because despite development of any level of
prevention mechanisms, the attackers may always a
vulnerability to exploit. This study analyses the
impact of four classes of cyber attacks on the
transportation operations and safety of CAV network,
to provide better understanding of building effective
mitigation systems and plans.
We have investigated and simulated different case
scenarios based on such attacks in VANETs. The map
is set up in a busy urban area in a UK city. A
combination of OMNeT++, Sumo, and Veins
software tools are used for modelling and simulating
the attacks on the network. The simulation is
performed with and without attacks under some
accident scenarios. The analysis is performed with the
base scenario as a benchmark against attacks. The
result is quantified by compare and contrast method.
The main discussion begins with background on
CAV and VANET technologies and the attacks to
which they may be exposed. This is followed by some
discussion of prior works that have considered the
attack scenarios, and the opportunity to extend from
this. Section 4 then describes the approach taken in
this research, including the simulation tools and
parameters, and the attacks to be simulated. The
associated findings are then presented in Section 5,
looking at the impact of attacks under different
simulation conditions. Finally, Section 6 concludes
the discussion and highlights future research
opportunities.
2 BACKGROUND
CAV is an application of VANETs and differs in a
way that all nodes in CAV are considered to be
powerful standalone units with sensors, storage, and
networking capability. In VANETs, the nodes are
considered only as mobile access points. Since CAVs
use VANETs for networking, it is relevant to
investigate where the attacks occur in VANETs.
The VANETs consist of On-board Units (OBUs)
inside the vehicle, Road-Side Unit (RSUs) in the
roads which forms part of the infrastructure, and the
node which is the vehicle itself (Hamida et al. 2015).
These units interact to support Vehicle-to-Vehicle
(V2V) and Vehicle-to-Infrastructure (V2I)
communication. Using 802.11p, the vehicles can
share safety, service and network messages among
other vehicles within the range. Furthermore, the
RSU enables the message transmission to other
vehicles farther from the source vehicle Hence it is
vital to analyse and secure all possible cyber-attacks
which otherwise would lead to loss of life and
property.
Hamida et al. (2015) indicate that V2I
communication links RSU and OBU to Trusted Third
Parties (TTPs) such as service providers, government
authorities (police, emergency) and car
manufacturers providing various services like
entertainment media, software updates over the air, ad
services, etc. It is clear that CAVs will expand into all
forms of life, making the network's security the top
research priority. VANETs are designed to identify
the traffic congestion in the network and the ability to
reroute the vehicles to reduce traffic delay (Milojevic
& Rakocevic, 2013). This study primarily focuses on
the simulation of this dynamic rerouting feature of
VANETs by analysing the traffic delay and other
impacts caused by security attacks.
Cyber attacks targeting the VANET can take
various forms, as categorised and summarised in
Table 1 (noting that those marked with * denote
attacks that are selected for more specific study in the
experimental part of the paper) (Hasrouny et al.,
2017).
Table 1: Forms of attack in VANET contexts.
Attack type Description
Availabilit
one vehicle.
Distributed
Denial of
Service
(DDoS)*
Carried out by many attackers in
the network by simultaneously
flooding the network. It is more
difficult to detect and can disrupt
the entire transportation network.
Jamming
Reducing the network capabilities
by creating noisy communication
signals and overloads increasing
the network interference.
Spamming
The network is flooded with
unwanted spam messages that take
up the bandwidth and reduce the
network efficiency by increasing
latency.
Blackhole*
The nodes create fake messages
claiming a short route to
destination and establish a trusted
connection into the network. Once
perpetrated, it deletes the packets
received creating a break in the
chain of route messages leading to
hu