Platooning

Simulation Videos

Our Project uses PLEXE

PLEXE (Platooning Extension for vEins) was developed to enable the study of platooning systems both from a networking and a road traffic perspective.


Attack Videos



Message Falsification: In this attack, the adversary listens to wireless communication medium between the vehicles in a platoon and, upon receiving each beacon, manipulates the content meaningfully and rebroadcasts it.



Spoofing: In this attack, the adversary impersonates another vehicle in the stream in order to inject fraudulent information into a specific vehicle. This attack can result in a crash.



Replay Attack: In this attack, the adversary receives a legitimate beacon from a vehicle in a platoon and stores it. It then replays it later with a malicious intent. For example, an adversary may store a broadcast that says a given vehicle is travelling 70 mph. It may rebroadcast it later to another vehicle in the platoon causing an accident.



Collision Induction Attack: In this attack, the adversary broadcasts an incorrect speed  to the other vehicles in a platoon resulting in a crash. For example, an adversary decelerating to 80km/hr might broadcast a speed of 200 km/hr causing the following vehicles to speed up and crash into each other.







Leader Crash Attack: In this attack the adversary of a platoon will crash resulting in the following vehicles to crash. The vehicles following the leader will not have the time or the space to stop safely and hence, will crash into the leader.



Denial of Service (DoS): In this attack, the adversary can overwhelm the communication capability of a vehicle by sending numerous amounts of messages, resulting in the loss of communication and a temporary disbandment of the platoon.



Radio Jamming: In this attack, the adversary can jam the area near vehicles and hence preventing any communication between them. This can either result in a dissolved platoon or a crash.



.