Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine
Abstract
:1. Introduction
- We analyze existing simulation and testing methods from the perspective of security evaluation.
- We propose requirements for V2X security evaluation.
- We propose misbehavior-based application level V2X security evaluation scenarios.
- We implement V2X security evaluation scenarios using CANoe Option.Car2X simulation.
2. Background and Related Work
2.1. Background
2.1.1. V2X Standards
2.1.2. V2X Security Evaluation Method
2.2. Related Work
2.2.1. V2X Simulation Research
2.2.2. Connected Car Security Testing Tools
3. Requirements Analysis
3.1. Problems of Existing Simulation
3.2. Requirements of Implementation
3.2.1. Acceptance of External Message
3.2.2. Application of Message Handler
3.2.3. Creation and Application of Misbehavior Scenarios
3.3. Requirements Analysis
4. Proposed Test Simulation
4.1. Configuration of Environment Linked to Virtual Machine
4.2. Virtual Machine-Linked Node Test
5. Security Evaluation Using Virtual Machine-Linked Simulation Environment
5.1. Security Evaluation Scenarios
5.1.1. Security Evaluation Scenario 1
5.1.2. Security Evaluation Scenario 2
5.1.3. Security Evaluation Scenario 3
5.1.4. Security Evaluation Scenario 4
6. Conclusions and Future Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- ECE/TRANS/505/Rev.3/Add.154; UN Regulation 155, Uniform Provisions Concerning the Approval of Vehicles with Regards to Cyber Security and Cyber Security Management System. The United Nations Economic Commission for Europe(UNECE): Geneva, Switzerland, 2021.
- ECE/TRANS/505/Rev.3/Add.155; UN Regulation 156, Uniform Provisions Concerning the Approval of Vehicles with Regards to Software Update and Software Updates Management System. The United Nations Economic Commission for Europe(UNECE): Geneva, Switzerland, 2021.
- ISO/SAE 21434:2021(E); Road Vehicles—Cybersecurity Engineering. International Organization for Standardization: Geneva, Switzerland, 2021.
- Trendmicro. A Roadmap to Secure Connected Cars. Available online: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/a-roadmap-to-secure-connected-cars. (accessed on 27 December 2022).
- Haghshenas, S.S.; Guido, G.; Vitale, A.; Ghoushchi, S.J. Quantitative and Qualitative Analysis of Internet of Things (IoT) in Smart Cities and its Applications. In Proceedings of the 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy, 12–15 September 2022; pp. 1–6. [Google Scholar]
- Liu, C.; Ke, L. Cloud assisted Internet of things intelligent transportation system and the traffic control system in the smart city. J. Control. Decis. 2022, Volume 8, 1–14. [Google Scholar] [CrossRef]
- Guido, G.; Haghshenas, S.S.; Vitale, A.; Astarita, V. Challenges and opportunities of using data fusion methods for travel time estimation. In Proceedings of the 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), Istanbul, Turkey, 17–20 May 2022; Volume 1, pp. 587–592. [Google Scholar]
- Soto, I.; Calderon, M.; Amador, O.; Urueña, M. A survey on road safety and traffic efficiency vehicular applications based on C-V2X technologies. Veh. Commun. 2022, 33, 100428. [Google Scholar] [CrossRef]
- IEEE 1609.1-2006; Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)—Resource Manager. IEEE Standard: New York, NY, USA, 2006.
- IEEE 1609.2-2016; IEEE Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages. IEEE Standard: New York, NY, USA, 2016.
- IEEE 1609.3-2020; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)—Networking Services. IEEE Standard: New York, NY, USA, 2020.
- IEEE 1609.4-2016; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)—Multi-Channel Operation. IEEE Standard: New York, NY, USA, 2016.
- 3GPP TR 36.885 v14.0.0 Technical Specification Group Radio Access Network; Study on LTE-based V2X services. 3GPP, European Telecommunications Standards Institute (ETSI): Sophia Antipolis, France, 2016.
- Chen, S.; Hu, J.; Shi, Y.; Peng, Y.; Fang, J.; Zhao, R.; Zhao, L. Vehicle-to-everything (V2X) services supported by LTE-based systems and 5G. IEEE Commun. Stand. Mag. 2017, 1, 70–76. [Google Scholar] [CrossRef]
- Harounabadi, M.; Soleymani, D.M.; Bhadauria, S.; Leyh, M.; Roth-Mandutz, E. V2X in 3GPP Standardization: NR Sidelink in Release-16 and Beyond. IEEE Commun. Stand. Mag. 2021, 5, 12–21. [Google Scholar] [CrossRef]
- ETSI EN 302 663; Intelligent Transport Systems (ITS); ITS-G5 Access layer specification for Intelligent Transport Systems operating in the 5 GHz frequency band. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2020.
- ETSI EN 302 637-2; Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2019.
- ETSI EN 302 637-3; Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specification of Decentralized Environmental Notification Basic Service. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2019.
