Attacks 


Attacks
Vehicle platooning relies heavily on sensors such as cameras and GPS as well as capabilities such as vehicle to vehicle communication (V2V) and a 3G/4G connectivity. These sensors could be tampered with, making the platoon vulnerable to attacks. In addition, wireless communication signals can be intercepted and false data can be projected back to the victim. Vehicles use wireless communication to send information such as their speed, position and acceleration to other vehicles in the platoon, who then, use this information to adjust their speed accordingly. If a hacker was to intercept this communication and then manipulate the data and rebroadcast it to other vehicles in the platoon, the consequences would be severe. A hacker could cause crashes, reduce fuel economy (by constantly manipulating vehicles into changing their acceleration), break a platoon up, or cause vehicles to not reach their final destination (by intercepting and/or manipulating GPS data).

  


Application Layer Attacks:

Application layer attacks affect the functionality of a particular application such as CACC beaconing or message exchange in the platoon management protocol. The adversary can use message falsification, spoofing or replay attacks to maliciously affect the vehicle stream.

Network Layer Attacks:

Unlike application layer attacks, network layer attacks have the potential to affect the functioning of multiple user applications. For instance, the adversary can attempt a denial-of-service(DoS) or distributed DoS (DDoS) attack to overwhelm the communication capability of a vehicle.

System Level Attacks:

All presented attacks so far have been centered around exploiting V2V communication. Another type of attack is tampering with vehicle hardware or software, which can be done by malicious insider at the manufacturing level or by an outsider in an unattended vehicle.

Privacy Leakage Attacks:

CACC vehicles periodically broadcast beacons that contain various types of information such as vehicle identity, current vehicle position, speed and acceleration

The adversary can carry out an eavesdropping attack to extract valuable information about the vehicle stream