File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/VNC.2018.8628334
- Scopus: eid_2-s2.0-85062487634
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
Title | Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms |
---|---|
Authors | |
Keywords | Backpressure-based Scheduling Delay distribution Fairness Simulation analysis Time spoofing attacks Traffic signal control |
Issue Date | 2018 |
Citation | IEEE Vehicular Networking Conference, VNC, 2018, v. 2018-December, article no. 8628334 How to Cite? |
Abstract | In urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC. |
Persistent Identifier | http://hdl.handle.net/10722/346700 |
ISSN | 2020 SCImago Journal Rankings: 0.225 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yen, Chia Cheng | - |
dc.contributor.author | Ghosal, DIpak | - |
dc.contributor.author | Zhang, Michael | - |
dc.contributor.author | Chuah, Chen Nee | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:12:41Z | - |
dc.date.available | 2024-09-17T04:12:41Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | IEEE Vehicular Networking Conference, VNC, 2018, v. 2018-December, article no. 8628334 | - |
dc.identifier.issn | 2157-9857 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346700 | - |
dc.description.abstract | In urban transportation, scheduling algorithms in traffic signal control (TSC) are important for achieving high throughput and low latency traffic flow, lowering accidents, and reducing emissions. As new scheduling algorithms are being developed particularly to leverage and accommodate connected and autonomous vehicles, there is increased potential for cyber-attacks on TSC that can undermine the benefits of new algorithms. Attackers can learn the behavior of scheduling algorithms and launch attacks to get scheduling priority and/or to create traffic panic and congestion. These attacks can compromise the system and significantly increase traffic delay and make TSC completely ineffective. In this paper, we compare the performance of different backpressure-based scheduling algorithms when they are under attack. We consider four different backpressure-based schemes, namely, delay-based, queue-based, sum-of-delay-based, and hybrid scheme that combines delay-based and queue-based schemes. We consider time spoofing attacks where individual vehicles arriving at an intersection can alter their arrival times. Through detailed simulation analysis we show that while the delay-based scheme has better fairness performance, it is more vulnerable to time spoofing attacks than the other schemes. We explore drawbacks of the delay-based scheme under different scenarios including non-homogeneous arrivals both for isolated intersection as well as multiple intersections. This study throws light on how to prevent time spoofing attacks on next generation TSC. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Vehicular Networking Conference, VNC | - |
dc.subject | Backpressure-based Scheduling | - |
dc.subject | Delay distribution | - |
dc.subject | Fairness | - |
dc.subject | Simulation analysis | - |
dc.subject | Time spoofing attacks | - |
dc.subject | Traffic signal control | - |
dc.title | Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/VNC.2018.8628334 | - |
dc.identifier.scopus | eid_2-s2.0-85062487634 | - |
dc.identifier.volume | 2018-December | - |
dc.identifier.spage | article no. 8628334 | - |
dc.identifier.epage | article no. 8628334 | - |
dc.identifier.eissn | 2157-9865 | - |