Securing Intelligent Transportation Systems against Spoofing Attacks

Overview

An intelligent transportation system (ITS) is a system of vehicles and infrastructure that exchange information in real time and make decisions fully or partially automatically. The operations of ITS heavily rely on data collection and transmission, which is subject to prevalent remote and/or on-site attacks. Actual incidents have been reported where hackers spoofed traffic sensor data or created phantom traffic jams in navigation apps. It is hard to deterministically predict when a component will be attacked, and which component will be attacked. Therefore, appropriate proactive and/or responsive mechanisms should be designed to enable ITS to tolerate a certain level of attacks.

Game theory is a powerful tool for security risk analysis that has been extensively used in various engineering systems, and game-theoretic approaches have been applied to studying the security of routing in transportation and communications. This project will be the basis for a synthesis of game theory and queuing theory, essential for capturing the interaction between the queuing dynamics and players decisions, in order to protect the ITS system from spoofing and attacks.

Research Objectives

This project evaluates the cyber-physical security risk of ITS and designs recovery plans and resilient control algorithms in the face of strategic attacks on sensing components. The specific questions to be addressed include:

  • How to quantify the security risk (in terms of throughput loss or travel delay) of ITS due to strategic sensing attacks that happen at random times and random locations,=
  • How to allocate limited resources for recovery of compromised sensing components
  • How to design algorithms that fully or partially protect feedback ITS control capabilities from sensing attacks

This project will study the evolution of network flows under the influence of sensing attacks based on the stochastic stability theory of Markov chains as well as the queuing theory. The equilibrium strategies of the attackers and the SO, will be characterized and the risk will be quantified. This project will study the resilience score of various routing policies, including the shortest-queue policy, the round-robin policy, and open-loop policies. The project will particularly focus on quantifying the incentive of launching attacks and designing secure-by- design mechanisms. The longer-term (3-5 years) plan for this research is to synthesize the idea of learning-based methods with the results from this research to design secure control strategies that are adaptive to the non- stationarities in system dynamics; learning-based methods are also relevant in security games with incomplete information.

Related Media

Personnel

Li Jin

Li Jin

Assistant Professor, NYU

Li Jin is the Principal Investigator on this project.

Deliverables

Datasets

Details