An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method

With the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environmen...

Full description

Bibliographic Details
Main Authors: Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2020/8823300
id doaj-8532042155e647ccaf962c71e4cfdb7d
record_format Article
spelling doaj-8532042155e647ccaf962c71e4cfdb7d2020-12-28T01:31:08ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772020-01-01202010.1155/2020/8823300An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized MethodYike Li0Yingxiao Xiang1Endong Tong2Wenjia Niu3Bowei Jia4Long Li5Jiqiang Liu6Zhen Han7Beijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationGuangxi Key Laboratory of Trusted SoftwareBeijing Key Laboratory of Security and Privacy in Intelligent TransportationBeijing Key Laboratory of Security and Privacy in Intelligent TransportationWith the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environment such as road-side infrastructure and traffic control units. A congestion attack to the controlled optimization of phases algorithm (COP) of I-SIG is recently revealed. Unfortunately, such analysis still lacks a timely visualized prediction on later congestion when launching an initial attack. In this paper, we argue that traffic image feature-based learning has available knowledge to reflect the relation between attack and caused congestion and propose a novel analysis framework based on cycle generative adversarial network (CycleGAN). Based on phase order, we first extract four-direction road images of one intersection and perform phase-based composition for generating new sample image of training. We then design a weighted L1 regularization loss that considers both last-vehicle attack and first-vehicle attack, to improve the training of CycleGAN with two generators and two discriminators. Experiments on simulated traffic flow data from VISSIM platform show the effectiveness of our approach.http://dx.doi.org/10.1155/2020/8823300
collection DOAJ
language English
format Article
sources DOAJ
author Yike Li
Yingxiao Xiang
Endong Tong
Wenjia Niu
Bowei Jia
Long Li
Jiqiang Liu
Zhen Han
spellingShingle Yike Li
Yingxiao Xiang
Endong Tong
Wenjia Niu
Bowei Jia
Long Li
Jiqiang Liu
Zhen Han
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
Wireless Communications and Mobile Computing
author_facet Yike Li
Yingxiao Xiang
Endong Tong
Wenjia Niu
Bowei Jia
Long Li
Jiqiang Liu
Zhen Han
author_sort Yike Li
title An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
title_short An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
title_full An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
title_fullStr An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
title_full_unstemmed An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method
title_sort empirical study on gan-based traffic congestion attack analysis: a visualized method
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8677
publishDate 2020-01-01
description With the development of emerging intelligent traffic signal (I-SIG) system, congestion-involved security issues are drawing attentions of researchers and developers on the vulnerability introduced by connected vehicle technology, which empowers vehicles to communicate with the surrounding environment such as road-side infrastructure and traffic control units. A congestion attack to the controlled optimization of phases algorithm (COP) of I-SIG is recently revealed. Unfortunately, such analysis still lacks a timely visualized prediction on later congestion when launching an initial attack. In this paper, we argue that traffic image feature-based learning has available knowledge to reflect the relation between attack and caused congestion and propose a novel analysis framework based on cycle generative adversarial network (CycleGAN). Based on phase order, we first extract four-direction road images of one intersection and perform phase-based composition for generating new sample image of training. We then design a weighted L1 regularization loss that considers both last-vehicle attack and first-vehicle attack, to improve the training of CycleGAN with two generators and two discriminators. Experiments on simulated traffic flow data from VISSIM platform show the effectiveness of our approach.
url http://dx.doi.org/10.1155/2020/8823300
work_keys_str_mv AT yikeli anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT yingxiaoxiang anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT endongtong anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT wenjianiu anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT boweijia anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT longli anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT jiqiangliu anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT zhenhan anempiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT yikeli empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT yingxiaoxiang empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT endongtong empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT wenjianiu empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT boweijia empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT longli empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT jiqiangliu empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
AT zhenhan empiricalstudyonganbasedtrafficcongestionattackanalysisavisualizedmethod
_version_ 1714981003107237888