Suppression strategies in different propagation periods of cyberattacks in merging area under connected environment

IF 7.4 2区 工程技术 Q1 ENGINEERING, CIVIL
Qiuling Wang , Kailiang An , Zhizhen Liu , Wenying Guan
{"title":"Suppression strategies in different propagation periods of cyberattacks in merging area under connected environment","authors":"Qiuling Wang ,&nbsp;Kailiang An ,&nbsp;Zhizhen Liu ,&nbsp;Wenying Guan","doi":"10.1016/j.jtte.2023.11.001","DOIUrl":null,"url":null,"abstract":"<div><div>In order to ensure the safety of connected and automated vehicles (CAVs) threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation, a framework is built to depict the impact of cyberattacks on traffic operation. Based on this framework, corresponding propagation suppression strategies are proposed for different types of cyberattacks in different periods. Under centralized control, game theory is used to solve the confluence sequence corresponding to the strategies. The results show that the proposed method can effectively inhibit the spread of cyberattacks on the premise of security. The initial control effect is the best. Compared with uncontrolled condition, in the 100 timesteps, 11 susceptible vehicles are finally added, and the second is the immunity period, in which 10 susceptible vehicles were protected from cyberattack. Outbreak and latency control strategies also protect some vehicles. Under the control strategy of each stage, the peak value of infected vehicles and the duration of cyberattack are improved compared with the uncontrolled strategy. In addition, the traffic efficiency in the confluence area is also improved. This method can also be extended to such road types as diverging section, weaving section and intersection, so as to reduce the impact of cyberattacks on road network scale.</div></div>","PeriodicalId":47239,"journal":{"name":"Journal of Traffic and Transportation Engineering-English Edition","volume":"10 6","pages":"Pages 1148-1161"},"PeriodicalIF":7.4000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Traffic and Transportation Engineering-English Edition","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2095756423001198","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, CIVIL","Score":null,"Total":0}
引用次数: 0

Abstract

In order to ensure the safety of connected and automated vehicles (CAVs) threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation, a framework is built to depict the impact of cyberattacks on traffic operation. Based on this framework, corresponding propagation suppression strategies are proposed for different types of cyberattacks in different periods. Under centralized control, game theory is used to solve the confluence sequence corresponding to the strategies. The results show that the proposed method can effectively inhibit the spread of cyberattacks on the premise of security. The initial control effect is the best. Compared with uncontrolled condition, in the 100 timesteps, 11 susceptible vehicles are finally added, and the second is the immunity period, in which 10 susceptible vehicles were protected from cyberattack. Outbreak and latency control strategies also protect some vehicles. Under the control strategy of each stage, the peak value of infected vehicles and the duration of cyberattack are improved compared with the uncontrolled strategy. In addition, the traffic efficiency in the confluence area is also improved. This method can also be extended to such road types as diverging section, weaving section and intersection, so as to reduce the impact of cyberattacks on road network scale.
连接环境下融合区网络攻击不同传播周期的抑制策略
为确保合流区域网联自动驾驶车辆安全受到网络攻击的威胁,减轻网络攻击传播的不利影响,构建了网络攻击对交通运行影响的描述框架。在此框架下,针对不同时期不同类型的网络攻击,提出了相应的传播抑制策略。在集中控制下,利用博弈论求解策略对应的汇流序列。实验结果表明,该方法能够在保证安全的前提下有效抑制网络攻击的扩散。初始控制效果最好。与不受控制的情况相比,在100个时间步长中,最终增加了11辆易受影响的车辆,第二个是免疫期,其中10辆易受影响的车辆免受网络攻击。爆发和延迟控制策略还可以保护某些车辆。在各阶段控制策略下,受感染车辆的峰值和网络攻击的持续时间都比不受控制的策略有所提高。此外,还提高了汇合区的交通效率。该方法还可以推广到分流路段、编织路段、交叉口等道路类型,以减少网络攻击对路网规模的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
13.60
自引率
6.30%
发文量
402
审稿时长
15 weeks
期刊介绍: The Journal of Traffic and Transportation Engineering (English Edition) serves as a renowned academic platform facilitating the exchange and exploration of innovative ideas in the realm of transportation. Our journal aims to foster theoretical and experimental research in transportation and welcomes the submission of exceptional peer-reviewed papers on engineering, planning, management, and information technology. We are dedicated to expediting the peer review process and ensuring timely publication of top-notch research in this field.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信