2021
DOI: 10.1109/tits.2020.3030496
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(35 citation statements)
references
References 33 publications
0
35
0
Order By: Relevance
“…It is easy to imagine that it is about to cause a train operation incident and pose a threat to the safety of passengers. ere are three kinds of MITM attacks that are highly likely to occur in TCE: Tamper attacks [34], Replay attacks [35], and ARP spoofing attacks [36].…”
Section: Underlying Temporal Intrusions Against Tcementioning
confidence: 99%
“…It is easy to imagine that it is about to cause a train operation incident and pose a threat to the safety of passengers. ere are three kinds of MITM attacks that are highly likely to occur in TCE: Tamper attacks [34], Replay attacks [35], and ARP spoofing attacks [36].…”
Section: Underlying Temporal Intrusions Against Tcementioning
confidence: 99%
“…Lu et al [29] train the double-output branch deep network to detect the whole body and visible part of the pedestrian, respectively, and then combine the results of the two parts to improve the pedestrian detection rate in the case of occlusion [30] that introduces a supplementary subnetwork to generate a high-resolution feature map for small-scale pedestrian detection, thus improving the detection accuracy of a small-scale pedestrian. However, the existing methods are generally complex, and although they have achieved good results on relevant datasets, they are hard to meet the requirements [31][32][33] of application in a subway station. Therefore, a simple, efficient, and fast method is still needed to solve the problem of passenger detection in subway stations.…”
Section: Pedestrian Detectionmentioning
confidence: 99%
“…Simultaneously, with the increase of the communication limit time, the improved range of reliability gradually decreases, indicating that the influence of the communication limit time on reliability gradually decreases. 12 Wireless Communications and Mobile Computing Without considering the delay and retransmission of cable transmission between ground equipment, the time for the roaming switching communication process conforms to the Gamma distribution, and its density function is Equation (2). Figure 15 shows the reliability of the communication scenario.…”
Section: Reliability Analysis Of Communication Scenarios For On-board Terminalmentioning
confidence: 99%
“…The existing CBTC system is technically very mature. However, there are still certain shortcomings: the system structure is involved, which leads to too many interfaces between subsystems; the information transmission process is cumbersome, and the on-board equipment cannot directly obtain relevant information, which limits the increase in train speed; the system consists of more equipment, resulting in higher system construction and operating costs, which is not conducive to the large-scale development of urban rail transit [2].…”
Section: Introductionmentioning
confidence: 99%