A Minimax Game for Resilient-by-design Adaptive Traffic Control Systems

Connected and Autonomous Vehicles (CAVs) with their evolving data gathering capabilities will play a significant role in road safety and efficiency applications supported by Intelligent Transport Systems (ITS), such as Adaptive Traffic Signal Control (ATSC) for urban traffic congestion management. However, their involvement will expand the space of security vulnerabilities and create larger threat vectors. We perform the first detailed security analysis and implementation of a new cyber-physical attack category carried out by the network of CAVs on ITS, namely, coordinated Sybil attacks, where vehicles with forged or fake identities try to alter the data collected by the ATSC algorithms to sabotage their decisions. Consequently, a novel, game-theoretic mitigation approach at the application layer is proposed to minimize the impact of Sybil attacks. The devised minimax game model enables the ATSC algorithm to generate optimal decisions under a suspected attack, improving its resilience. Extensive experimentation is performed on a traffic dataset provided by the City of Montreal under real-world intersection settings to evaluate the attack impact. Our results improved time loss on attacked intersections by approximately 48.9%. Substantial benefits can be gained from the mitigation, yielding more robust control of traffic across networked intersections.

[1]  Yevgeniy Vorobeychik,et al.  Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game , 2018, Comput. Secur..

[2]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[3]  Manu Sood,et al.  Survey on sybil attack defense mechanisms in wireless ad hoc networks , 2018, J. Netw. Comput. Appl..

[4]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[5]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[6]  Xue Liu,et al.  Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.

[7]  Aaron Hunter,et al.  A Security Analysis of an In-Vehicle Infotainment and App Platform , 2016, WOOT.

[8]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[9]  Syed Asad Hussain,et al.  A game theory based trust model for Vehicular Ad hoc Networks (VANETs) , 2017, Comput. Networks.

[10]  Dipak Ghosal,et al.  Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms , 2018, 2018 IEEE Vehicular Networking Conference (VNC).

[11]  Robert Laddaga,et al.  Deriving Cyber-security Requirements for Cyber Physical Systems , 2019, ArXiv.

[12]  Daniel Krajzewicz,et al.  Traffic Simulation with SUMO – Simulation of Urban Mobility , 2010 .

[13]  Carlo Ghezzi,et al.  On the Interplay Between Cyber and Physical Spaces for Adaptive Security , 2018, IEEE Transactions on Dependable and Secure Computing.

[14]  Jim Duggan,et al.  An Experimental Review of Reinforcement Learning Algorithms for Adaptive Traffic Signal Control , 2016, Autonomic Road Transport Support Systems.

[15]  Shihong Huang,et al.  Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data , 2018 .

[16]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[17]  Pieter Abbeel,et al.  Benchmarking Deep Reinforcement Learning for Continuous Control , 2016, ICML.

[18]  Samira Moussaoui,et al.  L-P2DSA: Location-based privacy-preserving detection of Sybil attacks , 2013, 2013 11th International Symposium on Programming and Systems (ISPS).

[19]  Yiheng Feng,et al.  Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Xiaoguang Yang,et al.  A Review of the Self-Adaptive Traffic Signal Control System Based on Future Traffic Environment , 2018, Journal of Advanced Transportation.

[22]  Morteza Babazadeh Shareh,et al.  Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model , 2019, Inf. Sci..

[23]  Stephen F. Smith,et al.  Smart Urban Signal Networks: Initial Application of the SURTRAC Adaptive Traffic Signal Control System , 2013, ICAPS.

[24]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[25]  G. Marchionni,et al.  Analysis of Adaptive Traffic Control Systems Design of a Decision Support System for Better Choices , 2015 .

[26]  Eric Bodden,et al.  Towards ensuring security by design in cyber-physical systems engineering processes , 2018, ICSSP.

[27]  John McHugh,et al.  Sybil attacks as a mitigation strategy against the Storm botnet , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[28]  Alec Radford,et al.  Proximal Policy Optimization Algorithms , 2017, ArXiv.

[29]  Nirwan Ansari,et al.  Cyber Security Game for Intelligent Transportation Systems , 2019, IEEE Network.

[30]  F. Hall TRAFFIC STREAM CHARACTERISTICS , 1997 .

[31]  Aleksandar Stevanovic,et al.  Adaptive Traffic Control Systems: Domestic and Foreign State of Practice , 2010 .

[32]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..