IEEE Access (Jan 2023)

Phantom Car Attack Detection via Passive Opportunistic RF Localization

  • Alexander M. Wyglinski,
  • Thanuka Wickramarathne,
  • Danjue Chen,
  • Nicholas J. Kirsch,
  • Kuldeep S. Gill,
  • Taru Jain,
  • Varun Garg,
  • Tienan Li,
  • Shuva Paul,
  • Zhang Xi

DOI
https://doi.org/10.1109/ACCESS.2023.3257281
Journal volume & issue
Vol. 11
pp. 27676 – 27692

Abstract

Read online

A novel opportunistic approach of passive RF localization is presented for detecting “phantom car” attacks, i.e., vehicles intentionally reporting false position/velocity information to surrounding vehicles and communication networks. Current state-of-the-art approaches for vehicle localization mostly rely on either: (i) self-reported position/velocity updates obtained via navigation technologies such as GPS, or (ii) cooperative communication approaches involving multiple vehicles exchanging situational awareness information with each other. In both cases, these approaches assume that all vehicles involved truthfully share their actual location information, which might not be the case if malicious users are present within the traffic flow. The proposed approach does not make this assumption. Rather, it extracts location information of vehicles operating on the road without the need to cooperate with them. Multiple sensors surrounding these vehicles are opportunistically and passively measured for their RF emission characteristics (e.g., received signal strength, time difference of arrival) based on using on-board widely available wireless signals (e.g., 5G, Bluetooth, WiFi). These RF emissions are not intentionally designed to be used in localization applications. Their characteristics are processed via data fusion and bounded via vehicle dynamics behavioral models before being compared against reported positions within the vehicular communications network. This paper presents the phantom car attack model used in this work to compromise conventional vehicle localization techniques, as well as the framework and its respective sub-components implementing the proposed detection approach. To evaluate the feasibility of the proposed approach, a custom-built Python-based computer simulation platform is described that accurately models the vehicular environment and its associated RF emissions characteristics. Finally, a simple hardware field experiment evaluating the performance of the proposed approach incorporating RF localization, data fusion, and vehicle behavioral dynamics modules illustrates the viability of identifying phantom car attacks within a non-cooperative framework.

Keywords