2,765 research outputs found
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Towards Transportation Digital Twin Systems for Traffic Safety and Mobility Applications: A Review
Digital twin (DT) systems aim to create virtual replicas of physical objects
that are updated in real time with their physical counterparts and evolve
alongside the physical assets throughout its lifecycle. Transportation systems
are poised to significantly benefit from this new paradigm. In particular, DT
technology can augment the capabilities of intelligent transportation systems.
However, the development and deployment of networkwide transportation DT
systems need to take into consideration the scale and dynamic nature of future
connected and automated transportation systems. Motivated by the need of
understanding the requirements and challenges involved in developing and
implementing such systems, this paper proposes a hierarchical concept for a
Transportation DT (TDT) system starting from individual transportation assets
and building up to the entire networkwide TDT. A reference architecture is
proposed for TDT systems that could be used as a guide in developing TDT
systems at any scale within the presented hierarchical concept. In addition,
several use cases are presented based upon the reference architecture which
illustrate the utility of a TDT system from transportation safety, mobility and
environmental applications perspective. This is followed by a review of current
studies in the domain of TDT systems. Finally, the critical challenges and
promising future research directions in TDT are discussed to overcome existing
barriers to realize a safe and operationally efficient connected and automated
transportation systems.Comment: 15 pages, 2 figures; corrected issue in author(s) fiel
- …