2018
DOI: 10.1111/mice.12416
|View full text |Cite
|
Sign up to set email alerts
|

Spreading Patterns of Malicious Information on Single‐Lane Platooned Traffic in a Connected Environment

Abstract: The connected vehicle can be easily attacked by cyber threats due to its communication through the wireless network in an open‐access environment. But very few studies have paid attention to the spreading of malicious information such as denial of service, message delay/replay, and eavesdropping generated by cyberattacks. To this end, this article introduces an analytical model, named vehicular malicious information propagation (VMIP), which integrates a classical epidemic model through two‐layer system struct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 94 publications
0
4
0
Order By: Relevance
“…Concretely, trains measure their dynamic states (i.e., position, velocity, and acceleration) and then transmit them to other trains via train‐to‐train communication. There is an update delay when trains receive the state information from others (Parise et al., 2019; Wang et al., 2019). Ideally, the average update delay for one‐way train‐to‐train transmission is usually between 26–50ms in the simulation tests for train control systems (Liu & Yuan, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Concretely, trains measure their dynamic states (i.e., position, velocity, and acceleration) and then transmit them to other trains via train‐to‐train communication. There is an update delay when trains receive the state information from others (Parise et al., 2019; Wang et al., 2019). Ideally, the average update delay for one‐way train‐to‐train transmission is usually between 26–50ms in the simulation tests for train control systems (Liu & Yuan, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…It concluded that enhanced performance and safety are attainable through V2V communication and collaboration. Wang et al [27] evaluated the impact of cyberattacks on a single platoon moving in a single lane, treating cyberattacks as similar to the dissemination of malicious information. The observation revealed that these cyberattacks notably disrupted the flow of traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Recently, the IDM has been widely used for traffic flow (28). In this study, the IDM is selected to simulate HVs for the following reasons: (1) the IDM shows clearly the intuitive physical meaning and provides collision-free behaviors and smooth traffic flow; (2) it is of great realism compared with other controllers when capturing the dynamics of different congestion levels; and (3) it is a sophisticated model that has been used to model the longitudinal dynamics of HVs in many existing studies (29)(30)(31)(32).…”
Section: Modeling Of Heterogeneous Trafficmentioning
confidence: 99%