2018
DOI: 10.1109/tcns.2017.2760865
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Automotive Cyber-Attacks on Highways Using Partial Differential Equation Models

Abstract: Abstract-This paper considers scenarios wherein a group of malicious vehicles on a highway perform a cooperative attack with the motive of creating undesirable wave effects among other vehicles on the highway. The two species of vehicles -malicious vehicles and normal vehicles, and their associated interaction effects, are modeled using Partial Differential Equations (PDEs). The malicious vehicles, which may be arbitrarily distributed on the highway, perform a sequence of velocity changes with the objective of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 26 publications
(43 reference statements)
0
8
0
Order By: Relevance
“…Like other modern infrastructures, traffic networks are complex and are becoming increasingly connected with traffic lights, road sensors, and vehicles exchanging information with each other. This interconnectedness-though useful at many levels-has also increased the attack surface for potential attackers that can significantly disrupt the traffic by taking control of a few network components, such as signal lights or sensors [6], [7], [44]. Recent studies outline the scope of the damage that can be caused by an adversary having an access to the traffic control infrastructure [45].…”
Section: Related Workmentioning
confidence: 99%
“…Like other modern infrastructures, traffic networks are complex and are becoming increasingly connected with traffic lights, road sensors, and vehicles exchanging information with each other. This interconnectedness-though useful at many levels-has also increased the attack surface for potential attackers that can significantly disrupt the traffic by taking control of a few network components, such as signal lights or sensors [6], [7], [44]. Recent studies outline the scope of the damage that can be caused by an adversary having an access to the traffic control infrastructure [45].…”
Section: Related Workmentioning
confidence: 99%
“…There are very few works in existing literature that focus on cyber-attack related issues in DPCPSs. For example, a PDE-based framework is used to analyze the impact of automotive cyber-attacks on highways in [16]. In [17], a PDE model is utilized to evaluate the capability of attackers to launch attacks on the freeway traffic control system.…”
Section: Introductionmentioning
confidence: 99%
“…The control algorithm of linear matrix inequality (LMI)‐based fractional‐order surface for sliding‐mode controller of a class of uncertain fractional‐order nonlinear systems (FO‐NSs) has a good effect . Ghanavati considered scenarios wherein a group of malicious vehicles on a highway perform a cooperative attack with the motive of creating undesirable wave effects among other vehicles on the highway . In order to improve vehicle lateral dynamics performance with active steering and active braking, Solmaz presented a robust controller design methodology for vehicle rollover prevention utilizing active steering .…”
Section: Introductionmentioning
confidence: 99%