Next Article in Journal
Characterization of Slaughterhouse Wastewater and Development of Treatment Techniques: A Review
Previous Article in Journal
Renewable Fuels from Integrated Power- and Biomass-to-X Processes: A Superstructure Optimization Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection and Isolation of False Data Injection Attack in Intelligent Transportation System via Robust State Observer

1
Shuozhou Ceramic Institute of Technology, Shuozhou 308300, China
2
School of Electrical Engineering, Yanshan University, Qinghuangdao 066004, China
3
Vehicle Measurement, Control and Safety Key Laboratory of Sichuan Province, Chengdu 610039, China
*
Author to whom correspondence should be addressed.
Processes 2022, 10(7), 1299; https://doi.org/10.3390/pr10071299
Submission received: 1 June 2022 / Revised: 20 June 2022 / Accepted: 29 June 2022 / Published: 30 June 2022

Abstract

:
As the future of transportation systems, the intelligent transportation system is a promising technology to improve the increasingly serious traffic problems. However, the integration of cyber-physical systems makes them vulnerable to new cyber–physical attacks. To ensure the security of intelligent transportation systems, a novel robust state observer-based detection and isolation method against false data injection attacks is developed. Based on the constructed dynamic model of intelligent vehicle networking, the covert characteristic of a false data injection attack is analyzed. Then, a novel state residuals-based detection criterion is developed by using a real-time observed state. To shorten the detection time, an adaptive detection threshold is designed to replace the existing computed threshold. In addition, robust state observer banks are established to isolate multiple injected attacks. Finally, simulation results on the vehicle networking system demonstrate the effectiveness of the developed detection and isolation method against false data injection attacks.

1. Introduction

With the rapid development of artificial intelligence technology, the intelligent transportation system, as a typical cyber–physical system, has gradually improved the current traffic situation and realized the intellectualization of vehicle networking systems [1,2]. As an important part of the intelligent transportation system, the intelligent vehicle networking system realizes the communication between vehicles, between vehicles and people, and between vehicles and roads [3]. However, the emerging characteristics of intelligent vehicle networking systems, such as intelligence and openness, cause them to be vulnerable to new cyber–physical attacks [4,5]. For example, in July 2015, white hat hackers simulated a malicious information attack, which can control the remote driving of an intelligent vehicle networking system [6]. Therefore, novel detection and isolation mechanisms against cyber–physical attacks are of great significance to the security of intelligent transportation systems.
Up to now, the cyber–physical security problem of the intelligent transportation system has become a hot issue in academic and industrial circles. From different research angles, lots of attack-detection works were carried out by scholars. In [7], Xiao et al. established a logical packet, by which the injected denial-of-service (Dos) attacks can be detected. Based on the established characteristics of an attack, a long short-term memory (LSTM) neural-network-based detection method is proposed to ensure the security of an intelligent vehicle networking system [8]. Taking four different attack schemes into account, a detection and identification attack method is developed to ensure the security of vehicular networks based on the machine learning models [9]. In [10], A. Benslimane et al. investigated the impact of Dos attacks on these basic safety messages. Based on this, a detection method was proposed through the feasibility of the existing threshold. Considering the impact of Dos jamming attacks on communication delays, a novel filter was designed to detect the injected malicious attacks [11]. By analyzing the impact of Dos jamming attacks on communication channels, a detection and estimation algorithm is developed to guarantee the safety of vehicle networking systems [12]. By observing the physical impact of Dos jamming attacks, a graph theory method is introduced into attack detection based on a decision tree [13]. A novel deep learning-based intrusion detection method against Dos attack is developed based on the multiple neural network architecture in [14].
To sum up, lots of detection methods against Dos attacks were developed to ensure the safety of vehicle networking systems. Different from the above Dos attacks, the emerging false data injection (FDI) attacks are more deceptive [15,16,17]. By tampering with the transmitted data, the FDI attacks can spoof the common detection method. For this reason, the detection of FDI attacks brings great challenges to the security mechanism of intelligent vehicle networking systems.
To respond to the FDI attacks timely, scholars have carried out some research on the security of vehicle networking systems under FDI attacks [16,17,18,19,20]. In [16], L. Guo et al. investigated the covert characteristics of FDI attacks and gave the optimal attack strategies with respect to the cyber–physical system of intelligent vehicle networking. In addition, the FDI attack was modeled as an additive attack that affects the vehicle platoon, and a new assessment method was developed [17]. To detect and identify the FDI attacks, a machine learning-based detection method is proposed in [18]. In [19], a fuzzy theory and deep learning-based detection are developed by considering the impact of FDI attacks on the load frequency control system. Taking the covert characteristics of FDI attacks into account, a partial differential equation model-based detection method was developed [20]. The above artificial intelligence-based detection method in [18,19] can effectively detect the FDI attacks but need to depend on the training of historical data in the vehicle networking system. Although the model-based detection work in [20] can reduce the complexity of attack detection, the computation of the precomputed threshold limits the detection performance of FDI attacks. It is shown that model-based detection works rely on the accuracy of the model in [21]. For this reason, the attack-detection task is extremely challenging to accomplish in large-scale urban traffic networks due to phenomena such as scattering and hysteresis that increase the uncertainty of the Macroscopic Fundamental Diagram (MFD) [22]. In addition, the above detection methods do not further consider the detection and isolation of multiple FDI attacks.
Motivated by the above problems, this paper develops a robust state observer-based detection and isolation method against FDI attacks in intelligent vehicle networking systems. Through the constructed physical dynamics model of the vehicle networking system, robust state observers are designed to obtain the state change under FDI attack. Then, a state residual-based detection criterion is developed. To shorten the time of attack detection, an adaptive detection threshold is designed to replace the precomputed threshold. In addition, robust state observer banks are developed to isolate the injected FDI attacks in the intelligent vehicle networking system. The main contributions of this work are summarized as follows.
(1)
Taking the deception characteristics of the attack on the Chi-square estimator into account, a robust state observer-based is proposed to detect the FDI attacks;
(2)
Considering the limitation of the precomputed threshold on detection performance, an adaptive detection threshold is developed;
(3)
A robust state observer bank-based algorithm is developed to isolate the injected multiple FDI attacks in an intelligent vehicle networking system.
The outline of the work is organized as follows. Section 2 shows the problem formulation. The proposed robust state observer-based detection and isolation method against FDI attacks is presented in Section 3. Numerical studies are provided to verify the effectiveness of the proposed method in Section 4. Section 5 presents the conclusion and discussion.

