Next Article in Journal
Development of a Lateral Flow Highway: Ultra-Rapid Multitracking Immunosensor for Cardiac Markers
Next Article in Special Issue
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing
Previous Article in Journal
Application of GNSS/INS and an Optical Sensor for Determining Airplane Takeoff and Landing Performance on a Grassy Airfield
Previous Article in Special Issue
Energy-Efficient Massive Data Dissemination through Vehicle Mobility in Smart Cities
Open AccessArticle

Vehicle-to-Vehicle (V2V) Message Content Plausibility Check for Platoons through Low-Power Beaconing

by Hyogon Kim 1,* and Taeho Kim 2
1
Department of Computer Science and Engineering, Korea University, Anam-Dong, Sungbuk-Gu, Seoul 02841, Korea
2
Department of Computer Science, University of Colorado Boulder, 1111 Engineering Drive ECOT 717, 430 UCB, Boulder, CO 80309-0430, USA
*
Author to whom correspondence should be addressed.
This paper is an extended version of the conference paper. Kim, T.; Kim, H. Vehicle-to-Vehicle Message Content Plausibility Check through Low-Power Beaconing, 2017 IEEE 86th Vehicular Technology Conference, Toronto, ON, Canada, 24–27 September 2017.
Sensors 2019, 19(24), 5493; https://doi.org/10.3390/s19245493
Received: 28 October 2019 / Revised: 4 December 2019 / Accepted: 10 December 2019 / Published: 12 December 2019
(This article belongs to the Special Issue Vehicular Sensor Networks: Applications, Advances and Challenges)
Although the IEEE Wireless Access in Vehicular Environment (WAVE) and 3GPP Cellular V2X deployments are imminent, their standards do not yet cover an important security aspect; the message content plausibility check. In safety-critical driving situations, vehicles cannot blindly trust the content of received safety messages, because an attacker may have forged false values in it in order to cause unsafe response from the receiving vehicles. In particular, the attacks mounted from remote, well-hidden positions around roads are considered the most apparent danger. So far, there have been three approaches to validating V2X message content: checking based on sensor fusion, behavior analysis, and communication constraints. This paper discusses the three existing approaches. In addition, it discusses a communication-based checking scheme that supplements the existing approaches. It uses low-power transmission of vehicle identifiers to identify remote attackers. We demonstrate its potential address in the case of an autonomous vehicle platooning application. View Full-Text
Keywords: V2V communication; message contents plausibility; power control V2V communication; message contents plausibility; power control
Show Figures

Figure 1

MDPI and ACS Style

Kim, H.; Kim, T. Vehicle-to-Vehicle (V2V) Message Content Plausibility Check for Platoons through Low-Power Beaconing. Sensors 2019, 19, 5493.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop