Secure Connected Vehicle-based Traffic Signal Systems Against Data Spoofing Attacks

被引:0
|
作者
Ma, Tianye [1 ]
Zhang, Rui [1 ]
Nejad, Mark [1 ]
机构
[1] Univ Delaware, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
Security; Connected Vehicles; Intelligent Transportation Systems; Data Spoofing Attack; QUEUE LENGTH ESTIMATION; LOCATION;
D O I
10.1109/WCNC49053.2021.9417524
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging Connected Vehicle (CV) technology is widely expected to greatly enhance traffic safety and efficiency by enabling vehicles, pedestrians, and infrastructures to communicate with one another. As a promising CV application, CV-based traffic signal control aims to improve the traffic efficiency at intersections by dynamically optimizing traffic signal control plans based on the mobility information submitted by surrounding CVs. Effective CV-based traffic control relies on accurate estimation of the queue length i.e., the number of vehicles waiting at intersections, to determine the optimal traffic signal control plans. Despite significant efforts on accurate queue length estimation, the robustness of queue length estimation has so far received very limited attention. A recent study has demonstrated that it is possible for malicious CVs to significantly manipulate the queue length estimation by reporting false mobility data, which can cause severe traffic congestion. To tackle this challenge, we introduce a robust queue length estimation mechanism that first utilizes the mobility data reported by all the CVs waiting in the queue to calculate multiple preliminary queue length estimates. Then, the robust statistical methods are adopted to derive a resulting estimated queue length whose accuracy is kept at an acceptable level even though there exist multiple malicious CVs in the queue. The simulation results confirm the effectiveness of the proposed mechanism.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Provoking Security: Spoofing Attacks against Crypto-Biometric Systems
    Toli, Christina-Angeliki
    Preneel, Bart
    [J]. 2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 67 - 72
  • [42] Distributed Output-Feedback Secure Platoon Control for Connected Vehicle Systems with Sensor-Actuator Attacks
    He, Lin
    Wang, Xin
    Li, Xin
    Zhang, Xian
    [J]. 2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,
  • [43] Event-based secure control for cyber-physical systems against false data injection attacks
    Li, Jinyan
    Li, Xiao-Meng
    Cheng, Zhijian
    Ren, Hongru
    Li, Hongyi
    [J]. INFORMATION SCIENCES, 2024, 679
  • [44] Performance Evaluation of Vehicle-Based Mobile Sensor Networks for Traffic Monitoring
    Li, Xu
    Shu, Wei
    Li, Minglu
    Huang, Hong-Yu
    Luo, Pei-En
    Wu, Min-You
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (04) : 1647 - 1653
  • [45] INFINITE FAMILIES OF OPTIMAL SPLITTING AUTHENTICATION CODES SECURE AGAINST SPOOFING ATTACKS OF HIGHER ORDER
    Chee, Yeow Meng
    Zhang, Xiande
    Zhang, Hui
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2011, 5 (01) : 59 - 68
  • [46] Adaptive traffic signal control algorithms based on probe vehicle data
    Lian, Fushi
    Chen, Bokui
    Zhang, Kai
    Miao, Lixin
    Wu, Jinchao
    Luan, Shichao
    [J]. JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 25 (01) : 41 - 57
  • [47] Filling Traffic Count Gaps with Connected Vehicle Data
    Claros, Boris
    Vorhes, Glenn
    Chitturi, Madhav
    Bill, Andrea
    Noyce, David A.
    [J]. INTERNATIONAL CONFERENCE ON TRANSPORTATION AND DEVELOPMENT 2022: TRAFFIC OPERATIONS AND ENGINEERING, 2022, : 192 - 199
  • [48] Secure Distributed Estimation Against Data Integrity Attacks in Internet-of-Things Systems
    Wu, Hao
    Zhou, Bo
    Zhang, Cong
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 19 (03) : 2552 - 2565
  • [49] Traffic conflict prediction using connected vehicle data
    Islam, Zubayer
    Abdel-Aty, Mohamed
    [J]. ANALYTIC METHODS IN ACCIDENT RESEARCH, 2023, 39
  • [50] Event-Based Secure Consensus of Mutiagent Systems Against DoS Attacks
    Xu, Yong
    Fang, Mei
    Shi, Peng
    Wu, Zheng-Guang
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (08) : 3468 - 3476