This repository provides a framework to simulate attacks on V2X networks. It uses the VEINS simulation framework as a dependency.
- Operating System: Ubuntu/Debian/macOS
- CSVWriter.h
- Please put this file in your system's (or user's) default include directory. E.g.,
/usr/include
- Please put this file in your system's (or user's) default include directory. E.g.,
- json.hpp
- Rename this file to
json.h
and - Put it in your system's (or user's) default include directory. E.g.,
/usr/include
- Rename this file to
- Download all of the following into the same folder (preferably called "src")
- Download and extract OMNeT++ (version 5.6.2)
- Please uncomment the line with
CXXFLAGS
in the "configure.user" file in the root directory of OMNeT++ withCXXFLAGS=-std=c++14
- Install by following their installation guide.
- Please uncomment the line with
- Install SUMO (version 1.8.0) by following their installation guide.
- Clone VEINS (version 5.2):
git clone --branch veins-5.2 https://github.com/sommer/veins.git
- Add this repo as submodule under
<path/to/veins>/src/
:cd veins && git submodule add https://github.com/quic/vasp src/vasp
- Change directory to
<path/to/veins>
- Configure and build
./configure && make [-j6]
- Change directory to
<path/to/veins>
- Start
sumo
server:bin/veins_launchd -vv
- Change directory to
<path/to/veins>/src/vasp/scenario/
- Run simulation:
./run [-u Cmdenv]
- You should see a trace file generated under
<path/to/veins>/src/vasp/scenario/results
folder.
If you are using our VASP framework or codes for your development, please cite the following paper:
@inproceedings{vasp2023,
title={VASP: V2X Application Spoofing Platform},
author={Ansari, Mohammad Raashid and Petit, Jonathan and Monteuuis, Jean-Philippe and Chen, Cong},
booktitle={Proceedings Inaugural International Symposium on Vehicle Security & Privacy, ndss-symposium},
url={https://doi.org/10.14722/vehiclesec.2023.23071},
year={2023}
}
MIT