Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense

Real-time route guidance schemes, as one of the critical services in Transportation-based Cyber-Physical Systems, have been introduced to assist travelers in determining optimal routing with low traffic congestion and travel time. To secure the route guidance process, which enables traffic efficiency and safety, in this paper we first investigate security issues of route guidance schemes via modeling and analysis of data integrity attacks on the route guidance process, and then develop corresponding mitigation mechanisms to combat the investigated attack. Via the manipulation of traffic state data measured or generated by compromised vehicles, the data integrity attack can give rise to erroneous predictions of traffic states and induce improper determination of guided routes for vehicles, increasing traffic congestion, and reducing traffic efficiency and safety. We formally model the attack and analyze its impacts on the effectiveness of route guidance schemes. Our results show that the data integrity attack can effectively disrupt route guidance schemes, leading to significant traffic congestion, increased traveling time, and imbalanced use of transportation resources. To mitigate the data integrity attack, we investigate the forged data filtering scheme, in which the forged traffic state data can be filtered out during data delivery in vehicular networks. Extensive performance evaluations are conducted to demonstrate the effectiveness of the proposed forged data filtering scheme in comparing with an exiting scheme.

[1]  Yong Guan,et al.  A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.

[2]  Ana R. Cavalli,et al.  A distributed intrusion detection scheme for wireless ad hoc networks , 2012, SAC '12.

[3]  Liviu Iftode,et al.  Probabilistic validation of aggregated data in vehicular ad-hoc networks , 2006, VANET '06.

[4]  Tao Lin,et al.  Route Planning based on Floyd Algorithm for Intelligence Transportation System , 2007, 2007 IEEE International Conference on Integration Technology.

[5]  Xinyu Yang,et al.  A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems , 2017, IEEE Transactions on Vehicular Technology.

[6]  Nada Golmie,et al.  An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.

[7]  Mate Boban,et al.  Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation , 2013, IEEE Transactions on Vehicular Technology.

[8]  Huang Hu,et al.  Research the Optimal Fuel Economy of 12m City Bus Based on MATLAB , 2011, 2011 Third International Conference on Measuring Technology and Mechatronics Automation.

[9]  Chunming Qiao,et al.  Toward Effective Service Scheduling for Human Drivers in Vehicular Cyber-Physical Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[10]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[11]  Rui Li,et al.  Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.

[12]  Gu Qing,et al.  A Supervisory Control Strategy for Plug-In Hybrid Electric Vehicles Based on Energy Demand Prediction and Route Preview , 2015, IEEE Transactions on Vehicular Technology.

[13]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[15]  Xinyu Yang,et al.  A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[16]  Xinyu Yang,et al.  A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[17]  Hyuk Lim,et al.  Prefetching-Based Data Dissemination in Vehicular Cloud Systems , 2016, IEEE Transactions on Vehicular Technology.

[18]  Kanisius Karyono,et al.  Computational load analysis of Dijkstra, A*, and Floyd-Warshall algorithms in mesh network , 2013, 2013 International Conference on Robotics, Biomimetics, Intelligent Computational Systems.

[19]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Jianzhong Li,et al.  Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks , 2009, IEEE INFOCOM 2009.

[21]  Xinyu Yang,et al.  Defending against Energy Dispatching Data integrity attacks in smart grid , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[22]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[23]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[24]  Zhong Chen,et al.  Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.

[25]  Xuemin Shen,et al.  Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System , 2015, IEEE Transactions on Vehicular Technology.

[26]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[27]  Seung-Woo Seo,et al.  Fast and Secure Group Key Dissemination Scheme for Out-of-Range V2I Communication , 2015, IEEE Transactions on Vehicular Technology.

[28]  Rui Zhang,et al.  Traffic Routing Guidance Algorithm Based on Backpressure with a Trade-Off between User Satisfaction and Traffic Load , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[29]  Erik G. Ström,et al.  Radio Resource Management for D2D-Based V2V Communication , 2016, IEEE Transactions on Vehicular Technology.

[30]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[31]  Deepak Dembla,et al.  Investigating the security threats in Vehicular ad hoc Networks (VANETs): Towards security engineering for safer on-road transportation , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[32]  Hai Le Vu,et al.  Real time route guidance with correlated link cost , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[33]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[34]  Azzedine Boukerche,et al.  Localized Routing Approach to Bypass Holes in Wireless Sensor Networks , 2014, IEEE Transactions on Computers.

[35]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[36]  Cristian Borcea,et al.  VANET Routing on City Roads Using Real-Time Vehicular Traffic Information , 2009, IEEE Transactions on Vehicular Technology.

[37]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Zhenhai Duan,et al.  False data injection on EKF-based navigation control , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).

[39]  Yanheng Liu,et al.  Modelling and simulating worm propagation in static and dynamic traffic , 2014 .

[40]  Emil Angelov Google Self-driving car , 2016 .

[41]  Kira Kastell Security requirements in communication networks for transportation systems , 2014, 2014 16th International Conference on Transparent Optical Networks (ICTON).

[42]  Timothy W. Finin,et al.  A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[43]  Claude Oestges,et al.  Vehicle-to-Vehicle Radio Channel Characterization in Crossroad Scenarios , 2016, IEEE Transactions on Vehicular Technology.

[44]  Karine Zeitouni,et al.  Proactive Vehicular Traffic Rerouting for Lower Travel Time , 2013, IEEE Transactions on Vehicular Technology.

[45]  Cheng Chen,et al.  Dynamic route guidance using maximum flow theory and its MapReduce implementation , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[46]  Tapabrata Ray,et al.  Analytical Hierarchy Process Using Fuzzy Inference Technique for Real-Time Route Guidance System , 2014, IEEE Transactions on Intelligent Transportation Systems.

[47]  Xinwen Fu,et al.  Self-Disciplinary Worms and Countermeasures: Modeling and Analysis , 2010, IEEE Transactions on Parallel and Distributed Systems.

[48]  Mohamed Ayoub Messous,et al.  How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network? , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[49]  Ting Yuan,et al.  KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[50]  Yuguang Fang Connected Vehicles Make Transportation Faster, Safer, Smarter, and Greener! , 2015, IEEE Transactions on Vehicular Technology.

[51]  Xiang Cheng,et al.  Interference Graph-Based Resource-Sharing Schemes for Vehicular Networks , 2013, IEEE Transactions on Vehicular Technology.

[52]  C.-F. Wang,et al.  Real-time vehicle route guidance using vehicle-to-vehicle communication , 2010, IET Commun..

[53]  Xinyu Yang,et al.  On false data injection attack against Multistep Electricity Price in electricity market in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[54]  Weisong Shi,et al.  $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.

[55]  Fei Xie,et al.  Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.