Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
Pith reviewed 2026-05-19 00:17 UTC · model grok-4.3
The pith
Protocol-compliant high-rate UDP flooding and oversized BSM messages can disable C-V2X forward collision warnings entirely.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper establishes that protocol-compliant denial-of-service attacks using high-rate UDP flooding and oversized Basic Safety Messages transmitted over standard PC5 sidelinks can severely degrade or eliminate the performance of a C-V2X Forward Collision Warning system. In a testbed built from commercial On-Board Units, UDP flooding reduced packet delivery ratio by up to 87 percent and raised latency above 400 ms; oversized BSM floods exhausted receiver resources and suppressed alerts; and the combination produced near-total communication failure that prevented any FCW warnings.
What carries the argument
Protocol-compliant high-rate UDP flooding combined with oversized Basic Safety Message transmission over PC5 sidelinks, executed on commercial On-Board Units.
If this is right
- UDP flooding reduces packet delivery ratio by up to 87 percent and raises latency above 400 ms.
- Oversized BSM floods overload receiver processing and delay or suppress FCW alerts.
- Simultaneous UDP and BSM attacks produce near-total communication failure that prevents FCW warnings.
- Strict adherence to 3GPP and SAE J2735 specifications does not by itself guarantee reliable operation of C-V2X safety applications.
Where Pith is reading between the lines
- Manufacturers may need to add rate-limiting or anomaly detection layers that go beyond current protocol requirements.
- The same resource-exhaustion pattern could affect other C-V2X safety messages such as intersection-movement-assist alerts.
- Certification processes could incorporate adversarial high-rate traffic scenarios to verify resilience.
- Future protocol revisions might need explicit resource-allocation rules to limit per-sender load.
Load-bearing premise
A testbed built from commercially available On-Board Units accurately reflects the behavior of production C-V2X vehicles and their operating conditions without any extra mitigations that real vehicles might include.
What would settle it
Measuring whether production vehicles equipped with additional rate-limiting or resource-protection mechanisms still lose all FCW functionality when subjected to the same UDP and oversized-BSM flooding rates used in the testbed.
read the original abstract
Cellular Vehicle-to-Everything (C-V2X) technology enables low-latency, reliable communications essential for safety applications such as a Forward Collision Warning (FCW) system. C-V2X deployments operate under strict protocol compliance with the 3rd Generation Partnership Project (3GPP) and the Society of Automotive Engineers Standard (SAE) J2735 specifications to ensure interoperability. This paper presents a real-world testbed evaluation of protocol-compliant Denial-of-Service (DoS) attacks using User Datagram Protocol (UDP) flooding and oversized Basic Safety Message (BSM) attacks that 7 exploit transport- and application-layer vulnerabilities in C-V2X. The attacks presented in this study transmit valid messages over standard PC5 sidelinks, fully adhering to 3GPP and SAE J2735 specifications, but at abnormally high rates and with oversized payloads that overload the receiver resources without breaching any protocol rules such as IEEE 1609. Using a real-world connected vehicle 11 testbed with commercially available On-Board Units (OBUs), we demonstrate that high-rate UDP flooding and oversized payload of BSM flooding can severely degrade FCW performance. Results show that UDP flooding alone reduces packet delivery ratio by up to 87% and increases latency to over 400ms, while oversized BSM floods overload receiver processing resources, delaying or completely suppressing FCW alerts. When UDP and BSM attacks are executed simultaneously, they cause near-total communication failure, preventing FCW warnings entirely. These findings reveal that protocol-compliant communications do not necessarily guarantee safe or reliable operation of C-V2X-based safety applications.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper evaluates protocol-compliant DoS attacks on C-V2X-based Forward Collision Warning (FCW) systems via a real-world testbed with commercially available On-Board Units (OBUs). It demonstrates that high-rate UDP flooding over PC5 reduces packet delivery ratio by up to 87% and increases latency beyond 400 ms, while oversized Basic Safety Message (BSM) floods overload receiver processing and suppress or delay FCW alerts; combined UDP+BSM attacks cause near-total communication failure. All attacks adhere to 3GPP and SAE J2735 specifications without violating rules such as those in IEEE 1609.
Significance. If the empirical results hold under production conditions, the work provides valuable evidence that protocol compliance alone does not ensure reliable operation of C-V2X safety applications, highlighting practical DoS risks at transport and application layers. The use of real hardware and quantitative outcomes from testbed experiments strengthens its relevance to automotive cybersecurity, though broader impact depends on addressing generalizability to deployed vehicle stacks.
major comments (2)
- [Testbed Evaluation] Testbed Evaluation / Experimental Setup section: The headline claims (87% PDR reduction, >400 ms latency, and total FCW suppression under combined attacks) rest on the assumption that the commercial OBU testbed accurately represents production C-V2X deployments. The manuscript does not provide firmware versions, configuration details, or evidence ruling out production-grade mitigations such as application-layer rate limiting, duplicate suppression, or hardware-accelerated validation, which could alter the observed overload severity.
- [Results] Results section (quantitative outcomes): The reported PDR drop of up to 87% and latency exceeding 400 ms lack accompanying details on the number of experimental runs, statistical methods, variance across trials, or precise attack parameters (e.g., exact UDP rates and BSM payload sizes), making it difficult to evaluate the robustness and reproducibility of the central quantitative findings.
minor comments (2)
- [Abstract] Abstract: The phrase 'that 7 exploit' appears to be a typographical or formatting artifact and should be corrected for clarity.
- [Introduction] Introduction or Attack Design: Provide a clearer enumeration of how the attacks remain fully protocol-compliant (e.g., explicit reference to specific 3GPP/SAE constraints that are respected versus those that are stressed).
Simulated Author's Rebuttal
We thank the referee for the constructive feedback on our manuscript. The comments highlight important aspects of experimental rigor and generalizability that we address below. We have prepared revisions to strengthen the presentation of our testbed details and quantitative results while maintaining the core findings on protocol-compliant DoS attacks.
read point-by-point responses
-
Referee: [Testbed Evaluation] Testbed Evaluation / Experimental Setup section: The headline claims (87% PDR reduction, >400 ms latency, and total FCW suppression under combined attacks) rest on the assumption that the commercial OBU testbed accurately represents production C-V2X deployments. The manuscript does not provide firmware versions, configuration details, or evidence ruling out production-grade mitigations such as application-layer rate limiting, duplicate suppression, or hardware-accelerated validation, which could alter the observed overload severity.
Authors: We agree that greater transparency on the testbed hardware strengthens the work. The commercial OBUs employed are production-grade devices used in early C-V2X field trials and adhere to 3GPP Release 14/15 PC5 specifications. In the revised manuscript we will add the specific firmware versions, OBU configuration parameters (including sidelink settings and message processing queues), and a dedicated limitations paragraph discussing potential differences from full vehicle-stack implementations. We note that the observed overload occurs at the transport and application layers even under strict protocol compliance; however, we cannot provide exhaustive evidence ruling out every conceivable production mitigation because the testbed reflects the hardware as deployed in research and early commercial settings. revision: partial
-
Referee: [Results] Results section (quantitative outcomes): The reported PDR drop of up to 87% and latency exceeding 400 ms lack accompanying details on the number of experimental runs, statistical methods, variance across trials, or precise attack parameters (e.g., exact UDP rates and BSM payload sizes), making it difficult to evaluate the robustness and reproducibility of the central quantitative findings.
Authors: We concur that these methodological details are necessary for reproducibility. The experiments were repeated across multiple independent trials under controlled conditions to capture wireless variability. The revised Results section will report the exact number of runs (five trials per scenario), statistical methods (mean values with standard deviation), observed variance, and precise attack parameters including a UDP flooding rate of 1000 packets per second and BSM payloads of 1500 bytes. These additions will be integrated into the text, tables, and figure captions. revision: yes
- Definitive evidence ruling out all possible production-grade mitigations (e.g., hardware-accelerated validation) in the specific commercial OBUs, as access to proprietary production configurations is limited.
Circularity Check
No circularity: empirical measurement study with direct observations only
full rationale
The paper is a real-world testbed evaluation reporting measured effects of protocol-compliant DoS attacks (UDP flooding and oversized BSM) on C-V2X FCW performance. Results such as up to 87% PDR reduction, >400 ms latency, and FCW suppression are presented as direct experimental outcomes from commercially available OBUs over PC5 links. No equations, fitted parameters, first-principles derivations, or predictions appear in the abstract or described methods. There are no self-citations forming load-bearing premises, no ansatzes smuggled via prior work, and no renaming of known results as new unifications. The central claims reduce to observed data from the described setup rather than any tautological reduction to inputs. This is a standard empirical study whose validity rests on testbed fidelity (addressed separately by the skeptic), not on any circular derivation chain.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption The testbed with commercial OBUs accurately models production C-V2X operating conditions.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
UDP flooding alone reduces packet delivery ratio by up to 87% and increases latency to over 400ms, while oversized BSM floods overload receiver processing resources, delaying or completely suppressing FCW alerts.
