Proceedings of the 11th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2018
DOI: 10.1145/3212480.3212492
|View full text |Cite
|
Sign up to set email alerts
|

Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…Jagielski et al [12], considering attacks on the cooperative adaptive cruise control (CACC) system, suggested that the attacker's goal is deceiving the AV's radar, LiDAR or both of the sensors simultaneously. Attacks were considered on the basis of motion values, which were negatively affected.…”
Section: Classification Of Attacks On Av Lidarsmentioning
confidence: 99%
“…Jagielski et al [12], considering attacks on the cooperative adaptive cruise control (CACC) system, suggested that the attacker's goal is deceiving the AV's radar, LiDAR or both of the sensors simultaneously. Attacks were considered on the basis of motion values, which were negatively affected.…”
Section: Classification Of Attacks On Av Lidarsmentioning
confidence: 99%
“…In a platoon, a variety of attack models may exist depending on the attacker location and the attack methods. Some attack models use constant bias injection and variable falsification that changes in sinusoidal fashion [30], [31]. Such models may not be effective because the attack patterns are predictable due to a simplicity or a regular variation of the attack methods.…”
Section: B Attack Modelsmentioning
confidence: 99%
“…Smart cars [32] connect to each other through what is called V2V communication [33] to synchronize traffic and safely [34] carry out driving actions. They may also connect to the road infrastructure in V2I communication [35,36] and generally connect to other entities in V2X communication [37,38] such as to interact with pedestrians [39].…”
Section: Connected Cars and Smart Transport Infrastructurementioning
confidence: 99%