actuator Networks |
spelling | doaj.art-3c6c2e2dd8c242bcbf1fbecacb0feee22023-11-23T17:15:06ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082022-07-011133510.3390/jsan11030035Resistance to Cybersecurity Attacks in a Novel Network for Autonomous VehiclesCallum Brocklehurst0Milena Radenkovic1School of Computer Science, The University of Nottingham, Nottingham NG8 1BB, UKSchool of Computer Science, The University of Nottingham, Nottingham NG8 1BB, UKThe increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic.https://www.mdpi.com/2224-2708/11/3/35VANETSopportunistic networkssecurity |
spellingShingle | Callum Brocklehurst Milena Radenkovic Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles Journal of Sensor and Actuator Networks VANETS opportunistic networks security |
title | Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles |
title_full | Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles |
title_fullStr | Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles |
title_full_unstemmed | Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles |
title_short | Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles |
title_sort | resistance to cybersecurity attacks in a novel network for autonomous vehicles |
topic | VANETS opportunistic networks security |
url | https://www.mdpi.com/2224-2708/11/3/35 |
work_keys_str_mv | AT callumbrocklehurst resistancetocybersecurityattacksinanovelnetworkforautonomousvehicles AT milenaradenkovic resistancetocybersecurityattacksinanovelnetworkforautonomousvehicles |