A Novel Framework for Modeling and Synthesizing Stealthy Cyberattacks on Driver-Assist Enabled Vehicles

Shian Wang
{"title":"A Novel Framework for Modeling and Synthesizing Stealthy Cyberattacks on Driver-Assist Enabled Vehicles","authors":"Shian Wang","doi":"10.1109/IV55152.2023.10186690","DOIUrl":null,"url":null,"abstract":"While the first generation of driver-assist enabled vehicles, i.e., adaptive cruise control (ACC) vehicles, are becoming increasingly available, the emerging ACC technologies open a door for malicious cyberattacks, where a select number of ACC vehicles are compromised to drive in an adversarial fashion, degrading the performance of transportation systems. Many prior studies have assumed constant or stochastic attacks without much consideration of their malicious and stealthy nature. Consequently, some attacks may even act favorably to the compromised vehicles, appearing to be an unreasonable practice. To this end, we develop a novel framework for modeling and synthesizing a broad class of potential attacks with practical interpretation considering the attacker perspective. Being able to model and characterize malicious attacks on ACC vehicles is the first step towards developing effective detection and mitigation strategies as ACC vehicles continue to increase in the market. In this study, we first present a general framework describing mixed traffic involving ACC and human-driven vehicles (HDVs) based on car-following dynamics. Under this framework, a class of potential false data injection attacks on ACC sensor measurements are mathematically modeled and incorporated into traffic flow dynamics. Further, we analytically characterize their malicious and stealthy nature, resulting in a class, i.e., ${\\mathcal{C}}$, of physically interpretable attacks. To illustrate the modeling mechanism, we conduct numerical experiments to study how attacks drawn from the set ${\\mathcal{C}}$ and its complement impact car-following dynamics. In addition, the energy impact of attacks from ${\\mathcal{C}}$ on traffic flow is also examined considering different levels of attack severity.","PeriodicalId":195148,"journal":{"name":"2023 IEEE Intelligent Vehicles Symposium (IV)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Intelligent Vehicles Symposium (IV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IV55152.2023.10186690","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

While the first generation of driver-assist enabled vehicles, i.e., adaptive cruise control (ACC) vehicles, are becoming increasingly available, the emerging ACC technologies open a door for malicious cyberattacks, where a select number of ACC vehicles are compromised to drive in an adversarial fashion, degrading the performance of transportation systems. Many prior studies have assumed constant or stochastic attacks without much consideration of their malicious and stealthy nature. Consequently, some attacks may even act favorably to the compromised vehicles, appearing to be an unreasonable practice. To this end, we develop a novel framework for modeling and synthesizing a broad class of potential attacks with practical interpretation considering the attacker perspective. Being able to model and characterize malicious attacks on ACC vehicles is the first step towards developing effective detection and mitigation strategies as ACC vehicles continue to increase in the market. In this study, we first present a general framework describing mixed traffic involving ACC and human-driven vehicles (HDVs) based on car-following dynamics. Under this framework, a class of potential false data injection attacks on ACC sensor measurements are mathematically modeled and incorporated into traffic flow dynamics. Further, we analytically characterize their malicious and stealthy nature, resulting in a class, i.e., ${\mathcal{C}}$, of physically interpretable attacks. To illustrate the modeling mechanism, we conduct numerical experiments to study how attacks drawn from the set ${\mathcal{C}}$ and its complement impact car-following dynamics. In addition, the energy impact of attacks from ${\mathcal{C}}$ on traffic flow is also examined considering different levels of attack severity.
驾驶辅助车辆隐身网络攻击建模与综合的新框架
虽然第一代驾驶员辅助车辆,即自适应巡航控制(ACC)车辆正变得越来越普及,但新兴的ACC技术为恶意网络攻击打开了大门,其中选定数量的ACC车辆被破坏以对抗方式驾驶,从而降低了运输系统的性能。许多先前的研究假设持续或随机攻击,而没有考虑其恶意和隐身性。因此,一些攻击甚至可能对受损车辆有利,这似乎是一种不合理的做法。为此,我们开发了一个新的框架,用于建模和综合广泛的潜在攻击类别,并考虑攻击者的角度进行实际解释。随着ACC车辆在市场上的不断增加,能够对针对ACC车辆的恶意攻击进行建模和表征是开发有效检测和缓解策略的第一步。在本研究中,我们首先提出了一个基于汽车跟随动力学的自动驾驶汽车和人类驾驶汽车(HDVs)混合交通的一般框架。在此框架下,一类针对ACC传感器测量的潜在虚假数据注入攻击被数学建模并纳入交通流动力学。此外,我们分析表征了它们的恶意和隐身性质,从而产生一类物理可解释的攻击,即${\mathcal{C}}$。为了说明建模机制,我们进行了数值实验来研究从集合${\mathcal{C}}$及其补充中提取的攻击如何影响汽车跟随动力学。此外,考虑到不同级别的攻击严重程度,还检查了来自${\mathcal{C}}$的攻击对交通流的能量影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信