Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems
- URL: http://arxiv.org/abs/2211.01845v1
- Date: Mon, 31 Oct 2022 20:12:17 GMT
- Title: Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems
- Authors: Muhammad Sami Irfan, Mizanur Rahman, Travis Atkison, Sagar Dasgupta,
Alexander Hainen
- Abstract summary: In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
- Score: 61.39400591328625
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In a connected transportation system, adaptive traffic signal controllers
(ATSC) utilize real-time vehicle trajectory data received from vehicles through
wireless connectivity (i.e., connected vehicles) to regulate green time.
However, this wirelessly connected ATSC increases cyber-attack surfaces and
increases their vulnerability to various cyber-attack modes, which can be
leveraged to induce significant congestion in a roadway network. An attacker
may receive financial benefits to create such a congestion for a specific
roadway. One such mode is a 'sybil' attack in which an attacker creates fake
vehicles in the network by generating fake Basic Safety Messages (BSMs)
imitating actual connected vehicles following roadway traffic rules. The
ultimate goal of an attacker will be to block a route(s) by generating fake or
'sybil' vehicles at a rate such that the signal timing and phasing changes
occur without flagging any abrupt change in number of vehicles. Because of the
highly non-linear and unpredictable nature of vehicle arrival rates and the
ATSC algorithm, it is difficult to find an optimal rate of sybil vehicles,
which will be injected from different approaches of an intersection. Thus, it
is necessary to develop an intelligent cyber-attack model to prove the
existence of such attacks. In this study, a reinforcement learning based
cyber-attack model is developed for a waiting time-based ATSC. Specifically, an
RL agent is trained to learn an optimal rate of sybil vehicle injection to
create congestion for an approach(s). Our analyses revealed that the RL agent
can learn an optimal policy for creating an intelligent attack.
Related papers
- Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models [53.701148276912406]
Vision-Large-Language-models (VLMs) have great application prospects in autonomous driving.
BadVLMDriver is the first backdoor attack against VLMs for autonomous driving that can be launched in practice using physical objects.
BadVLMDriver achieves a 92% attack success rate in inducing a sudden acceleration when coming across a pedestrian holding a red balloon.
arXiv Detail & Related papers (2024-04-19T14:40:38Z) - Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks [8.07947129445779]
The rapid evolution of Vehicular Ad-hoc NETworks (VANETs) has ushered in a transformative era for intelligent transportation systems (ITS)
VANETs are increasingly susceptible to cyberattacks, such as jamming and distributed denial of service (DDoS) attacks.
Existing methods face difficulties in detecting dynamic attacks and integrating digital twin technology and artificial intelligence (AI) models to enhance VANET cybersecurity.
This study proposes a novel framework that combines digital twin technology with AI to enhance the security of RSUs in VANETs.
arXiv Detail & Related papers (2024-01-25T08:05:41Z) - Detecting stealthy cyberattacks on adaptive cruise control vehicles: A
machine learning approach [5.036807309572884]
More insidious attacks, which only slightly alter driving behavior, can result in network-wide increases in congestion, fuel consumption, and even crash risk without being easily detected.
We present a traffic model framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, false data injection attacks on sensor measurements, and denial-of-service (DoS) attacks.
A novel generative adversarial network (GAN)-based anomaly detection model is proposed for real-time identification of such attacks using vehicle trajectory data.
arXiv Detail & Related papers (2023-10-26T01:22:10Z) - CAT: Closed-loop Adversarial Training for Safe End-to-End Driving [54.60865656161679]
Adversarial Training (CAT) is a framework for safe end-to-end driving in autonomous vehicles.
Cat aims to continuously improve the safety of driving agents by training the agent on safety-critical scenarios.
Cat can effectively generate adversarial scenarios countering the agent being trained.
arXiv Detail & Related papers (2023-10-19T02:49:31Z) - Infrastructure-based End-to-End Learning and Prevention of Driver
Failure [68.0478623315416]
FailureNet is a recurrent neural network trained end-to-end on trajectories of both nominal and reckless drivers in a scaled miniature city.
It can accurately identify control failures, upstream perception errors, and speeding drivers, distinguishing them from nominal driving.
Compared to speed or frequency-based predictors, FailureNet's recurrent neural network structure provides improved predictive power, yielding upwards of 84% accuracy when deployed on hardware.
arXiv Detail & Related papers (2023-03-21T22:55:51Z) - Efficient Federated Learning with Spike Neural Networks for Traffic Sign
Recognition [70.306089187104]
We introduce powerful Spike Neural Networks (SNNs) into traffic sign recognition for energy-efficient and fast model training.
Numerical results indicate that the proposed federated SNN outperforms traditional federated convolutional neural networks in terms of accuracy, noise immunity, and energy efficiency as well.
arXiv Detail & Related papers (2022-05-28T03:11:48Z) - COOPERNAUT: End-to-End Driving with Cooperative Perception for Networked
Vehicles [54.61668577827041]
We introduce COOPERNAUT, an end-to-end learning model that uses cross-vehicle perception for vision-based cooperative driving.
Our experiments on AutoCastSim suggest that our cooperative perception driving models lead to a 40% improvement in average success rate.
arXiv Detail & Related papers (2022-05-04T17:55:12Z) - Simulating Malicious Attacks on VANETs for Connected and Autonomous
Vehicle Cybersecurity: A Machine Learning Dataset [0.4129225533930965]
Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation.
cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs.
This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks.
arXiv Detail & Related papers (2022-02-15T20:08:58Z) - Attacking Deep Reinforcement Learning-Based Traffic Signal Control
Systems with Colluding Vehicles [4.2455052426413085]
This paper formulates a novel task in which a group of vehicles can cooperatively send falsified information to "cheat" DRL-based ATCS.
CollusionVeh is a generic and effective vehicle-colluding framework composed of a road situation encoder, a vehicle interpreter, and a communication mechanism.
The research outcomes could help improve the reliability and robustness of the ATCS and better protect the smart mobility systems.
arXiv Detail & Related papers (2021-11-04T13:10:33Z) - An Innovative Attack Modelling and Attack Detection Approach for a
Waiting Time-based Adaptive Traffic Signal Controller [2.561780132629278]
This paper introduces an innovative "slow poisoning" cyberattack for a waiting time based ATSC algorithm and a corresponding detection strategy.
We have generated a "slow poisoning" attack modeling strategy using a microscopic traffic simulator.
Our analyses revealed that the attack strategy is effective in creating a congestion in an approach and detection strategy is able to flag the attack.
arXiv Detail & Related papers (2021-08-19T11:44:21Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.