- SAE J2735; V2X Communications Message Set Dictionary. SAE International DSRC Committee: Warrendale, PA, USA, 2022. [CrossRef]
- SAE J3217; V2X-Based Fee Collection. SAE International Tolling Applications Technical Committee: Warrendale, PA, USA, 2022. [CrossRef]
- Zhao, L.; Chai, H.; Han, Y.; Yu, K.; Mumtaz, S. A collaborative V2X data correction method for road safety. IEEE Trans. Reliab. 2022, 71, 951–962. [Google Scholar] [CrossRef]
- Ansari, K.; Feng, Y. Design of an integration platform for V2X wireless communications and positioning supporting C-ITS safety applications. J. Glob. Position. Syst. 2013, 12, 38–52. [Google Scholar] [CrossRef] [Green Version]
- IEEE 1609.0-2019; IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture. IEEE Standard: New York, NY, USA, 2019.
- 5G Automotive Association and Others, V2X Functional and Performance Test Procedures-Selected Assessment of Device to Device Communication Aspects; 5GAA: Munich, Germany, 2018.
- CAMP LLC. Security Credential Management System Proof-of-Concept Implementation—EE Requirements and Specifications Supporting SCMS Software Release 1.1. Veh. Saf. Commun. Consortium Tech. Rep. May 2016, 4, 1–559. [Google Scholar]
- IEEE 1609.2.1-2020; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Certificate Management Interfaces for End Entities. IEEE Standard: New York, NY, USA, 2020.
- Wang, J.; Shao, Y.; Ge, Y.; Yu, R. A survey of vehicle to everything (V2X) testing. Sensors 2019, 19, 334. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lokaj, Z.; Srotyr, M.; Vanis, M.; Broz, J.; Mlada, M. C-ITS SIM as a tool for V2X communication and its validity assessment. In Proceedings of the 2021 Smart City Symposium Prague (SCSP), Prague, Czech Republic, 27–28 May 2021; pp. 1–5. [Google Scholar]
- ETSI TS 103 097; Intelligent Transport Systems (ITS); Security; Security header and certificate formats; Release 2. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2021.
- ETSI TS 102 941; Intelligent Transport Systems (ITS); Security; Trust and privacy management; Release 2. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2021.
- Sommer, C.; German, R.; Dressler, F. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 2010, 10, 3–15. [Google Scholar] [CrossRef] [Green Version]
- Van der Heijden, R.W.; Lukaseder, T.; Kargl, F. Veremi: A dataset for comparable evaluation of misbehavior detection in vanets. In Proceedings of the International Conference on Security and Privacy in Communication Systems; Springer: Berlin/Heidelberg, Germany, 2018; pp. 318–337. [Google Scholar]
- Spirent. Test, Validate and Benchmark Connected Vehicles, V2X & C-V2X. Available online: https://www.spirent.com/products/test-connected-vehicles-v2x-and-cv2x (accessed on 27 December 2022).
- Keysight. E7515B UXM 5G Wireless Test Platform. Available online: https://www.keysight.com/us/en/product/E7515B/uxm-5g-wireless-test-platform.html (accessed on 27 December 2022).
- Vector. CANoe. Available online: https://www.vector.com/kr/ko/products/products-a-z/software/canoe/ (accessed on 27 December 2022).
- SAE J2945/1; On-Board System Requirements for V2V Safety Communications. SAE International DSRC Technical Committee: Warrendale, PA, USA, 2020. [CrossRef]
- ETSI EG 202 798; Intelligent Transport Systems (ITS); Testing; Framework for conformance and interoperability testing. ETSI, European Telecommunications Standards Institute: Sophia Antipolis, France, 2021.
Message | Description | |
---|---|---|
BSM | Basic Safety Message | Vehicle V2X safety information |
SPaT | Signal Phase and Timing | Traffic signal and timing information |
MAP | Map Data | Intersection and road lane information |
TIM | Traveler Information Message | For sending advisory and road sign information |
RSA | Road Side Alert | For the alerting of nearby hazards information |
PVD | Probe Vehicle Data | For collecting a vehicle’s traveling information |
TAM | Toll Advertisement Message | V2X-based fee collection data with SAE J3217 [20] |
SDSM | Sensor Data Sharing Message | Reserved for future use |
Lokaj et al. [28] | Veins (with VeReMi) [32] | Spirent V2X Test [33] | Keysight Call Simulator [34] | Vector CANoe [35] | |
---|---|---|---|---|---|
Target | V2X simulation research | Commercial evaluation tool | |||
Purpose | Validation of message interoperability | Simulation traffic and message validation | Validation test | Device test | Device test |
ITS stack | Δ (Only V2X message) | O (Provided as a module) | O (Based on Call simulator) | O (Provide full stack) | O (V2X messages require additional implementation) |
Security evaluation | Δ (Only message conformance) | Δ (Only for specified data) | Δ (Only standard conformance) | N | Δ (Feature implementation required) |
Acceptance of external message | O | Δ (Use VeReMi set) | O (Can receive external device message) | O (Can receive external device message) | O (Can receive external device message) |
Application message handling | N (Only check message interoperability) | Δ (Only ITS application) | Δ (Only handle message for test) | N | O (Can implement send/receive messages) |
Creation abnormal scenario | N | N | N | N | Δ (Provide implementation environment only) |
No. | Description | Reference | |
---|---|---|---|
Scenario 1 | BSM conformance and certificate validation test | SAE J2735 [19] | 6.10 DF_BSMcoreData |
IEEE 1609.2 [10] | 6.3 Secured protocol data units | ||
Scenario 2 | Vehicle event flag validation test | SAE J2735 [19] | 7.221 DE_VehicleEventFlags |
SAE J2945/1 [36] | Table 17 - SAE J2735 requirements | ||
6.3.1 BSM Contents (BSMCONT) | |||
6.3.6.15 DE_VehicleEventFlags | |||
Scenario 3 | Abnormal speed detection test | UN Regulation 155 [1] | 7.2.2.4 Specifications |
ISO/SAE 21434 [3] | 10.4.2 Integration verification [RC-10-12] | ||
11 Cybersecurity validation [RQ-11-01] | |||
Scenario 4 | Certificate type validation test in event situation | SAE J2945/1 [36] | 6.5.2 BSM Signing (BSMSIGN) |
Item | Description |
---|---|
TP ID | The unique identifier of TP |
Test object | A simple description of the test objective and goal |
References | Reference standards for conformity requirements |
Test configuration | Test configuration type of TP |
Pre-test conditions | The initial conditions that the IUT must apply to apply TP |
Test sequence | Test procedure |
Stimulus | Refers to an event generated to allow the IUT to perform a specific task |
Check | Determining whether the conditions are appropriate |
Configuration | Refers to the IUT operation in the test stage |
Verify | Verifying whether the IUT operates as expected. Classified as pass/fail |
Procedure | A specific action is instructed, e.g., Repeat steps 1 to 4 |
Test Sequence | |||
---|---|---|---|
Step | Type | Description | Verdict |
1 | Stimulus | A BSM is sent | |
2 | Verify | It is checked whether the BSM contains the certificate digest | pass/fail |
3 | Verify | Verification of the certificate validity | pass/fail |
4 | Verify | Verifying whether BSM core data are included | pass/fail |
5 | Verify | Verifying the validity of BSM core data values | pass/fail |
6 | Configure | Renewing the certificate | |
7 | Procedure | Repeating steps 1–4 |
Test Sequence | |||
---|---|---|---|
Step | Type | Description | Verdict |
1 | Verify | Verifying whether the BSM is sent with DE_VehicleEventFlags | pass/fail |
2 | Stimulus | Occurrence of one of the vehicle events | pass/fail |
3 | Verify | Verifying whether the BSM containing DE_VehicleEventFlags is sent within 50 ms | pass/fail |
4 | Verify | Verifying whether the data corresponding to the event is sent in the BSM containing DE_VehicleEventFlags | pass/fail |
5 | Stimulus | Removal of DE_VehicleEventFlags | |
6 | Verify | Verifying whether DE_VehicleEventFlags is included within vEventDetectLatency | pass/fail |
7 | Procedure | Repeating steps 2–6 for various events |
Test Sequence | |||
---|---|---|---|
Step | Type | Description | Verdict |
1 | Configure | BSM is transmitted normally | |
2 | Stimulus | A BSM with a random speed value is sent, and the target receives the message | |
3 | Verify | Verifying whether the IUT receives the malicious message | pass/fail |
4 | Verify | Verifying whether the received malicious message is determined as misbehavior | pass/fail |
5 | Verify | Verifying whether the misbehavior information is reported | pass/fail |
Test Sequence | |||
---|---|---|---|
Step | Type | Description | Verdict |
1 | Configure | BSM is transmitted normally | |
2 | Stimulus | Occurrence of a vehicle event | |
3 | Verify | Verifying whether the data corresponding to the event is sent in the BSM containing DE_VehicleEventFlags | pass/fail |
4 | Verify | Verifying whether the certificate type of the message sent by the target is “certificate” | pass/fail |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, D.-H.; Kim, C.-M.; Song, H.-S.; Lee, Y.-H.; Chung, W.-S. Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine. Sensors 2023, 23, 1421. https://doi.org/10.3390/s23031421
Lee D-H, Kim C-M, Song H-S, Lee Y-H, Chung W-S. Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine. Sensors. 2023; 23(3):1421. https://doi.org/10.3390/s23031421
Chicago/Turabian StyleLee, Dae-Hwi, Chan-Min Kim, Hyun-Seok Song, Yong-Hee Lee, and Won-Sun Chung. 2023. "Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine" Sensors 23, no. 3: 1421. https://doi.org/10.3390/s23031421
APA StyleLee, D. -H., Kim, C. -M., Song, H. -S., Lee, Y. -H., & Chung, W. -S. (2023). Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine. Sensors, 23(3), 1421. https://doi.org/10.3390/s23031421