Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles

The deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring syste...

Full description

Saved in:
Bibliographic Details
Main Authors: Zulqarnain H. Khattak, Brian L. Smith, Michael D. Fontaine
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Open Journal of Intelligent Transportation Systems
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10506247/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832590353173053440
author Zulqarnain H. Khattak
Brian L. Smith
Michael D. Fontaine
author_facet Zulqarnain H. Khattak
Brian L. Smith
Michael D. Fontaine
author_sort Zulqarnain H. Khattak
collection DOAJ
description The deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring system for a vehicle to infrastructure (V2I) based CAV system that generates cyberattack data for CAV operations under realistic traffic conditions. The monitoring system detects any deviations from the normal operation of CAVs using a long-short term memory (LSTM) neural network proposed by the authors and reverts the system back to a safe state of operation using a set of countermeasures. The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. The LSTM showed the highest accuracy of 98% and outperformed the other algorithms. Further, the performance of the monitoring systems was assessed in terms of the impact on traffic stream stability and safety. The results reveal that a fake basic safety message (BSM) attack on even a single CAV causes the traffic stream to become significantly unstable and increase safety risk without the monitoring system. The monitoring system, however, reverts the system to a safe state of operation and reduces the negative impacts of cyberattacks. The monitoring system improves flow stability by an average of 38% as quantified through acceleration variation and volatility. This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.
format Article
id doaj-art-b387889917f04b9c880484ada202cc0c
institution Kabale University
issn 2687-7813
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of Intelligent Transportation Systems
spelling doaj-art-b387889917f04b9c880484ada202cc0c2025-01-24T00:02:40ZengIEEEIEEE Open Journal of Intelligent Transportation Systems2687-78132024-01-01532234110.1109/OJITS.2024.339183010506247Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated VehiclesZulqarnain H. Khattak0https://orcid.org/0000-0002-2599-4852Brian L. Smith1https://orcid.org/0000-0001-5102-6399Michael D. Fontaine2https://orcid.org/0000-0002-5003-6680Civil Engineering Department, Carnegie Mellon University, Pittsbrugh, PA, USACivil Engineering Department, University of Virginia, Charlottesville, VA, USAIntelligent Transportation, Virginia Transportation Research Council, Charlottesville, VA, USAThe deployment of connected and automated vehicles (CAVs) may enhance operations and safety with little human feedback. Automation requires the use of communication and smart devices, thus introducing potential access points for adversaries. This paper develops a prototype real-time monitoring system for a vehicle to infrastructure (V2I) based CAV system that generates cyberattack data for CAV operations under realistic traffic conditions. The monitoring system detects any deviations from the normal operation of CAVs using a long-short term memory (LSTM) neural network proposed by the authors and reverts the system back to a safe state of operation using a set of countermeasures. The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. The monitoring system detected three different emulated cyberattacks with high accuracy. The LSTM showed the highest accuracy of 98% and outperformed the other algorithms. Further, the performance of the monitoring systems was assessed in terms of the impact on traffic stream stability and safety. The results reveal that a fake basic safety message (BSM) attack on even a single CAV causes the traffic stream to become significantly unstable and increase safety risk without the monitoring system. The monitoring system, however, reverts the system to a safe state of operation and reduces the negative impacts of cyberattacks. The monitoring system improves flow stability by an average of 38% as quantified through acceleration variation and volatility. This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.https://ieeexplore.ieee.org/document/10506247/Cybersecuritymonitoring systemvolatilitycooperative gameconnected and automated vehiclesintelligent transportation
spellingShingle Zulqarnain H. Khattak
Brian L. Smith
Michael D. Fontaine
Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
IEEE Open Journal of Intelligent Transportation Systems
Cybersecurity
monitoring system
volatility
cooperative game
connected and automated vehicles
intelligent transportation
title Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
title_full Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
title_fullStr Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
title_full_unstemmed Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
title_short Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles
title_sort cyberattack monitoring architectures for resilient operation of connected and automated vehicles
topic Cybersecurity
monitoring system
volatility
cooperative game
connected and automated vehicles
intelligent transportation
url https://ieeexplore.ieee.org/document/10506247/
work_keys_str_mv AT zulqarnainhkhattak cyberattackmonitoringarchitecturesforresilientoperationofconnectedandautomatedvehicles
AT brianlsmith cyberattackmonitoringarchitecturesforresilientoperationofconnectedandautomatedvehicles
AT michaeldfontaine cyberattackmonitoringarchitecturesforresilientoperationofconnectedandautomatedvehicles