Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV Platoons

Lanai Huang*, Winston Ellis, Sana Belguith

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

With the rapid development of V2X and autonomous driving technologies, the security and stability of platoons based on Connected Autonomous Vehicles (CAVs) have become a critical research focus. However, these systems remain vulnerable when facing sophisticated attacks. In this study, we propose a Game Theory-based attack framework that introduces a Ghost Vehicle capable of executing three distinct attack modes, Leader Attack, Mid-Platoon Attack, and Follower Attack. Experimental results demonstrate that our attack effectively destabilizes the platoon during Leader Attack and Mid-Platoon Attack, while seamlessly integrating as a normal member during the Follower Attack. Unlike prior sensor-spoofing attacks that rely on hardware-intensive methods, the behavior of the Ghost Vehicle is dynamically controlled using Mode Predictive Control (MPC) and Finite State Machine (FSM), ensuring high efficiency with a maximum computation time of 40 seconds, which represents an average across multiple runs. Our attack modes are validated in a highway scenario, demonstrating the high effectiveness with low computational cost.
Original languageEnglish
Title of host publicationThe 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications)
Subtitle of host publicationIEEE TrustCom 2025
PublisherIEEE Computer Society
Publication statusAccepted/In press - 4 Oct 2025
EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications 2025: TrustCom 2025 - Renaissance Guiyang Hotel, Guiyang, China
Duration: 14 Nov 202517 Nov 2025
https://ieee-aiplus-2025.org/

Publication series

NameIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PublisherIEEE
Volume2025
ISSN (Print)2324-898X
ISSN (Electronic)2324-9013

Conference

ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications 2025
Abbreviated titleTrustCom 2025
Country/TerritoryChina
CityGuiyang
Period14/11/2517/11/25
Internet address

Fingerprint

Dive into the research topics of 'Ghost Vehicle: A Game-Theoretical Attack Strategy Targeting CAV Platoons'. Together they form a unique fingerprint.

Cite this