Secure Traffic Networks in Smart Cities: Analysis and Design of Cyber-Attack Detection Algorithms

被引:0
|
作者
Roy, Tanushree [1 ]
Dey, Satadru [1 ]
机构
[1] Univ Colorado, Dept Elect Engn, Denver, CO 80204 USA
关键词
D O I
10.23919/acc45564.2020.9147509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we focus on cyber attacks in the context of macroscopic transportation network models. For our studies, we consider a strip of freeway traffic network that is actuated on the upstream boundary by ramp-metering, which are controlled remotely from a centralized command center. In our framework, we first formulate analytical conditions for generating stealthy cyber-attacks using Aw-Rascle-Zhang (ARZ) macroscopic traffic model. Such conditions elucidate the capability of attackers and theoretical limitations of attack detection algorithms. Subsequently, we propose a design framework for cyber attack detection algorithms that considers several desirable detection characteristics such as stability, robustness and attack sensitivity. Finally, we illustrate the effectiveness of our framework via simulation studies.
引用
收藏
页码:4102 / 4107
页数:6
相关论文
共 50 条
  • [41] A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection
    Dutta, Vibekananda
    Choras, Michal
    Pawlicki, Marek
    Kozik, Rafal
    [J]. SENSORS, 2020, 20 (16) : 1 - 20
  • [42] DESIGN AND IMPLEMENTATION OF A DEVS- BASED CYBER-ATTACK SIMULATOR FOR CYBER SECURITY
    Kara, S.
    Hizal, S.
    Zengin, A.
    [J]. INTERNATIONAL JOURNAL OF SIMULATION MODELLING, 2022, 21 (01) : 53 - 64
  • [43] Cyber-attack method and perpetrator prediction using machine learning algorithms
    Bilen A.
    Özer A.B.
    [J]. PeerJ Computer Science, 2021, 7 : 1 - 21
  • [44] Event-Based Covert Cyber-Attack in Switching Cyber-Physical Systems: Design and Detection Mechanisms
    Eslami, Ali
    Kazemi, MohamadGhasem
    Khorasani, Khashayar
    [J]. 18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,
  • [45] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [46] A Distributed Cyber-Attack Detection Scheme With Application to DC Microgrids
    Gallo, Alexander Julian
    Turan, Mustafa Sahin
    Boem, Francesca
    Parisini, Thomas
    Ferrari-Trecate, Giancarlo
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3800 - 3815
  • [47] Cyber-Attack Event Analysis for EV Charging Stations
    Girdhar, Mansi
    Hong, Junho
    You, Yongsik
    Song, Tai-jin
    Govindarasu, Manimaran
    [J]. 2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [48] Reliable feature selection for adversarially robust cyber-attack detection
    Vitorino, Joao
    Silva, Miguel
    Maia, Eva
    Praca, Isabel
    [J]. ANNALS OF TELECOMMUNICATIONS, 2024,
  • [49] Physics-informed Cyber-Attack Detection in Wind Farms
    Alotibi, Faris
    Tipper, David
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2609 - 2614
  • [50] Performance evaluation of unsupervised techniques in cyber-attack anomaly detection
    Jorge Meira
    Rui Andrade
    Isabel Praça
    João Carneiro
    Verónica Bolón-Canedo
    Amparo Alonso-Betanzos
    Goreti Marreiros
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4477 - 4489