An Evasive Scheduling Enhancement against Packet Dropping Attacks in C-V2X Communication

Youngjoon Yoon, Hyogon Kim

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)

    Abstract

    Third Generation Partnership Project (3GPP) has standardized the Sensing-Based Semi-Persistent Scheduling (SB-SPS) as the radio resource allocation algorithm for Cellular V2X (C-V2X) sidelink communication Mode 4. The algorithm leverages on past resource use pattern and reservation information of neighbor vehicles to reduce the chances of packet collisions. However, the very predictability can be exploited by potential attackers to intentionally cause packet collisions in the predicted transmission locations in the resource plane. In this letter, we demonstrate that such packet dropping attack can cause the victim to become a 'ghost vehicle' to neighbors for a long duration. If used in highly safety-critical situations, the attack can push the victim into a situation of higher crash risk, which would be worse off than not having the C-V2X safety communication. Therefore, we propose an enhancement to the SB-SPS algorithm to guard against the attack by randomizing actually used resource locations to a certain degree. We demonstrate the effectiveness of the proposed enhancement through analysis and simulation, and discuss its cost aspect as well.

    Original languageEnglish
    Article number9222212
    Pages (from-to)392-396
    Number of pages5
    JournalIEEE Communications Letters
    Volume25
    Issue number2
    DOIs
    Publication statusPublished - 2021 Feb

    Bibliographical note

    Publisher Copyright:
    © 1997-2012 IEEE.

    Keywords

    • Cellular V2X
    • feedback
    • packet dropping attack
    • randomization
    • sensing-based semi-persistent scheduling (SPS)
    • sidelink mode 4

    ASJC Scopus subject areas

    • Modelling and Simulation
    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'An Evasive Scheduling Enhancement against Packet Dropping Attacks in C-V2X Communication'. Together they form a unique fingerprint.

    Cite this