5 research outputs found

    A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing

    Get PDF
    The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic conditions and avoid vehicles’ congestion, however it may threaten vehicles’ location and trajectory privacy. Motivated by the fact that traffic monitoring does not need to know each individual vehicle’s speed and the average speed would be sufficient, we propose a privacy-preserving traffic monitoring (PPTM) scheme to aggregate vehicles’ speeds at different locations. In PPTM, the roadside unit (RSU) collects vehicles’ speed information at multiple road segments, and further cooperates with a service provider to calculate the average speed information for every road segment. To preserve vehicles’ privacy, both homomorphic Paillier cryptosystem and super-increasing sequence are adopted. A comprehensive security analysis indicates that the proposed PPTM can preserve vehicles’ identities, speeds, locations, and trajectories privacy from being disclosed. In addition, extensive simulations are conducted to validate the effectiveness and efficiency of the proposed PPTM scheme.This research was supported by the National Natural Science Foundation of China (Grant Nos. 61402037, 61872041, 61272512)

    Cybersecurity Measures for Geocasting in Vehicular Cyber Physical System Environments

    Get PDF
    Geocasting in vehicular communication has witnessed significant attention due to the benefits of location oriented information dissemination in vehicular traffic environments. Various measures have been applied to enhance geocasting performance including dynamic relay area selection, junction nodes incorporation, caching integration, and geospatial distribution of nodes. However, the literature lacks towards geocasting under malicious relay vehicles leading to cybersecurity concern in vehicular traffic environments. In this context, this paper presents Cybersecurity Measures for Geocasting in Vehicular traffic environments (CMGV) focusing on security oriented vehicular connectivity. Specifically, a vehicular intrusion prevention technique is developed to measure the connectivity between the cache agent and cache user vehicles. The connectivity between static transport vehicles and cache agent/cache user is measured via vehicular intrusion detection approach. The performance of the proposed vehicular cybersecurity measure is evaluated in realistic traffic environments. The comparative performance evaluation attests the benefits of security oriented geocasting in vehicular traffic environments

    Privacy-Preserving Route Reporting Schemes for Traffic Management Systems

    No full text

    Safe and Secure Control of Connected and Automated Vehicles

    Get PDF
    Evolution of Connected and Automated Vehicles (CAV), as an important class of Cyber-Physical Systems (CPS), plays a crucial role in providing innovative services in transport and traffic management. Vehicle platoons, as a set of CAV, forming a string of connected vehicles, have offered significant enhancements in traffic management, energy consumption, and safety in intelligent transportation systems. However, due to the existence of the cyber layer in these systems, subtle security related issues have been underlined and need to be taken into account with sufficient attention. In fact, despite the benefits brought by the platoons, they potentially suffer from insecure networks which provide the connectivity among the vehicles participating in the platoon which makes these systems prone to be under the risk of cyber attacks. One (or more) external intelligent intruder(s) might attack one (or more) of the vehicles participating in a platoon. In this respect, the need for a safe and secure driving experience is highly sensible and crucial. Hence, we will concentrate on improving the safety and security of CAVs in different scenarios by taking advantage of security related approaches and CAV control systems. In this thesis, we are going to focus on two main levels of platoon control, namely I) High level secure platoon control, and II) Low level secure platoon control. In particular, in the high level part, we consider platoons with arbitrary inter-vehicular communication topoloy whereby the vehicles are able to exchange their driving data with each other through DSRC-based environment. The whole platoon is modeled using graph-theoretic notions by denoting the vehicles as the nodes and the inter-vehicular communication quality as the edge weights. We study the security of the vehicle platoon exposed to cyber attacks using a novel game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attacker's objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as he can. The existence of equilibrium strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication links between vehicles on the game value. We then address the same problem while investigating the optimal actuator placement strategy needed by the defender to mitigate the effects of the attack. In this respect, the energy needed by the attacker to steer the consensus follower-leader dynamics of the system towards his desired direction is used as the game payoff. Simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses. In the low level platoon control, we exploit novel secure model predictive controller algorithms to provide suitable countermeasure against a prevalent data availability attack, namely Denial-of-Service (DoS) attack. A DoS intruder can endanger the security of platoon by jamming the communication network among the vehicles which is responsible to transmit inter-vehicular data throughout the platoon. In other words, he may cause a failure in the network by jamming it or injecting a huge amount of delay, which in essence makes the outdated transferred data useless. This can potentially result in huge performance degradation or even hazardous collisions. We propose novel secure distributed nonlinear model predictive control algorithms for both static and dynamic nonlinear heterogeneous platoons which are capable of handling DoS attack performed on a platoon equipped by different communication topologies and at the same time they guarantee the desired formation control performance. Notably, in the dynamic case, our proposed method is capable of providing safe and secure control of the platoon in which arbitrary vehicles might perform cut-in and/or cut-out maneuvers. Convergence time analysis of the system are also investigated. Simulation results on a sample heterogeneous attacked platoon exploiting two-predecessor follower communication environment demonstrates the fruitfulness of the method
    corecore