A data-driven method for falsified vehicle trajectory identification by anomaly detection

نویسندگان

چکیده

The vehicle-to-infrastructure (V2I) communications enable a wide range of new applications, which bring prominent benefits to the transportation system. However, malicious attackers can potentially launch falsified data attacks against V2I applications jeopardize traffic operation. To ensure brought by it is critical protect from those cyber-attacks. existing literature on defense solution that protects very limited. This paper aims fill this research gap proposing data-driven method identify trajectories generated compromised connected vehicles (CVs). A trajectory embedding model, inspired word model natural language processing (NLP) community, developed. proposed generates vector representations vehicle be used compute similarities between trajectories. consists two steps. In first step, historical are train neural network and obtain second step computes distance matrix each pair identifies using hierarchical clustering algorithm. Simulation experiments show has high detection rate (>97.0%) under different attack goals with varying CV penetration rates 100% 25%, while false alarm remains low. It great potential implemented in trajectory-based such as state estimation signal control, safeguard system cyber threats.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Big Trajectory Data Analysis for Clustering and Anomaly Detection

We’ve been developing a sensor that can acquire positional data. Recently, a position-based big data creation is easy task and trajectory analysis is the highest priority for ”position-based service”. Traffic congestion, marketing mining, and pattern analysis are the one of the examples in trajectory analysis field. In this paper, we propose the trajectory analysis approach for clustering and a...

متن کامل

Trajectory Optimization for a Multistage Launch Vehicle Using Nonlinear Programming

This work is an example of application of nonlinear programming to a problem of three-dimensional trajectory optimization for multistage launch vehicles for geostationary orbit missions. The main objective is to minimize fuel consumption or equivalently to maximize the payload. The launch vehicle considered here, Europa-II, consists of 5 thrust phases and 2 coast phases. Major parameters of the...

متن کامل

A Novel Method for Unsupervised Anomaly Detection Using Unlabelled Data

Most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, anomaly network intrusion detection method based on Principal Component Analysis (PCA) for data reduction and Fuzzy Adaptive Resonance Theory (Fuzzy ART) for classifier is presented. Moreover, PCA is applied to reduce the high dimensional data vectors and distance between ...

متن کامل

A Data-driven Method for Crowd Simulation using a Holonification Model

In this paper, we present a data-driven method for crowd simulation with holonification model. With this extra module, the accuracy of simulation will increase and it generates more realistic behaviors of agents. First, we show how to use the concept of holon in crowd simulation and how effective it is. For this reason, we use simple rules for holonification. Using real-world data, we model the...

متن کامل

Data-Driven Anomaly Detection based on a Bias Change ?

This paper proposes off-line and on-line data-driven approaches to anomaly detection based on generalized likelihood ratio tests for a bias change. The procedure is divided into two steps. Assuming availability of a nominal dataset, a nonparametric density estimate is obtained in the first step, prior to the test. Second, the unknown bias change is estimated from test data. Based on the expecta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transportation Research Part C-emerging Technologies

سال: 2021

ISSN: ['1879-2359', '0968-090X']

DOI: https://doi.org/10.1016/j.trc.2021.103196