An Approach to Detecting Malicious Information Attacks for Platoon Safety
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ko, Byungjin | - |
dc.contributor.author | Son, Sang Hyuk | - |
dc.date.accessioned | 2023-12-11T08:30:21Z | - |
dc.date.available | 2023-12-11T08:30:21Z | - |
dc.date.issued | 2021-07 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/116267 | - |
dc.description.abstract | Malicious attacks reduce the benefits of cooperative adaptive cruise control (CACC) such as safety, driving convenience, traffic flow, and fuel efficiency, by destabilizing the stability. To reinforce the resiliency of a CACC based platoon of connected and automated vehicles (CAVs), this work investigates a detection method for malicious information attacks in the platoon. In this work, we propose an attack detection method, called LMID (long short-term memory (LSTM) based malicious information detection). We consider two attack models: correlated attacks and non-correlated attacks. In our attack scenarios, one of the platoon members attacks the platoon using the attack models. Using PLEXE, a well-known platoon simulator, we develop a simulation framework to implement attack scenarios and evaluate the proposed detection method. LMID is trained depending on the length of input data and analyzed under various scenarios regarding platoon trajectories, attack types, and an emergency brake case. We have shown that without fast detection of such attacks, crashes may happen within a platoon. The simulation results demonstrate that LMID detects the malicious information attacks with higher than 96% accuracy and the attacks are detected very quickly. The performance evaluation indicates the superiority of the proposed detection method under various circumstances. | - |
dc.format.extent | 11 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | An Approach to Detecting Malicious Information Attacks for Platoon Safety | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2021.3095480 | - |
dc.identifier.scopusid | 2-s2.0-85111568263 | - |
dc.identifier.wosid | 000678303700001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.9, pp 101289 - 101299 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 9 | - |
dc.citation.startPage | 101289 | - |
dc.citation.endPage | 101299 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | VEHICLES | - |
dc.subject.keywordPlus | MODEL | - |
dc.subject.keywordAuthor | Trajectory | - |
dc.subject.keywordAuthor | Sensors | - |
dc.subject.keywordAuthor | Fuels | - |
dc.subject.keywordAuthor | Safety | - |
dc.subject.keywordAuthor | Vehicle dynamics | - |
dc.subject.keywordAuthor | Performance evaluation | - |
dc.subject.keywordAuthor | Lead | - |
dc.subject.keywordAuthor | Attack model | - |
dc.subject.keywordAuthor | LSTM based attack detection | - |
dc.subject.keywordAuthor | malicious information | - |
dc.subject.keywordAuthor | platoon | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/9477605 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.