Department of Electrical and Electronics EngineeringDepartment of Computer Engineering2024-11-0920179781-5090-6494-610.1109/SIU.2017.79603222-s2.0-85026319429http://dx.doi.org/10.1109/SIU.2017.7960322https://hdl.handle.net/20.500.14288/10326Previous studies have shown that autonomous vehicles have the potential of fundamentally changing the Intelligent Transportation System (ITS) and substantially affecting the safety in vehicular ad hoc networks (VANET). Cooperative Adaptive Cruise Control System (CACC) in conjunction with vehicular communication paves the way of vehicle platooning where autonomous vehicles are organized into groups with close proximity. From this perspective, platoon management using the current dominant IEEE 802.11p (DSRC) and hybrid DSRC-Visible Light Communication (VLC) is an active research field to ensure the platoon stability. However, before the practical deployment of vehicular platoons, the DSRC and hybrid DSRC-VLC based management protocols need to be analyzed in the presence of attackers. In this paper, we investigate the security vulnerabilities of DSRC and DSRC-VLC based platoons under the jamming and fake platoon maneuver attacks. We demonstrate that DSRC is highly vulnerable to such attacks. Although VLC limits the effect of adversaries, hybrid architecture still suffers from the jamming and fake maneuver attacks.AcousticsComputer ScienceArtificial intelligenceElectrical electronic EngineeringTelecommunicationsSecurity vulnerabilities of autonomous platoonsOtonom taşıt gruplarında güvenlik açıklarıConference proceedinghttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85026319429&doi=10.1109%2fSIU.2017.7960322&partnerID=40&md5=eb5134ba907f29e136af6e80e3e66aa04138131001868741