TY - GEN
T1 - Continuously Weighted Majority Voting for Detection of Data Tampering Attacks in Redundant CACC Systems
AU - Awaji, Taisei
AU - Kubo, Ryogo
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Cybersecurity emerges as a critical concern in the realm of cooperative adaptive cruise control (CACC) over wireless networks. Various approaches, including model-and redundancy-based strategies, have been suggested to identify data tampering attacks within CACC systems employing redundant communication paths. Our previous study integrated these two approaches, presenting an attack detection method that utilizes discretely weighted majority voting (DWMV) based on estimation error. Despite its efficacy, DWMV falls short in detecting attacks when faced with simultaneous occurrences of modeling errors and multipath attacks. The current study introduces a novel attack detection method employing continuously weighted majority voting (CWMV) to address this limitation. The proposed CWMV establishes the weight through an exponential function involving the estimation error and decay ratio. Through simulations, we validate that CWMV excels in detecting data tampering attacks, even in scenarios where modeling errors and multipath attacks unfold concurrently in a leader-follower CACC system equipped with three redundant feedback paths.
AB - Cybersecurity emerges as a critical concern in the realm of cooperative adaptive cruise control (CACC) over wireless networks. Various approaches, including model-and redundancy-based strategies, have been suggested to identify data tampering attacks within CACC systems employing redundant communication paths. Our previous study integrated these two approaches, presenting an attack detection method that utilizes discretely weighted majority voting (DWMV) based on estimation error. Despite its efficacy, DWMV falls short in detecting attacks when faced with simultaneous occurrences of modeling errors and multipath attacks. The current study introduces a novel attack detection method employing continuously weighted majority voting (CWMV) to address this limitation. The proposed CWMV establishes the weight through an exponential function involving the estimation error and decay ratio. Through simulations, we validate that CWMV excels in detecting data tampering attacks, even in scenarios where modeling errors and multipath attacks unfold concurrently in a leader-follower CACC system equipped with three redundant feedback paths.
KW - automated driving
KW - connected vehicle
KW - cooperative adaptive cruise control
KW - cybersecurity
KW - majority voting
UR - http://www.scopus.com/inward/record.url?scp=85195792664&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85195792664&partnerID=8YFLogxK
U2 - 10.1109/ICIT58233.2024.10541011
DO - 10.1109/ICIT58233.2024.10541011
M3 - Conference contribution
AN - SCOPUS:85195792664
T3 - Proceedings of the IEEE International Conference on Industrial Technology
BT - ICIT 2024 - 2024 25th International Conference on Industrial Technology
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 25th IEEE International Conference on Industrial Technology, ICIT 2024
Y2 - 25 March 2024 through 27 March 2024
ER -