Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Ko, Byungjin -
dc.contributor.author Son, Sang Hyuk -
dc.date.accessioned 2021-10-06T08:00:01Z -
dc.date.available 2021-10-06T08:00:01Z -
dc.date.created 2021-08-13 -
dc.date.issued 2021-07 -
dc.identifier.issn 2169-3536 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/15402 -
dc.description.abstract Malicious attacks reduce the benefits of cooperative adaptive cruise control (CACC) such as safety, driving convenience, traffic flow, and fuel efficiency, by destabilizing the stability. To reinforce the resiliency of a CACC based platoon of connected and automated vehicles (CAVs), this work investigates a detection method for malicious information attacks in the platoon. In this work, we propose an attack detection method, called LMID (long short-term memory (LSTM) based malicious information detection). We consider two attack models: correlated attacks and non-correlated attacks. In our attack scenarios, one of the platoon members attacks the platoon using the attack models. Using PLEXE, a well-known platoon simulator, we develop a simulation framework to implement attack scenarios and evaluate the proposed detection method. LMID is trained depending on the length of input data and analyzed under various scenarios regarding platoon trajectories, attack types, and an emergency brake case. We have shown that without fast detection of such attacks, crashes may happen within a platoon. The simulation results demonstrate that LMID detects the malicious information attacks with higher than 96% accuracy and the attacks are detected very quickly. The performance evaluation indicates the superiority of the proposed detection method under various circumstances. © 2013 IEEE. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers Inc. -
dc.title An Approach to Detecting Malicious Information Attacks for Platoon Safety -
dc.type Article -
dc.identifier.doi 10.1109/ACCESS.2021.3095480 -
dc.identifier.scopusid 2-s2.0-85111568263 -
dc.identifier.bibliographicCitation IEEE Access, v.9, pp.101289 - 101299 -
dc.description.isOpenAccess TRUE -
dc.subject.keywordAuthor Attack model -
dc.subject.keywordAuthor LSTM based attack detection -
dc.subject.keywordAuthor malicious information -
dc.subject.keywordAuthor platoon -
dc.subject.keywordPlus Adaptive cruise control -
dc.subject.keywordPlus Speed control -
dc.subject.keywordPlus Attack detection -
dc.subject.keywordPlus Automated vehicles -
dc.subject.keywordPlus Cooperative adaptive cruise control -
dc.subject.keywordPlus Detection methods -
dc.subject.keywordPlus Information attacks -
dc.subject.keywordPlus Information detection -
dc.subject.keywordPlus Malicious attack -
dc.subject.keywordPlus Simulation framework -
dc.subject.keywordPlus Long short-term memory -
dc.citation.endPage 101299 -
dc.citation.startPage 101289 -
dc.citation.title IEEE Access -
dc.citation.volume 9 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
ETC 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE