Change Point Models for Real-Time Cyber Attack Detection in Connected Vehicle Environment

被引:11
|
作者
Comert, Gurcan [1 ,2 ]
Rahman, Mizanur [3 ]
Islam, Mhafuzul [4 ]
Chowdhury, Mashrur [4 ]
机构
[1] Benedict Coll, Dept Comp Sci Phys & Engn, Columbia, SC 29204 USA
[2] Univ Illinois, Informat Trust Inst, Urbana, IL 61801 USA
[3] Univ Alabama, Dept Civil Construct & Environm Engn, Tuscaloosa, AL 35487 USA
[4] Clemson Univ, Glenn Dept Civil Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Adaptation models; Data models; Computational modeling; Cyberattack; Connected vehicles; Real-time systems; Anomaly detection; Cyber attack detection; connected vehicles; expectation maximization; CUSUM; roadside equipment; SECURITY; PRIVACY; SCHEME;
D O I
10.1109/TITS.2021.3113675
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Connected vehicle (CV) systems are subject to potential cyber attacks because of increasing connectivity between its different components, such as vehicles, roadside infrastructure, and traffic management centers. However, it is a challenge to detect security threats in real-time and develop appropriate or effective countermeasures for a CV system because of the dynamic behavior of such attacks, high computational power requirement, and a historical data requirement for training detection models. To address these challenges, statistical models, especially change point models, have potentials for real-time anomaly detection. Thus, the objective of this study is to investigate the efficacy of two change point models; Expectation Maximization (EM) and two forms of Cumulative Summation (CUSUM) algorithms (i.e., typical and adaptive), for real-time vehicle-to-infrastructure (V2I) cyber attack detection in a CV Environment. To prove the efficacy of these models, we evaluated these two models for three different types of cyber attack, denial of service (DOS), impersonation, and false information, using basic safety messages (BSMs) generated from CVs through simulation. Results from numerical analysis revealed that EM, CUSUM, and adaptive CUSUM (aCUSUM) could detect these cyberattacks, such as DOS, impersonation, and false information with low false positives.
引用
收藏
页码:12328 / 12342
页数:15
相关论文
共 50 条
  • [21] Real-Time Vehicle Motion Detection and Motion Altering for Connected Vehicle: Algorithm Design and Practical Applications
    Zhao, Wei
    Yin, Jiateng
    Wang, Xiaohan
    Hu, Jia
    Qi, Bozhao
    Runge, Troy
    SENSORS, 2019, 19 (19)
  • [22] Real-time detection of a change-point in a linear expectile model
    Gabriela Ciuperca
    Statistical Papers, 2022, 63 : 1323 - 1367
  • [23] Real-time detection of a change-point in a linear expectile model
    Ciuperca, Gabriela
    STATISTICAL PAPERS, 2022, 63 (04) : 1323 - 1367
  • [24] Real-Time Freeway Crash Detection Framework using Connected Vehicle Waypoint Data
    Kandiboina, Raghupathi
    Ravichandra-Mouli, Varsha
    Basulto-Elias, Guillermo
    Knickerbocker, Skylar
    Hawkins, Neal
    Sharma, Anuj
    TRANSPORTATION RESEARCH RECORD, 2024,
  • [25] Advancing connected vehicle security through real-time sensor anomaly detection and recovery
    Singh, Akshit
    Rathore, Heena
    VEHICULAR COMMUNICATIONS, 2025, 52
  • [26] Application of explainable machine learning for real-time safety analysis toward a connected vehicle environment
    Yuan, Chen
    Li, Ye
    Huang, Helai
    Wang, Shiqi
    Sun, Zhenhao
    Wang, Honggang
    Accident Analysis and Prevention, 2022, 171
  • [27] Application of explainable machine learning for real-time safety analysis toward a connected vehicle environment
    Yuan, Chen
    Li, Ye
    Huang, Helai
    Wang, Shiqi
    Sun, Zhenhao
    Wang, Honggang
    ACCIDENT ANALYSIS AND PREVENTION, 2022, 171
  • [28] Real-Time Change Point Detection with Application to Smart Home Time Series Data
    Aminikhanghahi, Samaneh
    Wang, Tinghui
    Cook, Diane J.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (05) : 1010 - 1023
  • [29] Attack Detection in Power Distribution Systems Using a Cyber-Physical Real-Time Reference Model
    Khan, Mohammed Masum Siraj
    Giraldo, Jairo A.
    Parvania, Masood
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (02) : 1490 - 1499
  • [30] Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
    Hao, Xiaochen
    Lv, Mingsong
    Zheng, Jiesheng
    Zhang, Zhengkui
    Yi, Wang
    2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 237 - 245