2. Motivation

In this subsection, the physical dynamics model of the intelligent vehicle networking system and spoofing feature of FDI attacks are given, respectively. Finally, the motivation of this paper is presented.

2.1. Dynamic Model of Vehicle Networking

Consider an intelligent network-connected adaptive cruise control system, as shown in Figure 1. Each intelligent vehicle is equipped with sensors and controllers, which can measure the vehicle speed, acceleration, and vehicle distance in real-time. Through the information interaction of the communication channel, the monitoring center can send the corresponding control instructions to the intelligent vehicle. Then, the corresponding physical dynamics model of the intelligent vehicle networking system is described as follows [23]:
Δ h t = h i t h i + 1 t L h d
Δ v t = v i t v i + 1 t
Δ a t = a i t a i + 1 t
where Δ h t , Δ v t and Δ a t represent the relative distance, speed and acceleration of two adjacent intelligent network vehicles, h i t and h i + 1 t ( i = 1 , 2 , , n ) denote the reference position of two adjacent autonomous vehicles, respectively, L and h d represent the vehicle length and safety distance of two adjacent autonomous vehicles, respectively, v i t and v i + 1 t denote the speed of the i t h vehicle, respectively, a i and a i + 1 denote the acceleration of the i t h vehicle, respectively.
Based on Equations (1)–(3), the dynamic model of an intelligent vehicle networking system can be described as:
x ˙ t = A x t + B u t + Θ t y t = C x t
where x t = Δ h t Δ v t Δ a t , A = 0 1 0 0 0 1 0 0 1 / ζ i , B = 0 0 1 ζ i T , u denotes the control input, Θ t denotes the model error and perturbations, which is norm bounded, C denotes the measurement matrix with appropriate dimension, ζ i is the vehicle interior actuator parameters.
Remark 1:
Motivated by the works in [21,22], we considered the model error and perturbations in the above-constructed physical dynamic model of an intelligent vehicle networking system. Through the consideration of model error and perturbations, the influence of the uncertainty on model-based detection methods shall be reduced as much as possible.

2.2. Spoofing Feature of FDI Attacks

As shown in Figure 1, hackers can cheat the monitoring center by tampering with the data of the communication channel. For this reason, FDI attacks can not only cover up the tampering of physical dynamics but also fool the existing Chi-square detector-based detection methods. In an intelligent network-connected adaptive cruise control system, the Chi-square detector is the common detection method, which is described as [24]:
r t = z t C x t < τ , n o r m a l r t = z t C x t τ , a t t a c k
where r and z denote the measurement residual and output estimation, respectively, τ is detection threshold, which is determined by system disturbance.
To bypass the above detection method, the attacker can design a bank of false data vectors as [15,25]:
f t = C κ
where κ denotes the residual change caused by FDI attacks. Based on Equations (5) and (6), one can obtain
r a t = z t + f t C x ˜ t + κ = z t C x t = r t < τ
Equation (7) indicates that attackers can inject the above FDI attacks without triggering the detection mechanism in the vehicle networking system. For this reason, developing a detection and isolation method against FDI attacks is crucial to ensure the security of the vehicle networking system.

2.3. Problem Formulation

Under FDI attacks, the dynamic model of an intelligent vehicle networking system is described as:
x ˙ t = A x t + B u t + Θ t y t = C x t + F f t
where F and f are attack selected matrix with appropriate dimension and attack vector, respectively. In order to realize the rapid destruction of the attack on the intelligent networked vehicle system, the following assumption is given.
Assumption 1:
In the process of attack injection and detection, it is assumed that there is no delay in the data transmission of the system [20].
Under Assumption 1, the goal of this paper is to develop a novel detection and isolation mechanism to ensure the security of the intelligent vehicle networking system in the next section.

3. Robust State Observer-Based Detection and Isolation Method against FDI Attacks

In this subsection, a novel safety mechanism is proposed to detect and isolate FDI attacks in intelligent vehicle networking systems. Taking the spoofing feature of FDI attacks into account, a robust state observer-based detection is developed. To improve the performance of FDI attacks, an adaptive detection threshold is designed. Furthermore, a bank of robust state observers is established to isolate the injected multiple FDI attacks.

3.1. Detection Method Based on Robust State Observer

Taking the spoofing feature of FDI attacks into account, the robust state observer is designed to observe the physical dynamics of the intelligent vehicle as follows:
x ^ ˙ t = A x ^ t + B u t + K y t y ^ t y ^ t = C x ^ t
where x ^ and y ^ denote the observation value of state and output, respectively, K is observer gain with appropriate dimension.
From Equations (4) and (9), one can obtain the error of state and output as:
e 1 t = x t x ^ t e 2 t = y t y ^ t
From Equation (10), one can obtain
e ˙ 1 t = A K C e 1 t + Θ t
In order to ensure the stability of state estimation error under the designed robust state observer, the following theorem is given.
Theorem 1.
For a given scalar, if there exist positive definite symmetric matrices Q and H , and the equation in (12) is satisfied, the designed robust state observer makes the state estimation error stable, and satisfies e 2 t σ Θ t
H A + A T H Q C C T Q T H C T σ I 0 σ I < 0 .
where denotes the match matrix.
Proof of Theorem 1.
Defining a Lyapunov as:
V t = e 1 T t H e 1 t .
Taking the derivative of Equation (13) into account, one can obtain
V ˙ t = e ˙ 1 T t H e 1 t + e 1 T t H e ˙ 1 T t = e 1 T t H A K C + A K C T H e 1 t + 2 e 1 T t H Θ t
Defining
Υ = 0 T 1 σ e 2 T t e 2 t σ Θ T t Θ t d t
Under zero initial conditions, one can obtain
Υ = 0 T 1 σ e 2 T t e 2 t σ Θ T t Θ t d t V t V 0 0 T 1 σ e 2 T t e 2 t σ Θ T t Θ t + V ˙ t d t
Taking Equation (10) into Equation (16), one can obtain
Υ 0 e 2 t σ Θ t
where
φ t = e 1 T t Θ T t T Π = H A + A T H Q C C T Q T + 1 σ C T C H σ I
Based on the Schur complement lemma [26], one can obtain
Π = H A + A T H Q C C T Q T + 1 σ C T C H σ I 0
By using Equation (19), one can obtain
Υ 0 e 2 t σ Θ t
Equation (20) indicates that the designed robust state observer makes the state estimation error stable. □
Based on the proposed robust state observer, we can obtain real-time state changes to intelligent vehicles. Based on this, a state residuals-based detection including adaptive threshold is given in the following.

3.2. Design of Adaptive Detection Threshold

To improve the detection performance of FDI attacks, an adaptive detection is designed to replace the existing precomputed threshold as follows.
From Equations (10) and (11), one can obtain
e ˙ 1 t = A K C e 1 t + Θ t R t = C e 1 t
Selecting R t = t 1 t 2 R T t R t d t 1 2 , t = t 2 t 1 as the evaluation function in [27], one can obtain
R t 2 , t = R e t + R Θ t 2 , t
where R e t and R Θ t denote the state estimation error norm and disturbance estimation norm. From Equation (22), one can obtain
R t 2 , t R e t 2 , t + R Θ t 2 , t sup R e t 2 , t + sup R Θ t 2 , t
Then, the adaptive detection threshold is chosen as:
J t h = sup R e t 2 , t + sup R Θ t 2 , t = σ sup R Θ t 2 , t + sup R Θ t 2 , t = σ + 1 R Θ t 2 , t
Based on the developed robust state observer, one can obtain the state residual as:
R t = x t x ^ t
Based on Equations (25) and (26), the attack detection logic is given as:
R t J t h Normal R t > J t h A t t a c k
Although the attack can cheat the detection method based on output state estimation, Equation (25) indicates that the detection criterion proposed in this paper can find the impact of the attack on the state. In sum, a bank of the proposed state observer is designed based on the given Theorem 1. Then, we can obtain a bank of observation state of the relative distance, relative speed and acceleration of two adjacent autonomous vehicles. Based on the developed detection criterion in Equation (26), the injected FDI attacks can be detected. The detailed detection process can be seen in Algorithm 1.
Algorithm 1: State residuals-based detection of FDI attacks in vehicle networking system.
1. Input: Establish the vehicle networking model in Equations (1)–(3);
2. Design the corresponding robust state observer in Equation (9);
3. Compute the adaptive threshold in Equation (24) and residual in Equation (25);
4. for All the intelligent vehicles
 if R t J t h then
  No FDI attacks;
 else
  There exists the injected FDI attacks;
end if
5. end for
6. Output: The vehicle networking system is attacked.
To isolate the injected multiple FDI attacks quickly, the robust state observer bank is constructed. It is assumed that the intelligent vehicle networking system includes n vehicle, the isolation strategy is given as follows:
Step 1: Based on the detection Algorithm 1, one can judge whether the system ( ϑ ) is abnormal. If FDI attacks are detected, one can proceed to the next step.
Step 2: The vehicle networking system ( ϑ ) outputs are divided into two subsets ( ϑ 1 and ϑ 2 ) and they are used to drive two robust state observers. By using the proposed detection Algorithm 1, one can judge whether the system ( ϑ 1 and ϑ 2 ) is abnormal. If FDI attacks are detected in ( ϑ 1 ), one can proceed to the next step.
Step 3: The vehicle networking system ( ϑ 1 ) outputs are divided into two subsets ( ϑ 3 and ϑ 4 ) and they are used to drive two robust state observers. By using the proposed detection Algorithm 1, one can judge whether the system ( ϑ 3 and ϑ 4 ) is abnormal. This process is repeated iteratively for each half of the subset until the attacked vehicle networking sensor nodes are isolated.
According to the above Step 1–Step 3, one can isolate the injected multiple FDI attacks on an intelligent vehicle networking system. Of note, if an FDI attack is detected in the first subset, then the isolation range is immediately reduced by half. Through continuous iteration of dichotomy, the proposed isolation method can accelerate the isolation of attacked vehicle networking sensor nodes. The attack isolation process can be seen in Algorithm 2.
Algorithm 2: Robust state observer bank-based isolation of FDI attacks.
1. Input: All the state residuals and adaptive detection threshold;
2. Divided vehicle networking system ( ϑ ) outputs into two subsets ( ϑ 1 and ϑ 2 );
3. for ϑ 1 and ϑ 2
 if R ϑ 1 t > J t h ϑ 1 or R ϑ 2 t > J t h ϑ 2 then
  Continue 2 until the attacked vehicle networking sensor nodes are isolated;
 else
  No isolated FDI attacks;
 end if
4. end for
5. Output: The attacked vehicles.

