An Approach to Detecting Malicious Information Attacks for Platoon Safety

7Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Malicious attacks reduce the benefits of cooperative adaptive cruise control (CACC) such as safety, driving convenience, traffic flow, and fuel efficiency, by destabilizing the stability. To reinforce the resiliency of a CACC based platoon of connected and automated vehicles (CAVs), this work investigates a detection method for malicious information attacks in the platoon. In this work, we propose an attack detection method, called LMID (long short-term memory (LSTM) based malicious information detection). We consider two attack models: correlated attacks and non-correlated attacks. In our attack scenarios, one of the platoon members attacks the platoon using the attack models. Using PLEXE, a well-known platoon simulator, we develop a simulation framework to implement attack scenarios and evaluate the proposed detection method. LMID is trained depending on the length of input data and analyzed under various scenarios regarding platoon trajectories, attack types, and an emergency brake case. We have shown that without fast detection of such attacks, crashes may happen within a platoon. The simulation results demonstrate that LMID detects the malicious information attacks with higher than 96% accuracy and the attacks are detected very quickly. The performance evaluation indicates the superiority of the proposed detection method under various circumstances.

Cite

CITATION STYLE

APA

Ko, B., & Son, S. H. (2021). An Approach to Detecting Malicious Information Attacks for Platoon Safety. IEEE Access, 9, 101289–101299. https://doi.org/10.1109/ACCESS.2021.3095480

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free