电力运输系统零信任架构:重放攻击检测的系统调查和深度学习框架

IF 4.8 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Grace Muriithi;Behnaz Papari;Ali Arsalan;Laxman Timilsina;Alex Muriithi;Elutunji Buraimoh;Asif Khan;Gokhan Ozkan;Christopher Edrington;Akram Papari
{"title":"电力运输系统零信任架构:重放攻击检测的系统调查和深度学习框架","authors":"Grace Muriithi;Behnaz Papari;Ali Arsalan;Laxman Timilsina;Alex Muriithi;Elutunji Buraimoh;Asif Khan;Gokhan Ozkan;Christopher Edrington;Akram Papari","doi":"10.1109/OJVT.2025.3592041","DOIUrl":null,"url":null,"abstract":"Modern and autonomous hybrid electric vehicles (HEVs), as complex cyber-physical systems, represent a key innovation in the future of transportation. However, the increasing interconnectivity and reliance on digital components expose these vehicles to significant cybersecurity risks. To address these challenges, Zero Trust Architecture (ZTA) has emerged as a promising security framework. Operating on the principle of ‘never trust, always verify,’ ZTA offers a comprehensive approach to ensuring continuous trust verification in HEV systems. Despite its potential, the application of ZTA within cyber-physical vehicular systems remains underexplored, and its practical benefits and limitations are not yet fully understood by the engineering community. To bridge this gap, this article presents a detailed survey of ZTA tailored specifically to the needs of vehicular CPSs, highlighting existing technologies, security challenges, and the application of zero-trust principles in HEVs. Additionally, this work proposes a deep learning-based replay attack detection scheme for the battery management system (BMS) of HEVs. The approach leverages a deep learning model to estimate the battery's State of Charge (SoC), analyzing the Error of Estimation using the Inter-Quartile Range (IQR) technique. The detection system analyzes the Error of Estimation using the IQR technique, demonstrating a 74.25% containment ratio and detecting deviations up to 2.39 units during attack scenarios. The system maintains a balanced detection sensitivity with 25.75% detection density. While the proposed method demonstrates high effectiveness in detecting stealth replay attacks through simulation results, it faces certain limitations including computational overhead for real-time processing, dependence on high-quality training data, and potential vulnerability to adversarial attacks on the underlying deep learning model. These challenges highlight the need for careful consideration in practical implementations while opening avenues for future research.","PeriodicalId":34270,"journal":{"name":"IEEE Open Journal of Vehicular Technology","volume":"6 ","pages":"2171-2194"},"PeriodicalIF":4.8000,"publicationDate":"2025-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11091432","citationCount":"0","resultStr":"{\"title\":\"Zero Trust Architecture for Electric Transportation Systems: A Systematic Survey and Deep Learning Framework for Replay Attack Detection\",\"authors\":\"Grace Muriithi;Behnaz Papari;Ali Arsalan;Laxman Timilsina;Alex Muriithi;Elutunji Buraimoh;Asif Khan;Gokhan Ozkan;Christopher Edrington;Akram Papari\",\"doi\":\"10.1109/OJVT.2025.3592041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern and autonomous hybrid electric vehicles (HEVs), as complex cyber-physical systems, represent a key innovation in the future of transportation. However, the increasing interconnectivity and reliance on digital components expose these vehicles to significant cybersecurity risks. To address these challenges, Zero Trust Architecture (ZTA) has emerged as a promising security framework. Operating on the principle of ‘never trust, always verify,’ ZTA offers a comprehensive approach to ensuring continuous trust verification in HEV systems. Despite its potential, the application of ZTA within cyber-physical vehicular systems remains underexplored, and its practical benefits and limitations are not yet fully understood by the engineering community. To bridge this gap, this article presents a detailed survey of ZTA tailored specifically to the needs of vehicular CPSs, highlighting existing technologies, security challenges, and the application of zero-trust principles in HEVs. Additionally, this work proposes a deep learning-based replay attack detection scheme for the battery management system (BMS) of HEVs. The approach leverages a deep learning model to estimate the battery's State of Charge (SoC), analyzing the Error of Estimation using the Inter-Quartile Range (IQR) technique. The detection system analyzes the Error of Estimation using the IQR technique, demonstrating a 74.25% containment ratio and detecting deviations up to 2.39 units during attack scenarios. The system maintains a balanced detection sensitivity with 25.75% detection density. While the proposed method demonstrates high effectiveness in detecting stealth replay attacks through simulation results, it faces certain limitations including computational overhead for real-time processing, dependence on high-quality training data, and potential vulnerability to adversarial attacks on the underlying deep learning model. These challenges highlight the need for careful consideration in practical implementations while opening avenues for future research.\",\"PeriodicalId\":34270,\"journal\":{\"name\":\"IEEE Open Journal of Vehicular Technology\",\"volume\":\"6 \",\"pages\":\"2171-2194\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-07-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11091432\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Open Journal of Vehicular Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11091432/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of Vehicular Technology","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11091432/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

现代自动混合动力电动汽车(hev)作为复杂的网络物理系统,代表着未来交通运输的关键创新。然而,日益增长的互联性和对数字组件的依赖使这些车辆面临重大的网络安全风险。为了应对这些挑战,零信任架构(Zero Trust Architecture, ZTA)作为一种很有前途的安全框架出现了。基于“永不信任,始终验证”的原则,ZTA提供了一种全面的方法来确保混合动力系统的持续信任验证。尽管具有潜力,ZTA在网络物理车辆系统中的应用仍未得到充分探索,其实际优势和局限性尚未被工程界充分了解。为了弥补这一差距,本文针对车载cps的需求对ZTA进行了详细调查,重点介绍了现有技术、安全挑战以及零信任原则在混合动力汽车中的应用。此外,本文还提出了一种基于深度学习的混合动力汽车电池管理系统(BMS)重放攻击检测方案。该方法利用深度学习模型来估计电池的充电状态(SoC),并使用四分位间距(IQR)技术分析估计误差。检测系统使用IQR技术分析估计误差,显示出74.25%的遏制率,并在攻击场景中检测到高达2.39个单位的偏差。系统检测灵敏度保持平衡,检测密度为25.75%。虽然通过仿真结果表明该方法在检测隐身重放攻击方面具有很高的有效性,但它也面临一定的局限性,包括实时处理的计算开销、对高质量训练数据的依赖以及潜在的对底层深度学习模型的对抗性攻击的脆弱性。这些挑战突出了在实际实施中仔细考虑的必要性,同时为未来的研究开辟了道路。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Zero Trust Architecture for Electric Transportation Systems: A Systematic Survey and Deep Learning Framework for Replay Attack Detection
Modern and autonomous hybrid electric vehicles (HEVs), as complex cyber-physical systems, represent a key innovation in the future of transportation. However, the increasing interconnectivity and reliance on digital components expose these vehicles to significant cybersecurity risks. To address these challenges, Zero Trust Architecture (ZTA) has emerged as a promising security framework. Operating on the principle of ‘never trust, always verify,’ ZTA offers a comprehensive approach to ensuring continuous trust verification in HEV systems. Despite its potential, the application of ZTA within cyber-physical vehicular systems remains underexplored, and its practical benefits and limitations are not yet fully understood by the engineering community. To bridge this gap, this article presents a detailed survey of ZTA tailored specifically to the needs of vehicular CPSs, highlighting existing technologies, security challenges, and the application of zero-trust principles in HEVs. Additionally, this work proposes a deep learning-based replay attack detection scheme for the battery management system (BMS) of HEVs. The approach leverages a deep learning model to estimate the battery's State of Charge (SoC), analyzing the Error of Estimation using the Inter-Quartile Range (IQR) technique. The detection system analyzes the Error of Estimation using the IQR technique, demonstrating a 74.25% containment ratio and detecting deviations up to 2.39 units during attack scenarios. The system maintains a balanced detection sensitivity with 25.75% detection density. While the proposed method demonstrates high effectiveness in detecting stealth replay attacks through simulation results, it faces certain limitations including computational overhead for real-time processing, dependence on high-quality training data, and potential vulnerability to adversarial attacks on the underlying deep learning model. These challenges highlight the need for careful consideration in practical implementations while opening avenues for future research.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
9.60
自引率
0.00%
发文量
25
审稿时长
10 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信