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Ficzere, D., P. Varga, A. Wippelhauser, H. Hejazi, O. Csernyava, A. Kovács, and C. Hegedűs. Large- Scale Cellular Vehicle-to-Everything Deployments Based on 5G—Critical Challenges, Solutions, and Vision towards 6G: A Survey. Sensors, Vol. 23, No. 16, 2023, p. 7031. https://doi.org/10.3390/s23167031
-
[2]
Mansouri, A., V. Martinez, and J. Harri. A First Investigation of Congestion Control for LTE-V2X Mode 4. Presented at the 2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Wengen, Switzerland, 2019
work page 2019
-
[3]
Enan, A., A. A. Mamun, J. M. Tine, J. Mwakalonge, D. A. Indah, G. Comert, and M. Chowdhury. Basic Safety Message Generation through a Video-Based Analytics for Potential Safety Applications. ACM Journal on Autonomous Transportation Systems, Vol. 1, No. 4, 2024, pp. 1–26. https://doi.org/10.1145/3643823
-
[4]
Zadobrischi, E., and M. Dimian. Vehicular Communications Utility in Road Safety Applications: A Step toward Self-Aware Intelligent Traffic Systems. Symmetry, Vol. 13, No. 3, 2021, p. 438. https://doi.org/10.3390/sym13030438
- [5]
-
[7]
Gonzalez-Martin, M., M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez. Analytical Models of the Performance of C-V2X Mode 4 Vehicular Communications. IEEE Transactions on Vehicular Technology, Vol. 68, No. 2, 2019, pp. 1155–1166. https://doi.org/10.1109/TVT.2018.2888704
-
[8]
McCarthy, B., and A. O’Driscoll. Congestion Control in the Cellular-V2X Sidelink. https://arxiv.org/abs/2106.04871. Accessed July 28, 2025
- [9]
-
[10]
Balador, A., E. Cinque, M. Pratesi, F. Valentini, C. Bai, A. A. Gómez, and M. Mohammadi. Survey on Decentralized Congestion Control Methods for Vehicular Communication. Vehicular Communications, Vol. 33, 2022, p. 100394. https://doi.org/10.1016/j.vehcom.2021.100394
-
[11]
Sepulcre, M., J. Mira, G. Thandavarayan, and J. Gozalvez. Is Packet Dropping a Suitable Congestion Control Mechanism for Vehicular Networks? Presented at the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 2020
work page 2020
-
[12]
Trkulja, N., D. Starobinski, and R. A. Berry. Denial-of-Service Attacks on C-V2X Networks. http://arxiv.org/abs/2010.13725. Accessed July 28, 2025
-
[13]
Twardokus, G., and H. Rahbari. Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks. Presented at the IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, 2022. Tine, Aldeen, Enan, Salek, Cheng, Chowdhury. 19
work page 2022
-
[14]
Fouda, A., R. Berry, and I. Vukovic. Interleaved One-Shot Semi-Persistent Scheduling for BSM Transmissions in C-V2X Networks. http://arxiv.org/abs/2110.00056. Accessed July 28, 2025
-
[15]
1609.3-2020 - IEEE Standard for Wireless Access in Vehicular Environments (WAVE)--Networking - Redline. IEEE, S.l., 2021
work page 2020
-
[16]
1609.2-2016 - IEEE Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages. IEEE, S.l., 2016
work page 2016
-
[17]
Silva, T. R., T. D. S. Correia, J. F. M. Sarubbi, and F. V. C. Martins. Roadside Units Deployment in Hybrid VANETs with Synchronous Communication. Presented at the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, 2018
work page 2018
-
[18]
Wang, J., I. Topilin, A. Feofilova, M. Shao, and Y. Wang. Cooperative Intelligent Transport Systems: The Impact of C-V2X Communication Technologies on Road Safety and Traffic Efficiency. Sensors, Vol. 25, No. 7, 2025, p. 2132. https://doi.org/10.3390/s25072132
-
[19]
Dapa, K. B. S. A., G. Point, S. Bensator, and F. E. Boukour. Vehicular Communications Over OFDM Radar Sensing in the 77 GHz mmWave Band. IEEE Access, Vol. 11, 2023, pp. 4821–4829. https://doi.org/10.1109/ACCESS.2023.3235199
