Analyzing the impact of false-Accident cyber attacks on traffic flow stability in connected vehicle environment

  • Jin P
  • Zhang G
  • Michael Walton C
 et al. 
  • 15


    Mendeley users who have this article in their library.
  • 2


    Citations of this article.


With the rapid development of connected vehicle (CV) technologies, cyber security issues in the vehicular network has emerged as serious concerns for successful deployment of CV systems. In the existing literature, the analysis of the cyber security impacts has been primarily focused from the computer science perspectives investigating potential attacking scenarios and counter-measures through network security strategies. In this paper, we investigate traffic impacts of cyber attacks considering real-world driver behavior, especially the 'built-in' safety redundancy of the visual verification by drivers or autonomous driving system. More specifically, we study the impact of 'false-Accident' attacks on the stability of traffic flow. In the false-Accident attack, a vehicle sends out a false accident alert to its surrounding vehicle through CV-enabled network and has considered an attacking scenario that has catastrophic effects. Traffic flow stability is based on widely-used numerical linear stability analysis methods, the ring road test. In such a test, vehicles are restricted within a ring road so that traffic congestion and perturbations appear in cyclic patterns indicating the stability of traffic flow. The study indicates that false-Accident attacks do not necessarily yield significant impact on the stability of traffic flow. Sensitivity analysis is conducted by varying the attacking duration, the attacking vehicle position in a platoon, and the CV safety application reaction range. © 2013 IEEE.

Author-supplied keywords

  • Car-Following Dynamics
  • Connected Vehicle Technologies
  • Cyber Security
  • Traffic flow stability

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Get full text


  • Peter J. Jin

  • Guohui Zhang

  • C. Michael Walton

  • Xiaowen Jiang

  • Amit Singh

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free