Analyzing the impact of false-Accident cyber attacks on traffic flow stability in connected vehicle environment

7Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid development of connected vehicle (CV) technologies, cyber security issues in the vehicular network has emerged as serious concerns for successful deployment of CV systems. In the existing literature, the analysis of the cyber security impacts has been primarily focused from the computer science perspectives investigating potential attacking scenarios and counter-measures through network security strategies. In this paper, we investigate traffic impacts of cyber attacks considering real-world driver behavior, especially the 'built-in' safety redundancy of the visual verification by drivers or autonomous driving system. More specifically, we study the impact of 'false-Accident' attacks on the stability of traffic flow. In the false-Accident attack, a vehicle sends out a false accident alert to its surrounding vehicle through CV-enabled network and has considered an attacking scenario that has catastrophic effects. Traffic flow stability is based on widely-used numerical linear stability analysis methods, the ring road test. In such a test, vehicles are restricted within a ring road so that traffic congestion and perturbations appear in cyclic patterns indicating the stability of traffic flow. The study indicates that false-Accident attacks do not necessarily yield significant impact on the stability of traffic flow. Sensitivity analysis is conducted by varying the attacking duration, the attacking vehicle position in a platoon, and the CV safety application reaction range. © 2013 IEEE.

Cite

CITATION STYLE

APA

Jin, P. J., Zhang, G., Michael Walton, C., Jiang, X., & Singh, A. (2013). Analyzing the impact of false-Accident cyber attacks on traffic flow stability in connected vehicle environment. In 2013 International Conference on Connected Vehicles and Expo, ICCVE 2013 - Proceedings (pp. 616–621). IEEE Computer Society. https://doi.org/10.1109/ICCVE.2013.6799866

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free