Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods
The intelligent traffic signal (I-SIG) system aims to perform automatic and optimal signal control based on traffic situation awareness by leveraging connected vehicle (CV) technology. However, the current signal control algorithm is highly vulnerable to CV data spoofing attacks. These vulnerabiliti...
Guardado en:
Autores principales: | , , , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi-Wiley
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/58c69a09ca844173b044fa6cd652d09f |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:58c69a09ca844173b044fa6cd652d09f |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:58c69a09ca844173b044fa6cd652d09f2021-11-08T02:37:01ZCongestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods1939-012210.1155/2021/1632825https://doaj.org/article/58c69a09ca844173b044fa6cd652d09f2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/1632825https://doaj.org/toc/1939-0122The intelligent traffic signal (I-SIG) system aims to perform automatic and optimal signal control based on traffic situation awareness by leveraging connected vehicle (CV) technology. However, the current signal control algorithm is highly vulnerable to CV data spoofing attacks. These vulnerabilities can be exploited to create congestion in an intersection and even trigger a cascade failure in the traffic network. To avoid this issue, timely and accurate congestion attack detection and identification are essential. This work proposes a congestion attack detection approach by combining empirical prediction and analytical verification. First, we collect a range of traffic images that correspond to specific traffic snapshots which are vulnerable to potential data spoofing attacks. Based on these traffic images, an improved generative adversarial network is trained to predict whether a forthcoming attack will cause congestion with a high probability. Meanwhile, we define a group of traffic flow features. After exploring features and conducting a thorough analysis, a TGRU (tree-regularized gated recurrent unit)-based approach is proposed to verify whether congestion occurs. When we find a possible attack that can cause congestion with high probability and subsequent traffic flows also prove congestion, we can say there is a congestion attack. Thus, we can realize timely and accurate congestion attack detection by integrating empirical prediction and analytical verification. Extensive experiments demonstrate that our approach performs well in congestion attack detection accuracy and timeliness.Yingxiao XiangWenjia NiuEndong TongYike LiBowei JiaYalun WuJiqiang LiuLiang ChangGang LiHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Technology (General) T1-995 Science (General) Q1-390 |
spellingShingle |
Technology (General) T1-995 Science (General) Q1-390 Yingxiao Xiang Wenjia Niu Endong Tong Yike Li Bowei Jia Yalun Wu Jiqiang Liu Liang Chang Gang Li Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
description |
The intelligent traffic signal (I-SIG) system aims to perform automatic and optimal signal control based on traffic situation awareness by leveraging connected vehicle (CV) technology. However, the current signal control algorithm is highly vulnerable to CV data spoofing attacks. These vulnerabilities can be exploited to create congestion in an intersection and even trigger a cascade failure in the traffic network. To avoid this issue, timely and accurate congestion attack detection and identification are essential. This work proposes a congestion attack detection approach by combining empirical prediction and analytical verification. First, we collect a range of traffic images that correspond to specific traffic snapshots which are vulnerable to potential data spoofing attacks. Based on these traffic images, an improved generative adversarial network is trained to predict whether a forthcoming attack will cause congestion with a high probability. Meanwhile, we define a group of traffic flow features. After exploring features and conducting a thorough analysis, a TGRU (tree-regularized gated recurrent unit)-based approach is proposed to verify whether congestion occurs. When we find a possible attack that can cause congestion with high probability and subsequent traffic flows also prove congestion, we can say there is a congestion attack. Thus, we can realize timely and accurate congestion attack detection by integrating empirical prediction and analytical verification. Extensive experiments demonstrate that our approach performs well in congestion attack detection accuracy and timeliness. |
format |
article |
author |
Yingxiao Xiang Wenjia Niu Endong Tong Yike Li Bowei Jia Yalun Wu Jiqiang Liu Liang Chang Gang Li |
author_facet |
Yingxiao Xiang Wenjia Niu Endong Tong Yike Li Bowei Jia Yalun Wu Jiqiang Liu Liang Chang Gang Li |
author_sort |
Yingxiao Xiang |
title |
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
title_short |
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
title_full |
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
title_fullStr |
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
title_full_unstemmed |
Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods |
title_sort |
congestion attack detection in intelligent traffic signal system: combining empirical and analytical methods |
publisher |
Hindawi-Wiley |
publishDate |
2021 |
url |
https://doaj.org/article/58c69a09ca844173b044fa6cd652d09f |
work_keys_str_mv |
AT yingxiaoxiang congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT wenjianiu congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT endongtong congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT yikeli congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT boweijia congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT yalunwu congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT jiqiangliu congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT liangchang congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods AT gangli congestionattackdetectioninintelligenttrafficsignalsystemcombiningempiricalandanalyticalmethods |
_version_ |
1718443003972943872 |