Imaging vehicle-to-vehicle communication using visible light
Author:
Ziehn Jens R.1, Roschani Masoud1, Ruf Miriam1, Bruestle Dennis1, Beyerer Jürgen12, Helmer Melanie3
Affiliation:
1. Fraunhofer IOSB , Karlsruhe , Germany 2. KIT Vision and Fusion Laboratory , Karlsruhe , Germany 3. Karlsruher Institut für Technologie (KIT), Lichttechnisches Institut (LTI) , Karlsruhe , Germany
Abstract
Abstract
With advances in automated and connected driving, secure communication is increasingly becoming a safety-critical function. Injection of manipulated radio messages into traffic can cause severe accidents in the foreseeable future, and can currently be achieved without having to manipulate on-board vehicle systems directly, for example by hijacking cellphones instead and using these as senders. Thereby, large-scale attacks on vehicles can be executed remotely, and target relatively vulnerable devices. To mitigate remaining vulnerabilities in current automotive security architectures, this paper proposes a secondary communication channel using vehicle head and taillights. In contrast to existing approaches, this method allows both to achieve a sufficient data rate and to extract the angular position of the sender, by means of an imaging process which only requires close-to-market, cost-efficient technology. Through this, injecting false messages by masquerading as a different sender is considerably more challenging: The receiver can verify a message’s source position with the supposed position of the sender, e.g. by using on-board sensors or communicated information. Thereby, reliably faking both the communicated messages and the position of the sender will require direct manipulation of on-board vehicle systems, raising the security level of the function accordingly, and precluding low-threshold, wide-range attacks.
Publisher
Walter de Gruyter GmbH
Subject
Instrumentation,Atomic and Molecular Physics, and Optics,Electronic, Optical and Magnetic Materials
Reference35 articles.
1. S. Baker, E. Bennett, S. B. Kang, and R. Szeliski, “Removing rolling shutter wobble,” in 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, 2010, pp. 2392–2399. 2. T. Batz, K. Watson, and J. Beyerer, “Recognition of dangerous situations within a cooperative group of vehicles,”in 2009 IEEE Intelligent Vehicles Symposium, 2009, pp. 907–912. 3. N. Bißmeyer, H. Stübing, E. Schoch, S. Götz, J. Stotz, and B. Lonc, “A generic public key infrastructure for securing Car-to-X communication,” in World Congress on Intelligent Transport Systems (ITS), 2012, pp. 12–24. 4. A. Cailean, B. Cagneau, L. Chassagne, M. Dimian, and V. Popa, “Miller code usage in Visible Light Communications under the PHY I layer of the IEEE 802.15.7 standard,”in 2014 10th International Conference on Communications, COMM), 2014, pp. 1–4, https://doi.org/10.1109/ICComm.2014.6866699. 5. C.-W. Chow, C.-Y. Chen, and S.-H. Chen, “Visible light communication using mobile-phone camera with data rate higher than frame rate,” Optic Express, vol. 23, no. 20, pp. 26080–26085, 2015.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|