Analyzing the impact of false-accident cyber attacks on traffic flow stability in connected vehicle environment

With the rapid development of connected vehicle (CV) technologies, cyber security issues in the vehicular network has emerged as serious concerns for successful deployment of CV systems. In the existing literature, the analysis of the cyber security impacts has been primarily focused from the computer science perspectives investigating potential attacking scenarios and counter-measures through network security strategies. In this paper, we investigate traffic impacts of cyber attacks considering real-world driver behavior, especially the “built-in” safety redundancy of the visual verification by drivers or autonomous driving system. More specifically, we study the impact of “false-accident” attacks on the stability of traffic flow. In the false-accident attack, a vehicle sends out a false accident alert to its surrounding vehicle through CV-enabled network and has considered an attacking scenario that has catastrophic effects. Traffic flow stability is based on widely-used numerical linear stability analysis methods, the ring road test. In such a test, vehicles are restricted within a ring road so that traffic congestion and perturbations appear in cyclic patterns indicating the stability of traffic flow. The study indicates that false-accident attacks do not necessarily yield significant impact on the stability of traffic flow. Sensitivity analysis is conducted by varying the attacking duration, the attacking vehicle position in a platoon, and the CV safety application reaction range.

[1]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[2]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[3]  LuRongxing,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks , 2010 .

[4]  Bin Ran,et al.  Bidirectional Control Characteristics of General Motors and Optimal Velocity Car-Following Models , 2013 .

[5]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[6]  E. Montroll,et al.  Traffic Dynamics: Studies in Car Following , 1958 .

[7]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[8]  Chang-Jen Lan,et al.  Estimation of Incident Delay and Its Uncertainty on Freeway Networks , 2006 .

[9]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[10]  K. Hasebe,et al.  Analysis of optimal velocity model with explicit delay , 1998, patt-sol/9805002.

[11]  Frank Kargl,et al.  Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.

[12]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[13]  Helbing,et al.  Congested traffic states in empirical observations and microscopic simulations , 2000, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[14]  Bin Ran,et al.  Reducing the Error Accumulation in Car-Following Models Calibrated With Vehicle Trajectory Data , 2014, IEEE Transactions on Intelligent Transportation Systems.

[15]  Jitendra Bhatia,et al.  REVIEW ON VARIOUS SECURITY THREATS & SOLUTIONS AND NETWORK CODING BASED SECURITY APPROACH FOR VANET , 2013 .

[16]  R. E. Wilson,et al.  Car-following models: fifty years of linear stability analysis – a mathematical perspective , 2011 .

[17]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[18]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[19]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[20]  Nakayama,et al.  Dynamical model of traffic congestion and numerical simulation. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[21]  Rahim F Benekohal,et al.  Comparison of Car-Following Models for Simulation , 1999 .

[22]  Mohamed,et al.  A Survey on VANET Intrusion Detection Systems , 2013 .

[23]  Steven H Bayless Fourth Generation Wireless - Vehicle and Highway Gateways to the Cloud: An evaluation of Long Term Evolution (LTE) and other wireless technologies’ impact to the transportation sector , 2011 .