265
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A detection method for cyber-attack on connected signal phase and timing information

, , , , &
Pages 731-751 | Received 05 Jan 2021, Accepted 27 Jan 2022, Published online: 23 Feb 2022

References

  • Al Islam, S. B., A. Hajbabaie, and H. A. Aziz. 2020. “A Real-Time Network-Level Traffic Signal Control Methodology with Partial Connected Vehicle Information.” Transportation Research Part C: Emerging Technologies 121 (121): 102830.
  • Bae, S., Y. Kim, J. Guanetti, F. Borrelli, and S. Moura. 2019. “Design and Implementation of Ecological Adaptive Cruise Control for Autonomous Driving with Communication to Traffic Lights.” Paper presented at the 2019 American Control Conference (ACC).
  • Ban, X., R. Herring, P. Hao, and A. M. Bayen. 2009. “Delay Pattern Estimation for Signalized Intersections Using Sampled Travel Times.” Transportation Research Record 2130 (1): 109–119. doi:10.3141/2130-14.
  • Bansal, P., and K. M. Kockelman. 2017. “Forecasting Americans’ Long-Term Adoption of Connected and Autonomous Vehicle Technologies.” Transportation Research Part A: Policy Practice 95 (1): 49–63.
  • Barnett, G, and L D Tongo. 2021. Data structures and algorithms: Annotated reference with examples.
  • Burges, C. J. C. 1998. “A Tutorial on Support Vector Machines for Pattern Recognition.” Data Mining & Knowledge Discovery 2 (2): 121–167.
  • Cardenas, A. A., S. Amin, and S. Sastry. 2008. “Secure Control: Towards Survivable Cyber-Physical Systems.” Paper presented at 2008 The 28th International Conference on Distributed computing Systems workshops.
  • Challal, Y., and H. Seba. 2005. “Group key Management Protocols: A Novel Taxonomy.” International Journal of Information Technology 2 (1): 105–118.
  • Cui, H., X. Dong, H. Deng, M. Dehghani, K. Alsubhi, and H. M. A. Aljahdali. 2020. “Cyber Attack Detection Process in Sensor of DC Micro-Grids Under Electric Vehicle Based on Hilbert-Huang Transform and Deep Learning.” IEEE Sensors Journal 14 (21): 1–1.
  • Feng, Yiheng, Chunhui Yu, and Henry X. Liu. 2018. “Spatiotemporal Intersection Control in a Connected and Automated Vehicle Environment.” Transportation Research Part C Emerging Technologies 89: 364–383.
  • Ferdowsi, A., S. Ali, W. Saad, and N. B. Mandayam. 2019. “Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning.” IEEE Transactions on Communications 67 (10): 7228–7244. doi:10.1109/TCOMM.2019.2927570.
  • Fu, Y., C. Li, T. H. Luan, Y. Zhang, and G. Mao. 2018. “Infrastructure-cooperative Algorithm for Effective Intersection Collision Avoidance.” Transportation Research Part C Emerging Technologies 89: 188–204.
  • Ghoul, T., and T. Sayed. 2021. “Real-time Signal-Vehicle Coupled Control: An Application of Connected Vehicle Data to Improve Intersection Safety.” Accident Analysis Prevention 162: 106389.
  • He, Z., Z. Liang, L. Song, and Z. Ning. 2017. “A Jam-Absorption Driving Strategy for Mitigating Traffic Oscillations.” IEEE Transactions on Intelligent Transportation Systems 18 (4): 802–813.
  • He, Z., L. Zheng, L. Lu, and W. Guan. 2016. “Erasing Lane Changes from Roads: A Design of Future Road Intersections.” IEEE Transactions on Intelligent Vehicles 3 (2): 173–184.
  • Hochreiter, S., and J. Schmidhuber. 1997. “Long Short-Term Memory.” Neural Computation 9 (8): 1735–1780. doi:10.1162/neco.1997.9.8.1735.
  • Hossain, M. M., M. Fotouhi, and R. Hasan. 2015. “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things.” Paper presented at the 2015 IEEE world congress on services.
  • Jiang, H., and S.-J Lin. 2020. “A rolling hash algorithm and the implementation to LZ4 data compression.” IEEE Access 8 (99): 35529–35534.
  • Lee, S., S. Jung, and Y. Baek. 2021. “Cyber-attack Detection for Automotive Cyber-Physical Systems.” Paper presented at the proceedings of the 8th ACM International Conference on Systems for energy-efficient buildings, cities, and transportation.
  • Lu, N., N. Cheng, N. Zhang, X. Shen, and J. W. Mark. 2014. “Connected Vehicles: Solutions and Challenges.” IEEE Internet of Things Journal 1 (4): 289–299.
  • Mousavinejad, E., F. Yang, Q. Han, X. Ge, and L. Vlacic. 2019. “Distributed Cyber Attacks Detection and Recovery Mechanism for Vehicle Platooning.” IEEE Transactions on Intelligent Transportation Systems, 1–14. doi:10.1109/TITS.2019.2934481.
  • Park, M., G. Gwon, S. Seo, and H. Jeong. 2011. “RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications.” IEEE Journal on Selected Areas in Communications 29 (3): 644–658. doi:10.1109/JSAC.2011.110313.
  • Park, Y., and S. Seo. 2015. “Fast and Secure Group Key Dissemination Scheme for Out-of-Range V2I Communication.” IEEE Transactions on Vehicular Technology 64 (12): 5642–5652. doi:10.1109/TVT.2015.2487832.
  • Parkinson, S., P. Ward, K. Wilson, and J. Miller. 2017. “Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges.” IEEE Transactions on Intelligent Transportation Systems 18 (11): 2898–2915. doi:10.1109/TITS.2017.2665968.
  • Pasqualetti, F., F. Dorfler, and F. Bullo. 2013. “Attack Detection and Identification in Cyber-Physical Systems.” IEEE Transactions on Automatic Control 58 (11): 2715–2729.
  • Peng, H., X. Ban, K. P. Bennett, Q. Ji, and Z. Sun. 2012. “Signal Timing Estimation Using Sample Intersection Travel Times.” IEEE Transactions on Intelligent Transportation Systems 13 (2): 792–804.
  • Petit, J., and S. E. Shladover. 2015. “Potential Cyberattacks on Automated Vehicles.” IEEE Transactions on Intelligent Transportation Systems 16 (2): 546–556. doi:10.1109/TITS.2014.2342271.
  • Talebpour, Alireza, and Hani S. Mahmassani. 2016. “Influence of Connected and Autonomous Vehicles on Traffic Flow Stability and Throughput.” Transportation Research Part C Emerging Technologies 71 (2016): 143–163.
  • Wang, L., H. Zhong, W. Ma, M. Abdel-Aty, and J. Park. 2020. “How Many Crashes Can Connected Vehicle and Automated Vehicle Technologies Prevent: A Meta-Analysis.” Accident Analysis Prevention 136: 105299.
  • Xie, D. F., X. M. Zhao, and Z. He. 2018. “Heterogeneous Traffic Mixing Regular and Connected Vehicles: Modeling and Stabilization.” IEEE Transactions on Intelligent Transportation Systems 20 (6): 2060–2071.
  • Xu, B., X. J. Ban, Y. Bian, W. Li, J. Wang, S. E. Li, and K. Li. 2019. “Cooperative Method of Traffic Signal Optimization and Speed Control of Connected Vehicles at Isolated Intersections.” IEEE Transactions on Intelligent Transportation Systems 20 (4): 1390–1403. doi:10.1109/TITS.2018.2849029.
  • Zhang, D., C. Lv, T. Yang, and P. Hang. 2021. “Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation.” Automotive Innovation 4 (3): 262–273.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.