2022
DOI: 10.3390/pr10071299
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Isolation of False Data Injection Attack in Intelligent Transportation System via Robust State Observer

Abstract: As the future of transportation systems, the intelligent transportation system is a promising technology to improve the increasingly serious traffic problems. However, the integration of cyber-physical systems makes them vulnerable to new cyber–physical attacks. To ensure the security of intelligent transportation systems, a novel robust state observer-based detection and isolation method against false data injection attacks is developed. Based on the constructed dynamic model of intelligent vehicle networking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Simulation part parameters are given: ζ i = 0 . 25 , d d = 3 m , d i + 1 d i = 40 m , v 1 = 20 km / h , where the adaptive gains of each controller on the intelligent vehicle networking system are taken from. 33 Under the given related parameters, the following two situations are considered. Based on the works, 39 we can set the precomputed threshold to 3 τ .…”
Section: Guidelines For Manuscript Preparationmentioning
confidence: 99%
See 4 more Smart Citations
“…Simulation part parameters are given: ζ i = 0 . 25 , d d = 3 m , d i + 1 d i = 40 m , v 1 = 20 km / h , where the adaptive gains of each controller on the intelligent vehicle networking system are taken from. 33 Under the given related parameters, the following two situations are considered. Based on the works, 39 we can set the precomputed threshold to 3 τ .…”
Section: Guidelines For Manuscript Preparationmentioning
confidence: 99%
“…Assuming that hacker can inject the single FDIA into the third intelligent vehicle at t 60 s , where the attack vector is given as Huang and Wang. 33 By using the proposed Algorithm 1, a bank of parallel AUIOs are designed. As shown in Figure 4, the corresponding change of attack residuals can be obtained.…”
Section: Guidelines For Manuscript Preparationmentioning
confidence: 99%
See 3 more Smart Citations