4. Results

In this section, simulation results of an intelligent vehicle networking system are applied to show the performance of the proposed detection and isolation method against FDI attacks. It is assumed that two vehicles are driving longitudinally on the road, and each vehicle is equipped with a cruise control system, as shown in Figure 1. The related simulation parameters are given as follows: ζ i = 0.25 , h d = 2   m , h i + 1 h i = 20   m , v 1 = 40   k m / h . Adaptive gain of cruise for each controller is taken from [26]. Under the above parameters, two cases are considered as follows:
Case 1 is to show the detection performance of the proposed detection method by comparing the work in [28,29]. Case 2 is to demonstrate the effectiveness of the developed detection and isolation method.

4.1. Case 1 Detection of Single FDI Attack in Intelligent Vehicle Networking System

4.1.1. Effectiveness of the Proposed Detection Method

It is assumed that an intelligent vehicle networking system ( n = 2 ) is attacked by a hacker. Namely, the 2nd intelligent vehicle is injected with FDI attacks at t = 50 s. By using the proposed detection Algorithm 1, one can obtain the corresponding change of state residuals under FDI attacks, as shown in Figure 2.
The simulation results in Figure 2a indicate that although the injected FDI attack can cause small changes in state residuals, it can spoof the Chi-square-based detection method in [29]. However, the proposed robust state observer-based detection method depends on the impact of the attack on the internal state change of the intelligent vehicle networking system. For this reason, the injected FDI attack can be detected effectively by the developed detection Algorithm 1, as shown in Figure 2b.

4.1.2. Performance of the Proposed Detection Method

To shorten the detection time of an FDI attack, an adaptive threshold is designed. As shown in Figure 3a, one can find the detection time (t = 58.7 s) under the adaptive threshold is smaller than that (t = 65.9 s) under the precomputed threshold. In contrast to the work in [28], one can find that the developed detection method can reduce attack detection time. In addition, the detection rate analysis method under a certain attack intensity is used to evaluate the performance of the proposed detection method in [29]. The simulation analysis of Figure 3b demonstrates that the developed adaptive threshold can enhance the detection performance of FDI attacks.

4.2. Case 2 Detection and Isolation of Multiple FDI Attacks in Intelligent Vehicle Networking System

Assuming that the hacker can inject multiple FDI attacks in the 4th (t = 70 s) and 8th (t = 95 s) intelligent vehicle networking system ( n = 8 ), applying the proposed isolation Algorithm 2, we can obtain the corresponding state residuals change of ϑ 1 and ϑ 2 , as shown in Figure 4.
The simulation results in Figure 4 indicate that there exist multiple FDI attacks. In other words, the injected FDI attacks are detected at t = 81.7 s in the vehicle networking system ϑ 1 and at t = 107.5 s in the vehicle networking system ϑ 2 . Continuing to apply Algorithm 2, we can obtain the change of state residuals of the vehicle networking system ϑ 3 , ϑ 4 , ϑ 5 and ϑ 6 , as shown in Figure 5.
As shown in Figure 5a,b, one can find that the injected FDI attacks can be isolated in the vehicle networking system ϑ 4 . Meanwhile, the change of state residuals in the vehicle networking system ϑ 3 is subject to small fluctuations caused by ϑ 4 . The same as the problem above, we can isolate the injected FDI attacks in the vehicle networking system ϑ 6 . Then, we can use the proposed Algorithm 2 and detection Algorithm 1 to isolate the injected FDI attacks. The corresponding change of state residuals in the vehicle networking system ϑ 7 , ϑ 8 , ϑ 9 and ϑ 10 , as shown in Figure 6.
By using the proposed Algorithm 1, one can find that the injected FDI attacks are detected at t = 82.2 s in the vehicle networking system ϑ 8 and t = 104.7 s in the vehicle networking system ϑ 10 , as shown in Figure 6b,d. Thus, the injected FDI attacks are isolated in the vehicle networking system ϑ 8 and ϑ 10 based on Algorithm 2. Namely, the injected FDI attacks on the 4th and 8th vehicles are isolated.
To sum up, the simulation results in Figure 4, Figure 5 and Figure 6 demonstrate the effectiveness of the developed robust state observer-based detection and isolation method against multiple FDI attacks in the vehicle networking system.

