File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms

TitleFalsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
Authors
KeywordsBackpressure-based Scheduling
Delay distribution
Fairness
Simulation analysis
Time spoofing attacks
Traffic signal control
Issue Date2018
Citation
IEEE Vehicular Networking Conference, VNC, 2018, v. 2018-December, article no. 8628334 How to Cite?
AbstractIn urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC.
Persistent Identifierhttp://hdl.handle.net/10722/346700
ISSN
2020 SCImago Journal Rankings: 0.225

 

DC FieldValueLanguage
dc.contributor.authorYen, Chia Cheng-
dc.contributor.authorGhosal, DIpak-
dc.contributor.authorZhang, Michael-
dc.contributor.authorChuah, Chen Nee-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:12:41Z-
dc.date.available2024-09-17T04:12:41Z-
dc.date.issued2018-
dc.identifier.citationIEEE Vehicular Networking Conference, VNC, 2018, v. 2018-December, article no. 8628334-
dc.identifier.issn2157-9857-
dc.identifier.urihttp://hdl.handle.net/10722/346700-
dc.description.abstractIn urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC.-
dc.languageeng-
dc.relation.ispartofIEEE Vehicular Networking Conference, VNC-
dc.subjectBackpressure-based Scheduling-
dc.subjectDelay distribution-
dc.subjectFairness-
dc.subjectSimulation analysis-
dc.subjectTime spoofing attacks-
dc.subjectTraffic signal control-
dc.titleFalsified Data Attack on Backpressure-based Traffic Signal Control Algorithms-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/VNC.2018.8628334-
dc.identifier.scopuseid_2-s2.0-85062487634-
dc.identifier.volume2018-December-
dc.identifier.spagearticle no. 8628334-
dc.identifier.epagearticle no. 8628334-
dc.identifier.eissn2157-9865-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats