Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles

IF 4.6 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Zulqarnain H. Khattak;Brian L. Smith;Michael D. Fontaine
{"title":"Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles","authors":"Zulqarnain H. Khattak;Brian L. Smith;Michael D. Fontaine","doi":"10.1109/OJITS.2024.3391830","DOIUrl":null,"url":null,"abstract":"The deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring system for a vehicle to infrastructure (V2I) based CAV system that generates cyberattack data for CAV operations under realistic traffic conditions. The monitoring system detects any deviations from the normal operation of CAVs using a long-short term memory (LSTM) neural network proposed by the authors and reverts the system back to a safe state of operation using a set of countermeasures. The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. The LSTM showed the highest accuracy of 98% and outperformed the other algorithms. Further, the performance of the monitoring systems was assessed in terms of the impact on traffic stream stability and safety. The results reveal that a fake basic safety message (BSM) attack on even a single CAV causes the traffic stream to become significantly unstable and increase safety risk without the monitoring system. The monitoring system, however, reverts the system to a safe state of operation and reduces the negative impacts of cyberattacks. The monitoring system improves flow stability by an average of 38% as quantified through acceleration variation and volatility. This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.","PeriodicalId":100631,"journal":{"name":"IEEE Open Journal of Intelligent Transportation Systems","volume":"5 ","pages":"322-341"},"PeriodicalIF":4.6000,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10506247","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of Intelligent Transportation Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10506247/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

The deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring system for a vehicle to infrastructure (V2I) based CAV system that generates cyberattack data for CAV operations under realistic traffic conditions. The monitoring system detects any deviations from the normal operation of CAVs using a long-short term memory (LSTM) neural network proposed by the authors and reverts the system back to a safe state of operation using a set of countermeasures. The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. The LSTM showed the highest accuracy of 98% and outperformed the other algorithms. Further, the performance of the monitoring systems was assessed in terms of the impact on traffic stream stability and safety. The results reveal that a fake basic safety message (BSM) attack on even a single CAV causes the traffic stream to become significantly unstable and increase safety risk without the monitoring system. The monitoring system, however, reverts the system to a safe state of operation and reduces the negative impacts of cyberattacks. The monitoring system improves flow stability by an average of 38% as quantified through acceleration variation and volatility. This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.
实现车联网和自动驾驶汽车弹性运行的网络攻击监测架构
联网和自动驾驶车辆(CAV)的部署可在几乎没有人为反馈的情况下提高运营和安全性。自动化需要使用通信和智能设备,从而为对手引入了潜在的接入点。本文为基于车辆到基础设施(V2I)的 CAV 系统开发了一个原型实时监控系统,该系统可在现实交通条件下生成 CAV 运行的网络攻击数据。该监控系统使用作者提出的长短期记忆(LSTM)神经网络检测 CAV 正常运行的任何偏差,并使用一套对策将系统恢复到安全运行状态。作者还将所提出的算法与卷积神经网络(CNN)和其他经典算法进行了比较。监控系统高精度地检测到了三种不同的模拟网络攻击。LSTM 的准确率最高,达到 98%,优于其他算法。此外,还从对交通流稳定性和安全性的影响角度评估了监控系统的性能。结果表明,即使是对单个 CAV 的虚假基本安全信息 (BSM) 攻击也会导致交通流明显不稳定,并在没有监控系统的情况下增加安全风险。而监控系统则能使系统恢复到安全运行状态,减少网络攻击的负面影响。通过加速度变化和波动性来量化,监控系统可将流量稳定性平均提高 38%。这与没有攻击的基本情况相当。这些发现对未来弹性系统的设计具有重要意义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.40
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信