TY - JOUR
T1 - Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming
AU - Canepa, Edward S.
AU - Bayen, Alexandre M.
AU - Claudel, Christian G.
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2013/10/4
Y1 - 2013/10/4
N2 - Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.
AB - Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.
UR - http://hdl.handle.net/10754/562948
UR - http://aimsciences.org//article/doi/10.3934/nhm.2013.8.783
UR - http://www.scopus.com/inward/record.url?scp=84886008798&partnerID=8YFLogxK
U2 - 10.3934/nhm.2013.8.783
DO - 10.3934/nhm.2013.8.783
M3 - Article
SN - 1556-1801
VL - 8
SP - 783
EP - 802
JO - Networks and Heterogeneous Media
JF - Networks and Heterogeneous Media
IS - 3
ER -