As mentioned above, today's VANETs and ICVs systems are becoming increasingly integrated, which has led to a growing variety of attack methods. Based on the type of attack, the attack models can be roughly divided into two categories:
Remote Access Attacks: In these attacks, the attacker does not need to physically modify any components of the ICV. Instead, they send forged data to the ICV system to deceive and gain significant control over its behaviors.
Physical Access Attacks: In these attacks, the attacker must physically modify components of the ICV to achieve their malicious objectives.
Furthermore, based on the attacker’s motivation, the attack models can be classified into the following three categories:
Disruption of Operation: The attacker’s goal is to compromise critical components of the ICV that are vital for autonomous driving, thereby rendering the autonomous driving functionality inoperative.
Gaining Control Over the ICV: The attacker obtains full control of the ICV so that they can alter the vehicle’s movement.
Information Theft: The attacker aims to collect important or confidential information from the ICV, which could be used for further attacks.
For GPS/GNSS spoofing and interference attacks, the mainstream solutions currently include:
Correlation Function Distortion Detection: Analyze the autocorrelation function of the received signal to determine whether multiple signal sources (authentic/fake signals) exist.
Received Power Monitoring (RPM): Monitor the total received signal power; a sudden increase may indicate a spoofing attack.
Inertial Measurement Unit (IMU): This device detects abnormal changes in position using data from accelerometers and gyroscopes, cross-validated with GNSS data.
For network DoS attacks, the mainstream solutions currently include:
Multi-Channel Switching: Use multiple channels (for example, DSRC, UTRA-DD, or even short-range Bluetooth) to counteract channel interference. In the worst-case scenario, the enhanced functions of VANETs should be actively shut down until the network can be reestablished.