Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms

Chia-Cheng Yen, D. Ghosal, H. M. Zhang, C. Chuah, Hao Chen
{"title":"Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms","authors":"Chia-Cheng Yen, D. Ghosal, H. M. Zhang, C. Chuah, Hao Chen","doi":"10.1109/VNC.2018.8628334","DOIUrl":null,"url":null,"abstract":"In urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC.","PeriodicalId":335017,"journal":{"name":"2018 IEEE Vehicular Networking Conference (VNC)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Vehicular Networking Conference (VNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2018.8628334","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

In urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于反压力的交通信号控制算法的伪造数据攻击
在城市交通中,交通信号控制(TSC)调度算法对于实现高吞吐量和低延迟交通流、减少事故和减少排放具有重要意义。随着新的调度算法的开发,特别是为了利用和适应联网和自动驾驶汽车,针对TSC的网络攻击的可能性越来越大,这可能会破坏新算法的好处。攻击者可以学习调度算法的行为并发起攻击,以获得调度优先级和/或制造流量恐慌和拥塞。这些攻击会危及系统,显著增加流量延迟,使TSC完全失效。在本文中,我们比较了不同的基于背压的调度算法在受到攻击时的性能。我们考虑了四种不同的基于背压的方案,即基于延迟、基于队列、基于延迟和基于延迟和基于队列的混合方案。我们考虑时间欺骗攻击,即单个车辆到达十字路口时可以改变其到达时间。通过详细的仿真分析表明,基于延迟的方案虽然具有较好的公平性,但比其他方案更容易受到时间欺骗攻击。我们探讨了基于延迟的方案在不同情况下的缺陷,包括孤立交叉口和多个交叉口的非均匀到达。该研究对如何防止下一代TSC的时间欺骗攻击提供了启示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
OFDM Pilot-Based Radar for Joint Vehicular Communication and Radar Systems Evaluation of IEEE 802.11af Compliant Devices for Vehicle to Infrastructure Communications in Suburban Environment ProSEV: Proxy-Based Secure and Efficient Vehicular Communication Realizing Collective Perception in the Artery Simulation Framework Power Budget for Wide Area Ambient Backscattering Communications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1