DocumentCode :
1892733
Title :
Analyzing the impact of false-accident cyber attacks on traffic flow stability in connected vehicle environment
Author :
Jin, Peter J. ; Walton, C. Michael ; Guohui Zhang ; Xiaowen Jiang ; Singh, Ashutosh
Author_Institution :
Dept. of Civil, Archit., & Environ. Eng., Univ. of Texas at Austin, Austin, TX, USA
fYear :
2013
fDate :
2-6 Dec. 2013
Firstpage :
616
Lastpage :
621
Abstract :
With the rapid development of connected vehicle (CV) technologies, cyber security issues in the vehicular network has emerged as serious concerns for successful deployment of CV systems. In the existing literature, the analysis of the cyber security impacts has been primarily focused from the computer science perspectives investigating potential attacking scenarios and counter-measures through network security strategies. In this paper, we investigate traffic impacts of cyber attacks considering real-world driver behavior, especially the “built-in” safety redundancy of the visual verification by drivers or autonomous driving system. More specifically, we study the impact of “false-accident” attacks on the stability of traffic flow. In the false-accident attack, a vehicle sends out a false accident alert to its surrounding vehicle through CV-enabled network and has considered an attacking scenario that has catastrophic effects. Traffic flow stability is based on widely-used numerical linear stability analysis methods, the ring road test. In such a test, vehicles are restricted within a ring road so that traffic congestion and perturbations appear in cyclic patterns indicating the stability of traffic flow. The study indicates that false-accident attacks do not necessarily yield significant impact on the stability of traffic flow. Sensitivity analysis is conducted by varying the attacking duration, the attacking vehicle position in a platoon, and the CV safety application reaction range.
Keywords :
numerical stability; sensitivity analysis; telecommunication security; telecommunication traffic; vehicular ad hoc networks; CV safety application reaction range; CV systems; CV technologies; CV-enabled network; attacking scenario; attacking vehicle position; autonomous driving system; built-in safety redundancy; computer science perspectives; connected vehicle technologies; countermeasures; cyber security impacts; cyber security issues; cyclic patterns; false accident alert; false-accident attacks; network security strategies; numerical linear stability analysis methods; perturbations; real-world driver behavior; ring road test; sensitivity analysis; traffic congestion; traffic flow stability; vehicular network; visual verification; Acceleration; Accidents; Numerical stability; Roads; Safety; Stability analysis; Vehicles; Car-Following Dynamics; Connected Vehicle Technologies; Cyber Security; Traffic flow stability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Connected Vehicles and Expo (ICCVE), 2013 International Conference on
Conference_Location :
Las Vegas, NV
Type :
conf
DOI :
10.1109/ICCVE.2013.6799866
Filename :
6799866
Link To Document :
بازگشت