- [20]
-
[21]
Prokes, A., J. Blumenstein, J. Vychodil, T. Mikulasek, R. Marsalek, E. Zochmann, H. Groll, C. F. Mecklenbrauker, T. Zemen, A. Chandra, H. Hammoud, and A. F. Molisch. Multipath Propagation Analysis for Vehicle-to-Infrastructure Communication at 60 GHz. Presented at the 2019 IEEE Vehicular Networking Conference (VNC), Los Angeles, CA, USA, 2019
work page 2019
-
[22]
Shah, G., M. Zaman, M. Saifuddin, B. Toghi, and Y. Fallah. Scalable Cellular V2X Solutions: Large- Scale Deployment Challenges of Connected Vehicle Safety Networks. Automotive Innovation, Vol. 7, No. 3, 2024, pp. 373–382. https://doi.org/10.1007/s42154-023-00277-6
-
[23]
Paranjothi, A., M. S. Khan, and S. Zeadally. A Survey on Congestion Detection and Control in Connected Vehicles. Ad Hoc Networks, Vol. 108, 2020, p. 102277. https://doi.org/10.1016/j.adhoc.2020.102277
-
[24]
Toghi, B., M. Saifuddin, H. N. Mahjoub, M. O. Mughal, Y. P. Fallah, J. Rao, and S. Das. Multiple Access in Cellular V2X: Performance Analysis in Highly Congested Vehicular Networks. Presented at the 2018 IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, 2018
work page 2018
-
[25]
Tabassum, M., and A. Oliveira. Collision Probabilities Between User Equipment Using 5G NR Sidelink Time-Domain-Based Resource Allocation in C-V2X. Electronics, Vol. 14, No. 4, 2025, p. 751. https://doi.org/10.3390/electronics14040751
-
[26]
Fouda, A., R. Berry, and I. Vukovic. Study of BSM Inter-Packet Gap Tails in C-V2X Networks. http://arxiv.org/abs/2311.16904. Accessed July 28, 2025
-
[27]
Kenney, J. B. Dedicated Short-Range Communications (DSRC) Standards in the United States. Proceedings of the IEEE, Vol. 99, No. 7, 2011, pp. 1162–1182. https://doi.org/10.1109/JPROC.2011.2132790. Tine, Aldeen, Enan, Salek, Cheng, Chowdhury. 20
-
[28]
Petit, J., and S. E. Shladover. Potential Cyberattacks on Automated Vehicles. IEEE Transactions on Intelligent Transportation Systems, 2014, pp. 1–11. https://doi.org/10.1109/TITS.2014.2342271
-
[29]
Abdollahi Biron, Z., S. Dey, and P. Pisu. Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems. IEEE Transactions on Intelligent Transportation Systems, Vol. 19, No. 12, 2018, pp. 3893–3902. https://doi.org/10.1109/TITS.2018.2791484
-
[30]
Boban, M., A. Kousaridas, K. Manolakis, J. Eichinger, and W. Xu. Connected Roads of the Future: Use Cases, Requirements, and Design Considerations for Vehicle-to-Everything Communications. IEEE Vehicular Technology Magazine, Vol. 13, No. 3, 2018, pp. 110–123. https://doi.org/10.1109/MVT.2017.2777259
-
[31]
Garcia, M. H. C., A. Molina-Galan, M. Boban, J. Gozalvez, B. Coll-Perales, T. Şahin, and A. Kousaridas. A Tutorial on 5G NR V2X Communications. IEEE Communications Surveys & Tutorials, Vol. 23, No. 3, 2021, pp. 1972–2026. https://doi.org/10.1109/COMST.2021.3057017
-
[32]
Fouda, A., R. Berry, and I. Vukovic. HARQ Retransmissions in C-V2X: A BSM Latency Analysis. https://arxiv.org/abs/2311.16983. Accessed July 28, 2025
-
[33]
McCarthy, B., A. Burbano-Abril, V. R. Licea, and A. O’Driscoll. OpenCV2X: Modelling of the V2X Cellular Sidelink and Performance Evaluation for Aperiodic Traffic. https://arxiv.org/abs/2103.13212. Accessed July 28, 2025
-
[34]
Ma, J., J. Li, Z. Gong, and H. Huang. An Adaptive Multi-Staged Forward Collision Warning System Using a Light Gradient Boosting Machine. Information, Vol. 13, No. 10, 2022, p. 483. https://doi.org/10.3390/info13100483
-
[35]
Bitsikas, E., and A. Ranganathan. Security Analysis of 5G NR Device-to-Device Sidelink Communications. http://arxiv.org/abs/2502.16650. Accessed Aug. 2, 2025
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.