Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles

被引:1
|
作者
Khattak, Zulqarnain H. [1 ]
Smith, Brian L. [2 ]
Fontaine, Michael D. [3 ]
机构
[1] Carnegie Mellon Univ, Civil Engn Dept, Pittsbrugh, PA 15213 USA
[2] Univ Virginia, Dept Civil Engn, Charlottesville, VA 22904 USA
[3] Virginia Transportat Res Council, Intelligent Transportat, Charlottesville, VA 22903 USA
关键词
Cyberattack; Monitoring; Safety; Resilience; Transportation; Anomaly detection; Real-time systems; Cybersecurity; monitoring system; volatility; cooperative game; connected and automated vehicles; intelligent transportation; ANOMALY DETECTION; CYBER-ATTACKS; SAFETY; IMPACT; VOLATILITY; MANAGEMENT;
D O I
10.1109/OJITS.2024.3391830
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring system for a vehicle to infrastructure (V2I) based CAV system that generates cyberattack data for CAV operations under realistic traffic conditions. The monitoring system detects any deviations from the normal operation of CAVs using a long-short term memory (LSTM) neural network proposed by the authors and reverts the system back to a safe state of operation using a set of countermeasures. The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. The LSTM showed the highest accuracy of 98% and outperformed the other algorithms. Further, the performance of the monitoring systems was assessed in terms of the impact on traffic stream stability and safety. The results reveal that a fake basic safety message (BSM) attack on even a single CAV causes the traffic stream to become significantly unstable and increase safety risk without the monitoring system. The monitoring system, however, reverts the system to a safe state of operation and reduces the negative impacts of cyberattacks. The monitoring system improves flow stability by an average of 38% as quantified through acceleration variation and volatility. This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.
引用
收藏
页码:322 / 341
页数:20
相关论文
共 50 条
  • [1] Post-Accident Cyberattack Event Analysis for Connected and Automated Vehicles
    Girdhar, Mansi
    You, Yongsik
    Song, Tai-Jin
    Ghosh, Subhadip
    Hong, Junho
    IEEE ACCESS, 2022, 10 : 83176 - 83194
  • [2] Research on Cyberattack Detection of Connected Automated Vehicles Based on Support Vector Machine
    Liu, Runzhe
    Peng, Xin
    Sun, Zhanbo
    Huang, Zhihang
    Hu, Haitao
    2022 IEEE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION ENGINEERING, ICITE, 2022, : 372 - 378
  • [3] A Survey on Cooperative Architectures and Maneuvers for Connected and Automated Vehicles
    Haefner, Bernhard
    Bajpai, Vaibhav
    Ott, Jorg
    Schmitt, Georg A.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01): : 380 - 403
  • [4] Trust-Aware Resilient Control and Coordination of Connected and Automated Vehicles
    Ahmad, H. M. Sabbir
    Sabouni, Ehsan
    Xiao, Wei
    Cassandras, Christos G.
    Li, Wenchao
    2023 IEEE 26TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, ITSC, 2023, : 4309 - 4314
  • [5] Resilient flocking control for connected and automated vehicles with cyber-attack threats
    Wang, Fengchen
    Chen, Yan
    ASME Letters in Dynamic Systems and Control, 2021, 1 (03):
  • [6] Resilient automated intersection control of connected vehicles under denial of service attacks
    Gong, Jian
    Zhao, Yuan
    Cao, Jinde
    Huang, Wei
    Chen, Weijie
    Abdel-Aty, Mahmoud
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 136
  • [7] Resilient Predictive Control of Constrained Connected and Automated Vehicles under Malicious Attacks
    Wei, Henglai
    Wang, Yan
    Chen, Jicheng
    Zhang, Hui
    2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,
  • [8] Connected and Automated Vehicles
    Barth, Matt
    IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2015, 7 (01) : 4 - 5
  • [9] Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks
    Zhao, Ning
    Zhao, Xudong
    Xu, Ning
    Zhang, Liang
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (12) : 2300 - 2302
  • [10] Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks
    Ning Zhao
    Xudong Zhao
    Ning Xu
    Liang Zhang
    IEEE/CAAJournalofAutomaticaSinica, 2023, 10 (12) : 2300 - 2302