5. Conclusions and Discussion

In this paper, a robust state observer-based detection and isolation method against multiple FDI attacks in the vehicle networking system is proposed. Based on the change of internal physical state, a state residual-based detection criterion is developed to address the problem of existing detection methods being cheated. Considering the influence of model error and disturbance, an adaptive is given to improve the detection performance caused by the precomputed threshold. In addition, a robust state observer bank is constructed to cut down the time of the isolation of multiple FDI attacks. Finally, simulations show the performance of the developed security mechanism on the vehicle networking system.
Although a model-based for attack detection is proposed by using a robust state observer, there is still much work to be considered in the future as follows.
A well-calibrated model with low uncertainty: As shown in [22], the model-based for attack detection task is extremely challenging to accomplish in large-scale urban traffic networks due to phenomena such as scattering and hysteresis that increase the uncertainty of the MFD. Additionally, traffic demands are highly uncertain and difficult to predict. Thus, how to reduce the influence of the uncertainty on model-based detection methods need to be further considered.
The effect of communication delay on system model: Due to intermittencies and packet drops in the communication channels, there exists a time delay in [31]. For this reason, we need to study the model by taking into account the communication delay that appears in the interchange of information through the communication channel.
The detection of mixed attacks: In [21], Mercader, P. et al. have presented a bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems and cyber–physical systems. Based on the proposed detection method, we need further consider the detection and defense against multiple mixed attacks, such as Dos, replay attacks and FDI attacks in the intelligent Internet of vehicles system.

Author Contributions

Conceptualization, X.H. and X.W.; methodology, X.W.; data curation, X.W.; writing—original draft preparation, X.W.; writing—review and editing, X.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Nature Science Foundation of China 62103357, and by the Science and Technology Plan of Hebei Education Department under QN2021139, and by the Nature Science Foundation of Hebei Province under F2021203043, and the Open Research Fund of Vehicle Measurement, Control and Safety Key Laboratory of Sichuan Province, Xihua University (No, QCCK2022-006).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhu, F.; Lv, Y.; Chen, Y.; Wang, X.; Xiong, G.; Wang, F.Y. Parallel Transportation Systems: Toward IoT-Enabled Smart Urban Traffic Control and Management. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4063–4071. [Google Scholar] [CrossRef]
  2. Wang, F.Y. Artificial intelligence and intelligent transportation: Driving into the 3rd axial age with ITS. IEEE Intell. Transp. Syst. Mag. 2017, 9, 6–9. [Google Scholar] [CrossRef]
  3. Zhu, F.; Li, Z.; Chen, S.; Xiong, G. Parallel Transportation Management and Control System and Its Applications in Building Smart Cities. IEEE Trans. Intell. Transp. Syst. 2016, 17, 1576–1585. [Google Scholar] [CrossRef]
  4. Work, D.B.; Bayen, A.M. Impacts of the mobile Internet on transportation cyber-physical systems: Traffic monitoring using smartphones. In Proceedings of the National Workshop for Research on High-Confidence Transportation Cyber-Physical Systems: Automotive, Aviation and Rail, Washington, DC, USA, 18–20 November 2008; pp. 18–20. [Google Scholar]
  5. Fallah, Y.P.; Huang, C.; Sengupta, R.; Krishnan, H. Design of cooperative vehicle safety systems based on tight coupling of communication, computing and physical vehicle dynamics. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS ‘10), Stockholm, Sweden, 13–15 April 2010; pp. 159–167. [Google Scholar]
  6. Petit, J.; Shladover, S.E. Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 2015, 16, 546–556. [Google Scholar] [CrossRef]
  7. Xiao, S.; Ge, X.; Han, Q.L.; Zhang, Y. Secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks. IEEE Trans. Cybern. 2021, 12, 1–13. [Google Scholar] [CrossRef]
  8. Khan, Z.; Chowdhury, M.; Islam, M.; Huang, C.Y.; Rahman, M. Long Short-Term Memory Neural Network-Based Attack Detection Model for In-Vehicle Network Security. IEEE Sens. Lett. 2020, 4, 7500904. [Google Scholar] [CrossRef]
  9. Han, M.L.; Kwak, B.I.; Kim, H.K. Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2941–2956. [Google Scholar] [CrossRef]
  10. Benslimane, A.; Nguyen-Minh, H. Jamming Attack Model and Detection Method for Beacons Under Multichannel Operation in Vehicular Networks. IEEE Trans. Veh. Technol. 2017, 66, 6475–6488. [Google Scholar] [CrossRef]
  11. Ma, Y.; Nie, Z.; Hu, S.; Li, Z.; Malekian, R.; Sotelo, M. Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under Dos Attacks. IEEE Trans. Intell. Transp. Syst. 2021, 22, 1422–1434. [Google Scholar] [CrossRef]
  12. Mokari, H.; Firouzmand, E.; Sharifi, I.; Doustmohammadi, A. Dos Attack Detection and Resilient Control in Platoon of Smart Vehicles. In Proceedings of the 2021 9th RSI International Conference on Robotics and Mechatronics (ICRoM), Tehran, Iran, 17–19 November 2021; pp. 144–150. [Google Scholar]
  13. Vuong, T.P.; Loukas, G.; Gan, D.; Bezemskij, A. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 16–19 November 2015; pp. 1–6. [Google Scholar]
  14. Agrawal, K.; Alladi, T.; Agrawal, A.; Chamola, V.; Benslimane, A. NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2022, 1–11. [Google Scholar] [CrossRef]
  15. Almalki, S.A.; Song, J. A review on data falsification-based attacks in cooperative intelligent transportation systems. Int. J. Comput. Sci. Secur. (IJCSS) 2020, 14, 22. [Google Scholar]
  16. Guo, L.; Yu, H.; Hao, F. Optimal Allocation of False Data Injection Attacks for Networked Control Systems with Two Communication Channels. IEEE Trans. Control Netw. Syst. 2021, 8, 2–14. [Google Scholar] [CrossRef]
  17. Liu, H.; Pan, C.; Lv, C.; Gong, L.; Zheng, X.; Chen, X. False Data Injection Attack Modeling and Impact on Vehicle Platooning. In Proceedings of the 2021 China Automation Congress (CAC), Beijing, China, 22–24 October 2021; pp. 7757–7761. [Google Scholar]
  18. Cabelin, J.D.; Alpano, P.V.; Pedrasa, J.R. SVM-based Detection of False Data Injection in Intelligent Transportation System. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Korea, 13–16 January 2021; pp. 279–284. [Google Scholar]
  19. Chen, Z.; Zhu, J.; Dong, H.; Wu, W.; Zhu, H.; He, C. Detection of False Data Injection Attack in Automatic Generation Control System with Electric Vehicles based on Fuzzy Long Short-Term Memory. In Proceedings of the 2021 IEEE Power & Energy Society General Meeting (PESGM), Washington, DC, USA, 26–29 July 2021; pp. 1–56. [Google Scholar]
  20. Biroon, R.A.; Biron, Z.A.; Pisu, P. False Data Injection Attack in a Platoon of CACC: Real-Time Detection and Isolation With a PDE Approach. IEEE Trans. Intell. Transp. Syst. 2022, 1–12. [Google Scholar] [CrossRef]
  21. Mercader, P.; Haddad, J. Resilient multivariable perimeter control of urban road networks under cyberattacks. Control Eng. Pract. 2021, 109, 104718. [Google Scholar] [CrossRef]
  22. Sanchez, H.S.; Rotondo, D.; Escobet, T.; Puig, V.; Quevedo, J. Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control 2019, 48, 103–128. [Google Scholar] [CrossRef] [Green Version]
  23. Van der Heijden, R.W.; Dietzel, S.; Leinmüller, T.; Kargl, F. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. IEEE Commun. Surv. Tutor. 2019, 21, 779–811. [Google Scholar] [CrossRef] [Green Version]
  24. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
  25. Piperigkos, N.; Lalos, A.S. Impact of False Data Injection attacks on Decentralized Electric Vehicle Charging Protocols. Transp. Res. Procedia 2021, 52, 331–338. [Google Scholar] [CrossRef]
  26. Maestripieri, A.; Pería, F.M. Schur Complements in Krein Spaces. Integral Equ. Oper. Theory 2007, 59, 207–221. [Google Scholar] [CrossRef] [Green Version]
  27. Zhong, M.; Ding, S.X.; Lam, J.; Wang, H. An LMI approach to design robust fault detection filter for uncertain LTI systems. Automatica 2003, 39, 543–550. [Google Scholar] [CrossRef]
  28. Yamamoto, Y.; Kuze, N.; Ushio, T. Attack Detection and Defense System Using an Unknown Input Observer for Cooperative Adaptive Cruise Control Systems. IEEE Access 2021, 9, 148810–148820. [Google Scholar] [CrossRef]
  29. Yu, W.; Griffith, D.; Ge, L.; Bhattarai, S.; Golmie, N. An integrated detection system against false data injection attacks in the Smart Grid. Secur. Commun. Netw. 2015, 8, 91–109. [Google Scholar] [CrossRef]
  30. Song, X.; Lou, X.; Meng, L. Time-delay feedback cooperative adaptive cruise control of connected vehicles by heterogeneous channel transmission. Meas. Control 2019, 52, 369–378. [Google Scholar] [CrossRef] [Green Version]
  31. Orosz, G. Connected cruise control: Modelling, delay effects, and nonlinear behaviour. Veh. Syst. Dyn. 2016, 54, 1147–1176. [Google Scholar] [CrossRef]
Figure 1. Intelligent network-connected adaptive cruise control system.
Figure 1. Intelligent network-connected adaptive cruise control system.
Processes 10 01299 g001
Figure 2. Detection results of FDI attack: (a) Detection under Chi-square-based detection method in [30]; (b) Detection under the detection Algorithm 1.
Figure 2. Detection results of FDI attack: (a) Detection under Chi-square-based detection method in [30]; (b) Detection under the detection Algorithm 1.
Processes 10 01299 g002
Figure 3. The detection analysis of FDI attacks under the adaptive threshold and precomputed threshold in [28]: (a) Detection time of FDI attack under the adaptive threshold and precomputed threshold in [28]; (b) Detection rate of FDI attack under the adaptive threshold and precomputed threshold in [28].
Figure 3. The detection analysis of FDI attacks under the adaptive threshold and precomputed threshold in [28]: (a) Detection time of FDI attack under the adaptive threshold and precomputed threshold in [28]; (b) Detection rate of FDI attack under the adaptive threshold and precomputed threshold in [28].
Processes 10 01299 g003
Figure 4. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 1 ; (b) vehicle networking system ϑ 2 .
Figure 4. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 1 ; (b) vehicle networking system ϑ 2 .
Processes 10 01299 g004
Figure 5. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 3 ; (b) Vehicle networking system ϑ 4 ; (c) Vehicle networking system ϑ 5 ; (d) Vehicle networking system ϑ 6 .
Figure 5. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 3 ; (b) Vehicle networking system ϑ 4 ; (c) Vehicle networking system ϑ 5 ; (d) Vehicle networking system ϑ 6 .
Processes 10 01299 g005
Figure 6. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 7 ; (b) Vehicle networking system ϑ 8 ; (c) Vehicle networking system ϑ 9 ; (d) Vehicle networking system ϑ 10 .
Figure 6. The detection results of multiple FDI attacks: (a) Vehicle networking system ϑ 7 ; (b) Vehicle networking system ϑ 8 ; (c) Vehicle networking system ϑ 9 ; (d) Vehicle networking system ϑ 10 .
Processes 10 01299 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Huang, X.; Wang, X. Detection and Isolation of False Data Injection Attack in Intelligent Transportation System via Robust State Observer. Processes 2022, 10, 1299. https://doi.org/10.3390/pr10071299

AMA Style

Huang X, Wang X. Detection and Isolation of False Data Injection Attack in Intelligent Transportation System via Robust State Observer. Processes. 2022; 10(7):1299. https://doi.org/10.3390/pr10071299

Chicago/Turabian Style

Huang, Xianhua, and Xinyu Wang. 2022. "Detection and Isolation of False Data Injection Attack in Intelligent Transportation System via Robust State Observer" Processes 10, no. 7: 1299. https://doi.org/10.3390/pr10071299

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop