Continuously Weighted Majority Voting for Detection of Data Tampering Attacks in Redundant CACC Systems

Taisei Awaji, Ryogo Kubo

研究成果: Conference contribution

抄録

Cybersecurity emerges as a critical concern in the realm of cooperative adaptive cruise control (CACC) over wireless networks. Various approaches, including model-and redundancy-based strategies, have been suggested to identify data tampering attacks within CACC systems employing redundant communication paths. Our previous study integrated these two approaches, presenting an attack detection method that utilizes discretely weighted majority voting (DWMV) based on estimation error. Despite its efficacy, DWMV falls short in detecting attacks when faced with simultaneous occurrences of modeling errors and multipath attacks. The current study introduces a novel attack detection method employing continuously weighted majority voting (CWMV) to address this limitation. The proposed CWMV establishes the weight through an exponential function involving the estimation error and decay ratio. Through simulations, we validate that CWMV excels in detecting data tampering attacks, even in scenarios where modeling errors and multipath attacks unfold concurrently in a leader-follower CACC system equipped with three redundant feedback paths.

本文言語English
ホスト出版物のタイトルICIT 2024 - 2024 25th International Conference on Industrial Technology
出版社Institute of Electrical and Electronics Engineers Inc.
ISBN(電子版)9798350340266
DOI
出版ステータスPublished - 2024
イベント25th IEEE International Conference on Industrial Technology, ICIT 2024 - Bristol, United Kingdom
継続期間: 2024 3月 252024 3月 27

出版物シリーズ

名前Proceedings of the IEEE International Conference on Industrial Technology
ISSN(印刷版)2641-0184
ISSN(電子版)2643-2978

Conference

Conference25th IEEE International Conference on Industrial Technology, ICIT 2024
国/地域United Kingdom
CityBristol
Period24/3/2524/3/27

ASJC Scopus subject areas

  • コンピュータ サイエンスの応用
  • 電子工学および電気工学

フィンガープリント

「Continuously Weighted Majority Voting for Detection of Data Tampering Attacks in Redundant CACC Systems」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル