2018
DOI: 10.1109/tvt.2018.2845744
|View full text |Cite
|
Sign up to set email alerts
|

Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(19 citation statements)
references
References 34 publications
0
17
0
Order By: Relevance
“…Sabaliauskaite et al [22] implemented three stealth attacks on the Amiobobot robot: surge, offset, and geometric attacks, which broke the integrity of the system data. Destroying the state data measured or generated by the robot produces a data integrity attack, which can cause mispredictions in the operation or planning, and lead to reduce planning efficiency and security incidents [23]. Bonaci et al [24] studied the impact of data integrity and recovery tasks on attacked robots and pointed out that the current robot system data is not strictly protected.…”
Section: B System Datamentioning
confidence: 99%
“…Sabaliauskaite et al [22] implemented three stealth attacks on the Amiobobot robot: surge, offset, and geometric attacks, which broke the integrity of the system data. Destroying the state data measured or generated by the robot produces a data integrity attack, which can cause mispredictions in the operation or planning, and lead to reduce planning efficiency and security incidents [23]. Bonaci et al [24] studied the impact of data integrity and recovery tasks on attacked robots and pointed out that the current robot system data is not strictly protected.…”
Section: B System Datamentioning
confidence: 99%
“…The routing scheme is energy efficient and can keep the network with a high lifetime. 40,[51][52][53][54][55] In WSNs, the energy consumption of sensor nodes mainly has the following parts: 56 (a) energy consumed due to transmitting data; (b) energy consumed due to receiving data; (c) energy consumed due to idle waiting; (d) energy consumed due to keeping sleep. According to research, up to 70% of the energy consumed in WSNs is used for data operations, of which data sending and receiving consumes the most energy.…”
Section: Related Workmentioning
confidence: 99%
“…There is a much higher loss ratio in wireless communication than in wired communication. 37,40,44 In addition, there may be attacks in WSNs, 51,52 where malicious nodes interfere with data transmission and damage the reliability of data transmission. Therefore, security is also a problem worthy of attention.…”
Section: Related Workmentioning
confidence: 99%
“…Although the wireless connectivity provided by the ITS improves safety and traffic management, security attacks could negatively impact the performance of various applications [14]. Thus, the privacy and security of data shared among the different components of ITS is an important technical task [13], [15].…”
Section: Introductionmentioning
confidence: 99%
“…Of the many security challenges faced by the ITS, reliability of data shared among ITS components is a vital challenge [20], [21]. ITS applications are subject to data integrity attacks where malicious vehicles can transmit wrong information regarding surrounding vehicle density and emergency events [4], [14], [22]. This could badly impact safety applications as well as traffic management applications, resulting in wrong decision making by the applications.…”
Section: Introductionmentioning
confidence: 99%