4.7 Article

A data-driven method for falsified vehicle trajectory identification by anomaly detection

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.trc.2021.103196

关键词

Connected vehicles; Cybersecurity; Falsified data attack; Misbehavior detection; Trajectory embedding

资金

  1. U.S. National Science Foundation through Grant SaTC [1930041]
  2. Mcity at the University of Michigan
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [1930041] Funding Source: National Science Foundation

向作者/读者索取更多资源

This paper proposes a data-driven method to identify falsified trajectories generated by compromised connected vehicles, achieving high detection rates and low false alarm rates through the use of a trajectory embedding model and hierarchical clustering algorithm.
The vehicle-to-infrastructure (V2I) communications enable a wide range of new applications, which bring prominent benefits to the transportation system. However, malicious attackers can potentially launch falsified data attacks against V2I applications to jeopardize the traffic operation. To ensure the benefits brought by the V2I applications, it is critical to protect the applications from those cyber-attacks. However, existing literature on the defense solution that protects the V2I applications is very limited. This paper aims to fill this research gap by proposing a datadriven method to identify falsified trajectories generated by compromised connected vehicles (CVs). A trajectory embedding model, inspired by the word embedding model from the natural language processing (NLP) community, is developed. The proposed trajectory embedding model generates vector representations of vehicle trajectories that can be used to compute the similarities between trajectories. The proposed method consists of two steps. In the first step, historical trajectory data are used to train a neural network and obtain the vector representations of trajectories. The second step computes a distance matrix between each pair of trajectories and identifies falsified trajectories using a hierarchical clustering algorithm. Simulation experiments show that the proposed method has a very high detection rate (>97.0%) under different attack goals with varying CV penetration rates from 100% to 25%, while the false alarm rate remains low. It has great potential to be implemented in a wide range of trajectory-based CV applications such as traffic state estimation and traffic signal control, to safeguard the CV system from cyber threats.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据