Analysis of Automotive Cyber-Attacks on Highways Using Partial Differential Equation Models

被引:26
|
作者
Ghanavati, Meysam [1 ]
Chakravarthy, Animesh [2 ,3 ]
Menon, Prathyush P. [4 ]
机构
[1] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
[2] Wichita State Univ, Dept Aerosp Engn, Wichita, KS 67260 USA
[3] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
[4] Univ Exeter, Dept Math, Exeter EX4 4LA, Devon, England
来源
基金
美国国家科学基金会;
关键词
Control of distributed parameter systems; cyber-attack modeling; macroscopic traffic analysis; shock waves; TRAFFIC FLOW; SECURITY; SYSTEMS;
D O I
10.1109/TCNS.2017.2760865
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers scenarios wherein a group of malicious vehicles on a highway perform a cooperative attack with the motive of creating undesirable wave effects among other vehicles on the highway. The two species of vehicles-malicious vehicles and normal vehicles, and their associated interaction effects-are modeled using partial differential equations. The malicious vehicles, which may be arbitrarily distributed on the highway, perform a sequence of velocity changes with the objective of making the density/velocity profile on the highway, track a reference profile. This reference profile (chosen by the malicious vehicles) has the property that once generated, it spontaneously evolves into a shock wave that propagates along the highway. Analytical expressions governing the velocity inputs of the malicious vehicles with which they can generate such waves are determined, for perfect as well as imperfect information scenarios. Simulation results are presented to validate the theory.
引用
收藏
页码:1775 / 1786
页数:12
相关论文
共 50 条
  • [21] Understanding DDoS Cyber-Attacks using Social Media Analytics
    Kumar, Sumeet
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 231 - 236
  • [22] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    Cluster Computing, 2021, 24 : 1435 - 1453
  • [24] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [25] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [26] PDE-based Analysis of Cyber-Attacks in Vehicle Swarms
    Ghanavati, Meysam
    Chakravarthy, Animesh
    Menon, Prathyush
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 1329 - 1334
  • [27] Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks
    Moradi, Fereidoun
    Bagheri, Maryam
    Rahmati, Hanieh
    Yazdi, Hamed
    Asadollah, Sara Abbaspour
    Sirjani, Marjan
    MODEL CHECKING SOFTWARE, SPIN 2022, 2022, 13255 : 24 - 43
  • [28] A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security
    Tatipatri, Naveen
    Arun, S. L.
    IEEE ACCESS, 2024, 12 : 18147 - 18167
  • [29] Analysis of Joint Cyber-Attacks Strategy in Micro-Grid System
    Shao, Cheng-Wu
    Li, Yan-Fu
    2019 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE (PHM-QINGDAO), 2019,
  • [30] Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis
    Tellbach, Denise
    Li, Yan-Fu
    ENERGIES, 2018, 11 (02)