首页> 外文会议>IEEE International Conference on Communications >Targeted Discreditation Attack against Trust Management in Connected Vehicles
【24h】

Targeted Discreditation Attack against Trust Management in Connected Vehicles

机译:针对连接车辆的信任管理的目标诋毁攻击

获取原文

摘要

Vehicle-to-vehicle (V2V) communication systems in the U.S. rely on IEEE 1609.2 security protocols for message authentication using digital signatures. A key requirement for trust management in such systems is the ability to detect misbehaving vehicles, e.g., when vehicles are repeatedly forging signatures. However, this creates a new attack surface where receivers cannot determine whether the causes of signature verification failures are indeed malicious attacks. In this paper, we present our novel, open-source, USRP-based testbed and utilize it to demonstrate how a stealthy reactive jammer can exploit this vulnerability. Our novel, targeted attack is highly efficient (even given the short validity period for vehicle pseudonyms) and difficult to detect. Our experimental results show that our attack can successfully discredit a victim in prominent misbehavior detection schemes with just two minutes of jamming. Finally, we discuss the capabilities and extensibility of our testbed as well as the challenges of potential attack mitigation techniques.
机译:U.S的车辆到车辆(V2V)通信系统依赖于IEEE 1609.2安全协议,用于使用数字签名进行消息认证。这种系统中信任管理的关键要求是能够检测行为行为的车辆,例如,当车辆重复锻造签名时。但是,这会创建一个新的攻击表面,接收器无法确定签名验证失败的原因是否确实是恶意攻击。在本文中,我们介绍了我们的小说,开源,基于USRP的测试用,并利用它来展示隐身的反应性干扰器如何利用这种脆弱性。我们的小说,有针对性的攻击是高效的(即使是车辆假名的短暂有效期)并且难以检测。我们的实验结果表明,我们的攻击可以在突出的不当行为检测方案中成功地诋毁受害者,只需两分钟的干扰。最后,我们讨论了我们测试床的能力和可扩展性以及潜在攻击缓解技术的挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号