An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
With the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environmen...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2020/8823300 |
id |
doaj-8532042155e647ccaf962c71e4cfdb7d |
---|---|
record_format |
Article |
spelling |
doaj-8532042155e647ccaf962c71e4cfdb7d2020-12-28T01:31:08ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772020-01-01202010.1155/2020/8823300An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized MethodYike Li0Yingxiao Xiang1Endong Tong2Wenjia Niu3Bowei Jia4Long Li5Jiqiang Liu6Zhen Han7Beijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationGuangxi Key Laboratory of Trusted SoftwareBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationWith the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environment such as road-side infrastructure and traffic control units. A congestion attack to the controlled optimization of phases algorithm (COP) of I-SIG is recently revealed. Unfortunately, such analysis still lacks a timely visualized prediction on later congestion when launching an initial attack. In this paper, we argue that traffic image feature-based learning has available knowledge to reflect the relation between attack and caused congestion and propose a novel analysis framework based on cycle generative adversarial network (CycleGAN). Based on phase order, we first extract four-direction road images of one intersection and perform phase-based composition for generating new sample image of training. We then design a weighted L1 regularization loss that considers both last-vehicle attack and first-vehicle attack, to improve the training of CycleGAN with two generators and two discriminators. Experiments on simulated traffic flow data from VISSIM platform show the effectiveness of our approach.http://dx.doi.org/10.1155/2020/8823300 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yike Li Yingxiao Xiang Endong Tong Wenjia Niu Bowei Jia Long Li Jiqiang Liu Zhen Han |
spellingShingle |
Yike Li Yingxiao Xiang Endong Tong Wenjia Niu Bowei Jia Long Li Jiqiang Liu Zhen Han An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method Wireless Communications and Mobile Computing |
author_facet |
Yike Li Yingxiao Xiang Endong Tong Wenjia Niu Bowei Jia Long Li Jiqiang Liu Zhen Han |
author_sort |
Yike Li |
title |
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method |
title_short |
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method |
title_full |
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method |
title_fullStr |
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method |
title_full_unstemmed |
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method |
title_sort |
empirical study on gan-based traffic congestion attack analysis: a visualized method |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8677 |
publishDate |
2020-01-01 |
description |
With the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environment such as road-side infrastructure and traffic control units. A congestion attack to the controlled optimization of phases algorithm (COP) of I-SIG is recently revealed. Unfortunately, such analysis still lacks a timely visualized prediction on later congestion when launching an initial attack. In this paper, we argue that traffic image feature-based learning has available knowledge to reflect the relation between attack and caused congestion and propose a novel analysis framework based on cycle generative adversarial network (CycleGAN). Based on phase order, we first extract four-direction road images of one intersection and perform phase-based composition for generating new sample image of training. We then design a weighted L1 regularization loss that considers both last-vehicle attack and first-vehicle attack, to improve the training of CycleGAN with two generators and two discriminators. Experiments on simulated traffic flow data from VISSIM platform show the effectiveness of our approach. |
url |
http://dx.doi.org/10.1155/2020/8823300 |
work_keys_str_mv |
AT yikeli anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT yingxiaoxiang anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT endongtong anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT wenjianiu anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT boweijia anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT longli anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT jiqiangliu anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT zhenhan anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT yikeli empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT yingxiaoxiang empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT endongtong empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT wenjianiu empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT boweijia empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT longli empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT jiqiangliu empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod AT zhenhan empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod |
_version_ |
1714981003107237888 |