congestion attacks to autonomous vehicles using vehicular … · 2019-01-22 · demonstrated a...

27
Congestion Attacks to Autonomous Vehicles Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science University of California Los Angeles 2015 NDSS SENT Workshop

Upload: others

Post on 16-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S

Congestion Attacks to Autonomous Vehicles Using

Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla

Department of Computer Science

University of California Los Angeles

2015 NDSS SENT Workshop

Page 2: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Outline

S  Introduction

S  Problem Statement

S  Congestion Attack

S  Evaluation

S  Conclusion

2015 NDSS SENT Workshop

Page 3: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Introduction

S  Extreme traffic in big cities

S  Building roads not solution

S  Load balancing

S  Google Maps Traffic

S  WAZE

2015 NDSS SENT Workshop

Page 4: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

VANETs

S  Vehicular Ad hoc Network (VANET) is a wireless ad hoc network where each node is a vehicle

S  Inter-vehicular communications are used for traffic safety and other applications to provide a better traffic experience

S  By the standards of DSRC and 802.11p, vehicles broadcast their speed, location, angle, etc., to other vehicles S  Proactive driving and collision avoidance

2015 NDSS SENT Workshop

Page 5: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  State-of-the-art congestion avoidance mechanism: Computer-Assisted Traveling Environment (CATE)

S  Dijkstra algorithm where roads are edges and travel times on the roads are link costs

S  Big Dijkstra tables stored in each car, high computation cost of reconstructing Dijkstra table

S  High network overhead due to broadcasting congestion info

S  Does not scale, introduced further optimizations for our experiments

VANET Solutions

2015 NDSS SENT Workshop

Page 6: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Congestion request/response packets instead of constant broadcasting

S  Installation of pre-calculated routes from any point to another point on the map

S  Congestion measurement database to store congestion info learned

VANET Solutions Our Optimizations

2015 NDSS SENT Workshop

Page 7: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Basic Safety Messages: each vehicle will listen to these packets from the cars on the same road and average the speeds heard including the speed of its own. S  At the end of the road, this total average of speeds will be

inserted to the car’s congestion info database

S  Congestion Request message will be sent when a car approaches to the end of a road to decide on the next turn

S  Congestion Response message include the congestion measurements belonging to the interesting roads requested

Packet Types

2015 NDSS SENT Workshop

Page 8: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Database of congestion measurements created by the car itself or learned from others

S  Upon congestion request message, measurements for the roads that are asked in the message will be sent if exists

S  Maintenance of this database and insertion/update procedures are explained in our paper in more detail

Congestion Information Database

2015 NDSS SENT Workshop

Page 9: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Congestion Attack

2015 NDSS SENT Workshop

Page 10: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Common vulnerabilities in all of the proposed congestion avoidance mechanisms in the literature

S  They completely trust and forward congestion information without trying to detect outliers and implausible information

S  Checking incorrect information uses the assumption of “honest majority”

S  Vehicular botnets are possible due to the vulnerabilities in autonomous cars (Examples are cited in the paper)

Vulnerabilities

2015 NDSS SENT Workshop

Page 11: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  To the best of our knowledge, our paper is the first that demonstrated a botnet attack in the realm of VANETs

S  Current security solutions in the literature cannot cope with vehicular botnets (explained in the paper)

S  Botnets enables various types of attacks to be performed on VANETs

S  We chose congestion attack as the first demonstration of its potential power

Vehicular Botnets

2015 NDSS SENT Workshop

Page 12: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  It is a representation of a much broader set of attacks that can be performed by vehicular botnets spreading bogus information

S  It demonstrates the global impact of vehicular botnets on traffic conditions by the domino effect on the congestion levels

S  It is like a DDoS attack to the roads which can be used for economic and political incentives S  Fort Lee lane closure scandal against New Jersey Governor Chris Christie

S  delaying police arrival to a robbery scene, blocking emergency vehicle access to an area targeted by a terrorist attack, increasing congestion around a specific store to favor its competitor

Congestion Attack

2015 NDSS SENT Workshop

Page 13: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Cars with a legitimate owner, which are compromised by attackers using the vulnerabilities in automated vehicles

S  They optimize their routes with congestion avoidance mechanism just like any other car

S  Cannot perform any suspicious action that might alert their owners

S  They advertise malicious congestion data without their owners’ knowledge

Congestion Attack Compromised Cars

2015 NDSS SENT Workshop

Page 14: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Cars owned by the attacker, spread all around the map

S  Parked in random places, mostly inactive until they are needed

S  They advertise malicious congestion information if they are close to targeted road, if not, they stay inactive until needed

S  When they sense there are uncovered areas in the targeted region, they become active and move there to cover those areas

S  Significantly fresh measurements, complete knowledge of the map

Congestion Attack Parked Bot Cars

2015 NDSS SENT Workshop

Page 15: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  They honestly follow the congestion avoidance mechanism

S  They share the congestion measurements created by themselves and learned from others without malicious alteration

S  They will “honestly” disseminate the bogus information learned from bot cars that will disseminate it to uncovered areas by bots

Congestion Attack Uninfected Cars

2015 NDSS SENT Workshop

Page 16: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Congestion Attack

2015 NDSS SENT Workshop

Page 17: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Congestion Attack

2015 NDSS SENT Workshop

Page 18: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Cars currently do not share partial measurements of a road

S  Even if they did, once a victim get in the communication range to hear it directly from the cars in the targeted area, it is too late

S  There will be many uninfected cars, which are not on the congested road, that will still disseminate our malicious congestion information S  Does not forward congestion victim’s warning signals due to timestamps

S  Help us build some majority with its help

Maintaining Congestion

2015 NDSS SENT Workshop

Page 19: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  Did not have an infrastructure to experiment on real autonomous vehicles in a big enough map

S  Experimented in Veins (SUMO <-> OMNeT++)

S  SUMO simulates the realistic mobility patterns of vehicles

S  OMNeT++ simulates the inter-vehicular communication

S  Congestion avoidance and botnet software implemented in Veins

Evaluation

2015 NDSS SENT Workshop

Page 20: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Evaluation Average Speed on the

Targeted Road

2015 NDSS SENT Workshop

Page 21: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

2015 NDSS SENT Workshop

Evaluation Number of Cars on the

Targeted Road

Page 22: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Evaluation Trip Times for Individual Cars

2015 NDSS SENT Workshop

Page 23: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Evaluation Speed of the Attack

2015 NDSS SENT Workshop

Page 24: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Evaluation Domino Effect

2015 NDSS SENT Workshop

Page 25: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Evaluation Changing Bot Percentages

2015 NDSS SENT Workshop

Page 26: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

S  First that demonstrates vehicular botnets

S  Current security solutions cannot cope with it

S  Can cause congestion any targeted road

S  Has a global effect on traffic congestion levels

S  Targeted road becomes unusable quickly

S  New security proposals should not overlook these botnets

Conclusion

2015 NDSS SENT Workshop

Page 27: Congestion Attacks to Autonomous Vehicles Using Vehicular … · 2019-01-22 · demonstrated a botnet attack in the realm of VANETs ! Current security solutions in the literature

Q & A

Thank You

2015 NDSS SENT Workshop