Secure Connected Vehicle-based Traffic Signal Systems Against Data Spoofing Attacks

被引:0
|
作者
Ma, Tianye [1 ]
Zhang, Rui [1 ]
Nejad, Mark [1 ]
机构
[1] Univ Delaware, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
Security; Connected Vehicles; Intelligent Transportation Systems; Data Spoofing Attack; QUEUE LENGTH ESTIMATION; LOCATION;
D O I
10.1109/WCNC49053.2021.9417524
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging Connected Vehicle (CV) technology is widely expected to greatly enhance traffic safety and efficiency by enabling vehicles, pedestrians, and infrastructures to communicate with one another. As a promising CV application, CV-based traffic signal control aims to improve the traffic efficiency at intersections by dynamically optimizing traffic signal control plans based on the mobility information submitted by surrounding CVs. Effective CV-based traffic control relies on accurate estimation of the queue length i.e., the number of vehicles waiting at intersections, to determine the optimal traffic signal control plans. Despite significant efforts on accurate queue length estimation, the robustness of queue length estimation has so far received very limited attention. A recent study has demonstrated that it is possible for malicious CVs to significantly manipulate the queue length estimation by reporting false mobility data, which can cause severe traffic congestion. To tackle this challenge, we introduce a robust queue length estimation mechanism that first utilizes the mobility data reported by all the CVs waiting in the queue to calculate multiple preliminary queue length estimates. Then, the robust statistical methods are adopted to derive a resulting estimated queue length whose accuracy is kept at an acceptable level even though there exist multiple malicious CVs in the queue. The simulation results confirm the effectiveness of the proposed mechanism.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Connected Vehicle-Based Traffic Signal Coordination
    Li, Wan
    Ban, Xuegang
    [J]. ENGINEERING, 2020, 6 (12) : 1463 - 1472
  • [2] Secure estimation for intelligent connected vehicle systems against sensor attacks
    Lou Xiaoxin
    Song Xiulan
    He Defeng
    Meng Liming
    [J]. PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 6658 - 6662
  • [3] Connected Vehicle-Based Adaptive Signal Control and Applications
    Feng, Yiheng
    Zamanipour, Mehdi
    Head, K. Larry
    Khoshmagham, Shayan
    [J]. TRANSPORTATION RESEARCH RECORD, 2016, (2558) : 11 - 19
  • [4] Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants
    Shen, Junjie
    Wan, Ziwen
    Luo, Yunpeng
    Feng, Yiheng
    Mao, Z. Morley
    Chen, Qi Alfred
    [J]. 2023 IEEE INTELLIGENT VEHICLES SYMPOSIUM, IV, 2023,
  • [5] Secure in-vehicle systems against Trojan attacks
    Yoshikawa, Masaya
    Sugioka, Kyota
    Nozaki, Yusuke
    Asahi, Kensaku
    [J]. 2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 29 - 33
  • [6] A Scalable and Computationally Efficient Connected Vehicle-Based Signal Control Algorithm
    Liang, Xiao
    Guler, S. Ilgin
    Gayah, Vikash V.
    [J]. 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2018, : 66 - 71
  • [7] Secure trajectory planning against undetectable spoofing attacks
    Liu, Yin-Chen
    Bianchin, Gianluca
    Pasqualetti, Fabio
    [J]. AUTOMATICA, 2020, 112
  • [8] Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks
    Liu, Yonggui
    Li, Ziyuan
    Li, Qinxue
    Xie, Xuhuan
    [J]. IEEE Access, 2024, 12 : 41908 - 41917
  • [9] Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks
    Liu, Yonggui
    Li, Ziyuan
    Li, Qinxue
    Xie, Xuhuan
    [J]. IEEE ACCESS, 2024, 12 : 41908 - 41917
  • [10] Backdoor attacks against deep reinforcement learning based traffic signal control systems
    Heng Zhang
    Jun Gu
    Zhikun Zhang
    Linkang Du
    Yongmin Zhang
    Yan Ren
    Jian Zhang
    Hongran Li
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 466 - 474