Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks That Cause Traffic Congestion

Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization. Due to the vulnerable nature of wireless communication against interference and intentional jamming, ITS face new challenges to ensure the reliability and the safety of the overall system. In this paper, we expose a class of stealthy attacks -- Stuck in Traffic (SiT) attacks -- that aim to cause congestion by exploiting how drivers make decisions based on smart traffic signs. An attacker mounting a SiT attack solves a Markov Decision Process problem to find optimal/suboptimal attack policies in which he/she interferes with a well-chosen subset of signals that are based on the state of the system. We apply approximate policy iteration algorithms to derive potent attack policies. We evaluate their performance on a number of systems and compare them to other attack policies including random, myopic and DoS attack policies. The generated policies, albeit suboptimal, are shown to significantly outperform other attack policies as they maximize the expected cumulative reward from the standpoint of the attacker.

[1]  Andrew McCallum,et al.  Introduction to Statistical Relational Learning , 2007 .

[2]  Bart De Schutter,et al.  Cross-Entropy Optimization of Control Policies With Adaptive Basis Functions , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[3]  Jean-Pierre Hubaux,et al.  A Survey of Research in Inter-Vehicle Communications , 2006 .

[4]  D. Bertsekas Approximate policy iteration: a survey and some new methods , 2011 .

[5]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[6]  Peter Stone,et al.  Multiagent traffic management: an improved intersection control mechanism , 2005, AAMAS '05.

[7]  Dimitri P. Bertsekas,et al.  Basis function adaptation methods for cost approximation in MDP , 2009, 2009 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning.

[8]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[9]  R. Tatchikou,et al.  Cooperative vehicle collision avoidance using inter-vehicle packet forwarding , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[10]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[11]  Markus Jakobsson,et al.  Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[12]  J. Bouchaud An introduction to statistical finance , 2002 .

[13]  George Cardona,et al.  Pāṇini : a survey of research , 1976 .

[14]  Shie Mannor,et al.  Adaptive Bases for Reinforcement Learning , 2010, ECML/PKDD.

[15]  Maria Kihl,et al.  Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.

[16]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[17]  R. Bellman A Markovian Decision Process , 1957 .

[18]  Raja Sengupta,et al.  Cooperative Collision Warning: Enabling Crash Avoidance with Wireless Technology , 2005 .

[19]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[20]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[21]  Bo Xu,et al.  Monitoring neighboring vehicles for safety via V2V communication , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.

[22]  Subir Biswas,et al.  Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety , 2006, IEEE Communications Magazine.

[23]  Gongjun Yan,et al.  Cooperative Collision Warning through mobility and probability prediction , 2010, 2010 IEEE Intelligent Vehicles Symposium.

[24]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[25]  Anish Arora,et al.  Capabilities of Low-Power Wireless Jammers , 2009, IEEE INFOCOM 2009.

[26]  D. Schrank,et al.  2012 Urban Mobility Report , 2002 .

[27]  Tim Leinmüller,et al.  Influence of falsified position data on geographic ad-hoc routing , 2005 .

[28]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[29]  John N. Tsitsiklis,et al.  Neuro-Dynamic Programming , 1996, Encyclopedia of Machine Learning.

[30]  Tamer A. ElBatt,et al.  Cooperative collision warning using dedicated short range wireless communications , 2006, VANET '06.

[31]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.