2020
DOI: 10.1155/2020/8823300
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method

Abstract: With the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environment such as road-side infrastructure and traffic control units. A congestion attack to the controlled optimization of phases algorithm (COP) of I-SIG is recently revealed. Unfortunately, such analysis still lacks a ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Li et al [ 12 ] introduced a traffic image feature-based attack prediction mechanism. They claimed that, based on feature-based learning, it is possible to understand the relationship between attack and the caused congestion.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Li et al [ 12 ] introduced a traffic image feature-based attack prediction mechanism. They claimed that, based on feature-based learning, it is possible to understand the relationship between attack and the caused congestion.…”
Section: Related Workmentioning
confidence: 99%
“…However, in this study, a theoretical model for intrusion detection and its evaluation and validation were not specifically performed. In the current literature, there exist congestion-based attack analysis [ 11 ] and intrusion detection techniques [ 12 ] that exploit traffic image features. Additionally, with intrusion detection considering a specific attack, the other loopholes of these approaches rely on a selected set of traffic image features and an image prepossessing technique (background separation) that usually leads to being more computationally expensive.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, to solve this problem, the feasible solutions may be to detect or predict such attacks after they occurred, or to prevent such attacks. In terms of detection and prediction, in some works, such as [10], [11], the spoofed traffic flow data were analyzed to detect or predict the data spoofing attack. Li et al [10] proposed a CycleGAN-based prediction approach using traffic image features that reflects the relationship between attack and the congestion caused.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of detection and prediction, in some works, such as [10], [11], the spoofed traffic flow data were analyzed to detect or predict the data spoofing attack. Li et al [10] proposed a CycleGAN-based prediction approach using traffic image features that reflects the relationship between attack and the congestion caused. The authors in [11] proposed an explainable congestion attack prediction approach using a deep learning model, i.e., Tree-regularized Gated Recurrent Unit (TGRU), and they tried to explain the relationship between the traffic flow feature and the lanes in which the congestion attack vehicle locates.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation