Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks
Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective,...
Saved in:
| Published in: | Information sciences Vol. 640; p. 119067 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier Inc
01.09.2023
|
| Subjects: | |
| ISSN: | 0020-0255, 1872-6291 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective, the study develops two bi-level simulation-based optimization (SO) models and solves them using an improved biobjective robust simulation-based optimization (IBORSO) algorithm. The attack-defense process is formulated as a Stackelberg game, where the lower level attacker aims to find optimal attack plans to degrade traffic efficiency and safety indices, while the upper level defender adjusts the signal control plan to compensate for the effects of the attack on traffic efficiency and safety indices. The proposed approach is evaluated on an urban road network in Changsha, China. The results show that the developed robust signal control plans can withstand risk-averse and worst-case attacks and perform better than the counterpart ones in terms of biobjective performance. The proposed bi-level modeling framework and solution algorithm can be used to build robust traffic signal control systems that are resilient to cyberattacks. |
|---|---|
| AbstractList | Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective, the study develops two bi-level simulation-based optimization (SO) models and solves them using an improved biobjective robust simulation-based optimization (IBORSO) algorithm. The attack-defense process is formulated as a Stackelberg game, where the lower level attacker aims to find optimal attack plans to degrade traffic efficiency and safety indices, while the upper level defender adjusts the signal control plan to compensate for the effects of the attack on traffic efficiency and safety indices. The proposed approach is evaluated on an urban road network in Changsha, China. The results show that the developed robust signal control plans can withstand risk-averse and worst-case attacks and perform better than the counterpart ones in terms of biobjective performance. The proposed bi-level modeling framework and solution algorithm can be used to build robust traffic signal control systems that are resilient to cyberattacks. |
| ArticleNumber | 119067 |
| Author | Bao, Ji Mei, Zhenyu Zheng, Liang |
| Author_xml | – sequence: 1 givenname: Liang orcidid: 0000-0002-4161-9630 surname: Zheng fullname: Zheng, Liang email: zhengliang@csu.edu.cn organization: School of Traffic & Transportation Engineering, Central South University, Changsha, China – sequence: 2 givenname: Ji surname: Bao fullname: Bao, Ji organization: School of Traffic & Transportation Engineering, Central South University, Changsha, China – sequence: 3 givenname: Zhenyu surname: Mei fullname: Mei, Zhenyu organization: Institute of Intelligent Transportation System, Zhejiang University, Hangzhou, China |
| BookMark | eNp9kMtKQzEQhoMo2FYfwF1e4NRczi24kuINCoJYXMbJ5ZS0p0lJYqE-vafWlYuuhll8M___jdG5D94idEPJlBJa366mzqcpI4xPKRWkbs7QiLYNK2om6DkaEcJIQVhVXaJxSitCSNnU9Qh9LqICj3OErnMaJ7f00GMdfI6hxzGor5Rx2Ga3cd-QXfAYljC8yvjNpXUBOxuTxeAN_ggx5ULDsOq9shFyBr1OV-iigz7Z6785QYvHh_fZczF_fXqZ3c8LzUSTC2NaXVWGW0uEEYxz1goNGpQ2dQvWqpLXzBhVVsKKFhpTlQCKVpoRziul-AQ1x7s6hpSi7aR2-Tfx0M31khJ5ECVXckgvD6LkUdRA0n_kNroNxP1J5u7I2KHSztkok3bWa2tctDpLE9wJ-gc6lIYE |
| CitedBy_id | crossref_primary_10_1111_mice_13354 crossref_primary_10_1177_00375497251331487 crossref_primary_10_1007_s10479_024_05963_0 crossref_primary_10_1016_j_trc_2024_104870 crossref_primary_10_1016_j_ins_2024_120805 crossref_primary_10_1093_tse_tdae002 crossref_primary_10_1109_TITS_2025_3538095 crossref_primary_10_1016_j_trc_2025_105116 crossref_primary_10_1016_j_cor_2025_107179 crossref_primary_10_1016_j_chaos_2025_116906 crossref_primary_10_1016_j_trc_2024_104838 |
| Cites_doi | 10.1109/TEVC.2003.810758 10.1016/j.trb.2020.07.002 10.1111/mice.12876 10.1287/ijoc.1090.0319 10.1016/j.conengprac.2020.104718 10.1016/j.ins.2021.08.010 10.1007/978-1-4419-6142-6_2 10.1109/TGCN.2022.3162649 10.1016/j.trb.2016.05.017 10.1287/ijoc.1110.0465 10.1287/trsc.2015.0661 10.1287/ijoc.2022.1196 10.1109/TDSC.2018.2883057 10.1016/j.ins.2022.07.010 10.1016/j.ejor.2021.08.040 10.1016/j.ins.2022.11.074 10.1016/j.cose.2019.101576 10.1016/j.trb.2019.01.020 10.1016/j.jfranklin.2022.11.037 10.1016/j.asoc.2019.01.046 10.1109/ICCPS.2016.7479122 10.1109/NOMS47738.2020.9110349 10.1109/TITS.2021.3056658 10.1109/ACCESS.2020.2992536 10.1016/j.adhoc.2017.03.006 10.14722/autosec.2021.23005 10.1016/j.ins.2022.11.092 10.1287/ijoc.2019.0920 10.1177/0361198118756885 10.1162/evco.2006.14.4.463 10.1023/A:1008306431147 10.1287/opre.1090.0715 10.1016/j.ins.2022.08.025 10.1016/j.trb.2019.03.001 10.1088/1361-6501/ac8368 |
| ContentType | Journal Article |
| Copyright | 2023 Elsevier Inc. |
| Copyright_xml | – notice: 2023 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.ins.2023.119067 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Library & Information Science |
| EISSN | 1872-6291 |
| ExternalDocumentID | 10_1016_j_ins_2023_119067 S0020025523006527 |
| GroupedDBID | --K --M --Z -~X .DC .~1 0R~ 1B1 1OL 1RT 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO AAYFN ABAOU ABBOA ABEFU ABFNM ABJNI ABMAC ABTAH ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM LG9 LY1 M41 MHUIS MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SST SSV SSW SSZ T5K TN5 TWZ UHS WH7 WUQ XPP YYP ZMT ZY4 ~02 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c297t-dd8c55d3ee09d9233289cacabcd68aeeb4362ddb459e98a7d54aab15c20335bb3 |
| ISICitedReferencesCount | 11 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001048624100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0020-0255 |
| IngestDate | Tue Nov 18 21:12:24 EST 2025 Sat Nov 29 06:54:52 EST 2025 Fri Feb 23 02:36:52 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Cyberattacks Traffic signal control Bi-level model Biobjectives Robust simulation-based optimization |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c297t-dd8c55d3ee09d9233289cacabcd68aeeb4362ddb459e98a7d54aab15c20335bb3 |
| ORCID | 0000-0002-4161-9630 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_ins_2023_119067 crossref_primary_10_1016_j_ins_2023_119067 elsevier_sciencedirect_doi_10_1016_j_ins_2023_119067 |
| PublicationCentury | 2000 |
| PublicationDate | September 2023 2023-09-00 |
| PublicationDateYYYYMMDD | 2023-09-01 |
| PublicationDate_xml | – month: 09 year: 2023 text: September 2023 |
| PublicationDecade | 2020 |
| PublicationTitle | Information sciences |
| PublicationYear | 2023 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Zheng, Bao, Xu, Tan (b0140) 2022; 299 A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin, X. Koutsoukos, Vulnerability of transportation networks to traffic-signal tampering, In Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems (2016) 1-10. Tao, Cheng, Qiu, Stojanovic (b0175) 2022; 33 Z.A. Sabra, D. Gettman, R.D. Henry, V. Nallamothu, Balancing Safety and Capacity in an Adaptive Signal Control System–Phase 1 (No. FHWA-HRT-10-038), Federal Highway Administration, Washington, DC (2010). S. Grad, Engineers who hacked into a traffic signal computer, jamming streets, sentenced. Los Angeles Times (2009). Hale, Zhu, Zhou (b0145) 2020; 32 Laszka, Abbas, Vorobeychik, Koutsoukos (b0075) 2019; 87 M. Fellendorf, P. Vortisch, Microscopic traffic flow simulator VISSIM. In Fundamentals of traffic simulation, Springer, New York, NY (2010) 63-93. Zhao, Du, Zhou, Tian (b0170) 2022; 608 Han, Zhang, Yang, Hou, Qiao (b0160) 2023; 621 Allen, Shin, Cooper (b0190) 1978 Tanınmış, Sinnl (b0125) 2022; 34 Deb, Gupta (b0215) 2006; 14 Jin, Chen, Zhang, Yuan, Wang (b0085) 2021; 579 Bertsimas, Nohadani, Teo (b0130) 2010; 58 . M. Behrisch, L. Bieker, J. Erdmann, D. Krajzewicz, SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind (2011). Dellino, Kleijnen, Meloni (b0230) 2012; 24 D. Estrin, Israeli road control hacked, shutting down Haifa highway. The spokesman-review (2013) S. Bernstein, A. Blankstein, Key signals targeted officials say, Los Angeles Times (2007) Thodi, Mulumba, Jabari (b0045) 2020; 8 Sakiz, Sen (b0080) 2017; 61 Zheng, Li (b0180) 2023; 38 S.E. Huang, W. Wong, Y.H. Feng, Q.A. Chen, Z.M. Mao, H.X. Liu, Impact evaluation of falsified data attacks on connected vehicle based traffic signal control, In NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec) (2021). Zitzler, Thiele, Laumanns, Fonseca, Fonseca (b0225) 2003; 7 Bertsimas, Nohadani, Teo (b0135) 2010; 22 Zhang, Song, Song, Stojanovic (b0155) 2023; 360 Cerrudo (b0010) 2015; 17 Jones, Schonlau, Welch (b0245) 1998; 13 Ghafouri, Abbas, Vorobeychik, Koutsoukos (b0035) 2016 Lopez, Jin, Al Faruque (b0025) 2020; 139 Poudel, Munir (b0070) 2018; 18 T. Halabi, O.A. Wahab, M. Zulkernine, A game-theoretic approach for distributed attack mitigation in intelligent transportation systems, NOMS IEEE/IFIP Network Operations and Management Symposium (2020) 1-6. He, Chen, Xiong, Zhu, Zhang (b0250) 2017; 51 A. Tuladhar, X. Ou, Understanding Security Issues in Vehicle Transportation Systems in a Holistic, Context-aware Manner (2019) J. Hayward, Near Miss Determination Through Use of a Scale of Danger. Report TTSC-7115. The Pennsylvania State University, University Park (1972). Li, Niu, Tian, Chen, Xie, Wu, Xiang, Tong, Baker, Liu (b0115) 2022; 6 He, Qi, Yan, Cheng, Shi (b0165) 2023; 621 Zhuang, Tao, Chen, Stojanovic, Paszke (b0150) 2022 Zheng, Xue, Xu, Ran (b0235) 2019; 122 Liu, Yang (b0120) 2022; 610 Reilly, Martin, Payer, Bayen (b0060) 2016; 91 Dijkstra (b0195) 2011 Feng, Huang, Chen, Liu, Mao (b0030) 2018; 2672 B. Ghena, W. Beyer, A, Hillaker, J. Pevarnek, J.A. Halderman, Green lights forever: analyzing the security of traffic infrastructure, The 8th USENIX Workshop on Offensive Technologies (2014) 7. Santiago, Huacuja, Dorronsoro, Pecero, Santillan, Barbosa, Monterrubio (b0220) 2014 M. Wu, S. Amin, Security of transportation networks: modeling attacker-defender interaction, arXiv:1804.00391 (2018) https://arxiv.org/abs/1804.00391v1. Mercader, Haddad (b0105) 2021; 109 Haddad, Mirkin (b0100) 2020; 132 Zheng, Xu, Jin, Ran (b0240) 2019; 77 Yen, Ghosal, Zhang, Chuah (b0110) 2021; 23 10.1016/j.ins.2023.119067_b0065 10.1016/j.ins.2023.119067_b0020 10.1016/j.ins.2023.119067_b0185 Ghafouri (10.1016/j.ins.2023.119067_b0035) 2016 Deb (10.1016/j.ins.2023.119067_b0215) 2006; 14 Dellino (10.1016/j.ins.2023.119067_b0230) 2012; 24 Santiago (10.1016/j.ins.2023.119067_b0220) 2014 Yen (10.1016/j.ins.2023.119067_b0110) 2021; 23 Tanınmış (10.1016/j.ins.2023.119067_b0125) 2022; 34 Zhang (10.1016/j.ins.2023.119067_b0155) 2023; 360 Dijkstra (10.1016/j.ins.2023.119067_b0195) 2011 Zheng (10.1016/j.ins.2023.119067_b0140) 2022; 299 Han (10.1016/j.ins.2023.119067_b0160) 2023; 621 Lopez (10.1016/j.ins.2023.119067_b0025) 2020; 139 Liu (10.1016/j.ins.2023.119067_b0120) 2022; 610 Bertsimas (10.1016/j.ins.2023.119067_b0130) 2010; 58 Laszka (10.1016/j.ins.2023.119067_b0075) 2019; 87 Zheng (10.1016/j.ins.2023.119067_b0240) 2019; 77 He (10.1016/j.ins.2023.119067_b0250) 2017; 51 10.1016/j.ins.2023.119067_b0200 10.1016/j.ins.2023.119067_b0005 Feng (10.1016/j.ins.2023.119067_b0030) 2018; 2672 Allen (10.1016/j.ins.2023.119067_b0190) 1978 10.1016/j.ins.2023.119067_b0040 Thodi (10.1016/j.ins.2023.119067_b0045) 2020; 8 Zhao (10.1016/j.ins.2023.119067_b0170) 2022; 608 Haddad (10.1016/j.ins.2023.119067_b0100) 2020; 132 Cerrudo (10.1016/j.ins.2023.119067_b0010) 2015; 17 10.1016/j.ins.2023.119067_b0205 Mercader (10.1016/j.ins.2023.119067_b0105) 2021; 109 Zhuang (10.1016/j.ins.2023.119067_b0150) 2022 Zheng (10.1016/j.ins.2023.119067_b0235) 2019; 122 10.1016/j.ins.2023.119067_b0210 10.1016/j.ins.2023.119067_b0055 Bertsimas (10.1016/j.ins.2023.119067_b0135) 2010; 22 Sakiz (10.1016/j.ins.2023.119067_b0080) 2017; 61 Jin (10.1016/j.ins.2023.119067_b0085) 2021; 579 Zheng (10.1016/j.ins.2023.119067_b0180) 2023; 38 10.1016/j.ins.2023.119067_b0015 10.1016/j.ins.2023.119067_b0090 Tao (10.1016/j.ins.2023.119067_b0175) 2022; 33 10.1016/j.ins.2023.119067_b0050 Jones (10.1016/j.ins.2023.119067_b0245) 1998; 13 10.1016/j.ins.2023.119067_b0095 Hale (10.1016/j.ins.2023.119067_b0145) 2020; 32 Reilly (10.1016/j.ins.2023.119067_b0060) 2016; 91 Poudel (10.1016/j.ins.2023.119067_b0070) 2018; 18 Li (10.1016/j.ins.2023.119067_b0115) 2022; 6 He (10.1016/j.ins.2023.119067_b0165) 2023; 621 Zitzler (10.1016/j.ins.2023.119067_b0225) 2003; 7 |
| References_xml | – reference: D. Estrin, Israeli road control hacked, shutting down Haifa highway. The spokesman-review (2013) – reference: B. Ghena, W. Beyer, A, Hillaker, J. Pevarnek, J.A. Halderman, Green lights forever: analyzing the security of traffic infrastructure, The 8th USENIX Workshop on Offensive Technologies (2014) 7. – reference: M. Behrisch, L. Bieker, J. Erdmann, D. Krajzewicz, SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind (2011). – volume: 299 start-page: 249 year: 2022 end-page: 262 ident: b0140 article-title: Biobjective robust simulation-based optimization for unconstrained problems publication-title: Eur. J. Oper. Res. – volume: 132 start-page: 44 year: 2020 end-page: 59 ident: b0100 article-title: Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks publication-title: Transp. Res. B Methodol. – start-page: 1 year: 2022 end-page: 13 ident: b0150 article-title: An optimal iterative learning control approach for linear systems with nonuniform trial lengths under input constraints publication-title: IEEE Trans. Syst. Man Cybernet.: Syst. – volume: 6 start-page: 1448 year: 2022 end-page: 1458 ident: b0115 article-title: Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation publication-title: IEEE Trans. Green Commun. Netw. – volume: 77 start-page: 678 year: 2019 end-page: 687 ident: b0240 article-title: Network-wide signal timing stochastic simulation optimization with environmental concerns publication-title: Appl. Soft Comput. – year: 2011 ident: b0195 article-title: En route to safer roads: How road structure and road classification can affect road safety – start-page: 67 year: 1978 end-page: 74 ident: b0190 article-title: Analysis of Traffic Conflicts and Collisions. Transportation Research Record 667 – volume: 579 start-page: 814 year: 2021 end-page: 831 ident: b0085 article-title: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning publication-title: Inf. Sci. – volume: 38 start-page: 640 year: 2023 end-page: 659 ident: b0180 article-title: Simulation-based optimization method for arterial signal control considering traffic safety and efficiency under uncertainties publication-title: Comput. Aided Civ. Inf. Eng. – volume: 58 start-page: 161 year: 2010 end-page: 178 ident: b0130 article-title: Robust optimization for unconstrained simulation-based problems publication-title: Oper. Res. – volume: 18 start-page: 235 year: 2018 end-page: 252 ident: b0070 article-title: Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps publication-title: IEEE Trans. Dependable Secure Comput. – volume: 109 year: 2021 ident: b0105 article-title: Resilient multivariable perimeter control of urban road networks under cyberattacks publication-title: Control Eng. Pract. – volume: 34 start-page: 2634 year: 2022 end-page: 2657 ident: b0125 article-title: A branch-and-cut algorithm for submodular interdiction games publication-title: INFORMS J. Comput. – volume: 13 start-page: 455 year: 1998 end-page: 492 ident: b0245 article-title: Efficient global optimization of expensive black-box functions publication-title: J. Glob. Optim. – volume: 122 start-page: 287 year: 2019 end-page: 308 ident: b0235 article-title: A stochastic simulation-based optimization method for equitable and efficient network-wide signal timing under uncertainties publication-title: Transp. Res. B Methodol. – reference: M. Fellendorf, P. Vortisch, Microscopic traffic flow simulator VISSIM. In Fundamentals of traffic simulation, Springer, New York, NY (2010) 63-93. – volume: 51 start-page: 412 year: 2017 end-page: 426 ident: b0250 article-title: Optimal time-varying pricing for toll roads under multiple objectives: a simulation-based optimization approach publication-title: Transp. Sci. – volume: 87 year: 2019 ident: b0075 article-title: Detection and mitigation of attacks on transportation networks as a multi-stage security game publication-title: Comput. Secur. – volume: 608 start-page: 1245 year: 2022 end-page: 1260 ident: b0170 article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks publication-title: Inf. Sci. – volume: 621 start-page: 248 year: 2023 end-page: 264 ident: b0160 article-title: Data-driven robust optimal control for nonlinear system with uncertain disturbances publication-title: Inf. Sci. – volume: 610 start-page: 674 year: 2022 end-page: 693 ident: b0120 article-title: Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach publication-title: Inf. Sci. – volume: 33 start-page: 115005 year: 2022 ident: b0175 article-title: Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic publication-title: Meas. Sci. Technol. – reference: M. Wu, S. Amin, Security of transportation networks: modeling attacker-defender interaction, arXiv:1804.00391 (2018) https://arxiv.org/abs/1804.00391v1. – volume: 23 start-page: 6406 year: 2021 end-page: 6417 ident: b0110 article-title: Security vulnerabilities and protection algorithms for backpressure-based traffic signal control at an isolated intersection publication-title: IEEE Trans. Intell. Transp. Syst. – volume: 14 start-page: 463 year: 2006 end-page: 494 ident: b0215 article-title: Introducing robustness in multi-objective optimization publication-title: Evol. Comput. – reference: A. Tuladhar, X. Ou, Understanding Security Issues in Vehicle Transportation Systems in a Holistic, Context-aware Manner (2019) – reference: S. Grad, Engineers who hacked into a traffic signal computer, jamming streets, sentenced. Los Angeles Times (2009). – volume: 17 start-page: 137 year: 2015 end-page: 151 ident: b0010 article-title: An emerging US (and world) threat: cities wide open to cyber attacks publication-title: Securing Smart Cities – reference: Z.A. Sabra, D. Gettman, R.D. Henry, V. Nallamothu, Balancing Safety and Capacity in an Adaptive Signal Control System–Phase 1 (No. FHWA-HRT-10-038), Federal Highway Administration, Washington, DC (2010). – volume: 32 start-page: 565 year: 2020 end-page: 581 ident: b0145 article-title: Domination measure: a new metric for solving multiobjective optimization publication-title: INFORMS J. Comput. – volume: 91 start-page: 366 year: 2016 end-page: 382 ident: b0060 article-title: Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security publication-title: Transp. Res. B Methodol. – volume: 139 start-page: 473 year: 2020 end-page: 495 ident: b0025 article-title: Security analysis for fixed-time traffic control systems publication-title: Transp. Res. B Methodol. – reference: S.E. Huang, W. Wong, Y.H. Feng, Q.A. Chen, Z.M. Mao, H.X. Liu, Impact evaluation of falsified data attacks on connected vehicle based traffic signal control, In NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec) (2021). – reference: S. Bernstein, A. Blankstein, Key signals targeted officials say, Los Angeles Times (2007) – start-page: 453 year: 2014 end-page: 465 ident: b0220 article-title: A survey of decomposition methods for multi-objective optimization, recent advances on hybrid approaches for designing intelligent systems – volume: 8 start-page: 86149 year: 2020 end-page: 86161 ident: b0045 article-title: Noticeability versus impact in traffic signal tampering publication-title: IEEE Access – volume: 360 start-page: 841 year: 2023 end-page: 861 ident: b0155 article-title: Finite-Time sliding mode control for singularly perturbed PDE systems publication-title: J. Franklin Inst. – reference: J. Hayward, Near Miss Determination Through Use of a Scale of Danger. Report TTSC-7115. The Pennsylvania State University, University Park (1972). – reference: A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin, X. Koutsoukos, Vulnerability of transportation networks to traffic-signal tampering, In Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems (2016) 1-10. – reference: . – reference: T. Halabi, O.A. Wahab, M. Zulkernine, A game-theoretic approach for distributed attack mitigation in intelligent transportation systems, NOMS IEEE/IFIP Network Operations and Management Symposium (2020) 1-6. – start-page: 130 year: 2016 end-page: 135 ident: b0035 article-title: Vulnerability of fixed-time control of signalized intersections to cyber-tampering publication-title: Resilience Week (RWS) – volume: 621 start-page: 596 year: 2023 end-page: 610 ident: b0165 article-title: Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks publication-title: Inf. Sci. – volume: 22 start-page: 44 year: 2010 end-page: 58 ident: b0135 article-title: Nonconvex robust optimization for problems with constraints publication-title: INFORMS J. Comput. – volume: 24 start-page: 471 year: 2012 end-page: 484 ident: b0230 article-title: Robust optimization in simulation: Taguchi and Krige combined publication-title: INFORMS J. Comput. – volume: 2672 start-page: 1 year: 2018 end-page: 11 ident: b0030 article-title: Vulnerability of traffic control system under cyberattacks with falsified data publication-title: Transp. Res. Rec. – volume: 7 start-page: 117 year: 2003 end-page: 132 ident: b0225 article-title: Performance assessment of multiobjective optimizers: an analysis and review publication-title: IEEE Trans. Evol. Comput. – volume: 61 start-page: 33 year: 2017 end-page: 50 ident: b0080 article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV publication-title: Ad Hoc Netw. – volume: 7 start-page: 117 issue: 2 year: 2003 ident: 10.1016/j.ins.2023.119067_b0225 article-title: Performance assessment of multiobjective optimizers: an analysis and review publication-title: IEEE Trans. Evol. Comput. doi: 10.1109/TEVC.2003.810758 – volume: 139 start-page: 473 year: 2020 ident: 10.1016/j.ins.2023.119067_b0025 article-title: Security analysis for fixed-time traffic control systems publication-title: Transp. Res. B Methodol. doi: 10.1016/j.trb.2020.07.002 – volume: 38 start-page: 640 issue: 5 year: 2023 ident: 10.1016/j.ins.2023.119067_b0180 article-title: Simulation-based optimization method for arterial signal control considering traffic safety and efficiency under uncertainties publication-title: Comput. Aided Civ. Inf. Eng. doi: 10.1111/mice.12876 – volume: 22 start-page: 44 issue: 1 year: 2010 ident: 10.1016/j.ins.2023.119067_b0135 article-title: Nonconvex robust optimization for problems with constraints publication-title: INFORMS J. Comput. doi: 10.1287/ijoc.1090.0319 – volume: 109 year: 2021 ident: 10.1016/j.ins.2023.119067_b0105 article-title: Resilient multivariable perimeter control of urban road networks under cyberattacks publication-title: Control Eng. Pract. doi: 10.1016/j.conengprac.2020.104718 – ident: 10.1016/j.ins.2023.119067_b0020 – volume: 579 start-page: 814 year: 2021 ident: 10.1016/j.ins.2023.119067_b0085 article-title: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.08.010 – ident: 10.1016/j.ins.2023.119067_b0090 – ident: 10.1016/j.ins.2023.119067_b0205 doi: 10.1007/978-1-4419-6142-6_2 – volume: 6 start-page: 1448 issue: 3 year: 2022 ident: 10.1016/j.ins.2023.119067_b0115 article-title: Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation publication-title: IEEE Trans. Green Commun. Netw. doi: 10.1109/TGCN.2022.3162649 – volume: 91 start-page: 366 year: 2016 ident: 10.1016/j.ins.2023.119067_b0060 article-title: Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security publication-title: Transp. Res. B Methodol. doi: 10.1016/j.trb.2016.05.017 – ident: 10.1016/j.ins.2023.119067_b0005 – volume: 24 start-page: 471 issue: 3 year: 2012 ident: 10.1016/j.ins.2023.119067_b0230 article-title: Robust optimization in simulation: Taguchi and Krige combined publication-title: INFORMS J. Comput. doi: 10.1287/ijoc.1110.0465 – ident: 10.1016/j.ins.2023.119067_b0015 – volume: 51 start-page: 412 issue: 2 year: 2017 ident: 10.1016/j.ins.2023.119067_b0250 article-title: Optimal time-varying pricing for toll roads under multiple objectives: a simulation-based optimization approach publication-title: Transp. Sci. doi: 10.1287/trsc.2015.0661 – volume: 34 start-page: 2634 issue: 5 year: 2022 ident: 10.1016/j.ins.2023.119067_b0125 article-title: A branch-and-cut algorithm for submodular interdiction games publication-title: INFORMS J. Comput. doi: 10.1287/ijoc.2022.1196 – start-page: 130 year: 2016 ident: 10.1016/j.ins.2023.119067_b0035 article-title: Vulnerability of fixed-time control of signalized intersections to cyber-tampering publication-title: Resilience Week (RWS) – volume: 18 start-page: 235 issue: 1 year: 2018 ident: 10.1016/j.ins.2023.119067_b0070 article-title: Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2018.2883057 – start-page: 1 year: 2022 ident: 10.1016/j.ins.2023.119067_b0150 article-title: An optimal iterative learning control approach for linear systems with nonuniform trial lengths under input constraints publication-title: IEEE Trans. Syst. Man Cybernet.: Syst. – volume: 608 start-page: 1245 year: 2022 ident: 10.1016/j.ins.2023.119067_b0170 article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.07.010 – volume: 299 start-page: 249 issue: 1 year: 2022 ident: 10.1016/j.ins.2023.119067_b0140 article-title: Biobjective robust simulation-based optimization for unconstrained problems publication-title: Eur. J. Oper. Res. doi: 10.1016/j.ejor.2021.08.040 – volume: 621 start-page: 596 year: 2023 ident: 10.1016/j.ins.2023.119067_b0165 article-title: Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.11.074 – volume: 87 year: 2019 ident: 10.1016/j.ins.2023.119067_b0075 article-title: Detection and mitigation of attacks on transportation networks as a multi-stage security game publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.101576 – year: 2011 ident: 10.1016/j.ins.2023.119067_b0195 – start-page: 67 year: 1978 ident: 10.1016/j.ins.2023.119067_b0190 – volume: 132 start-page: 44 year: 2020 ident: 10.1016/j.ins.2023.119067_b0100 article-title: Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks publication-title: Transp. Res. B Methodol. doi: 10.1016/j.trb.2019.01.020 – volume: 360 start-page: 841 issue: 2 year: 2023 ident: 10.1016/j.ins.2023.119067_b0155 article-title: Finite-Time sliding mode control for singularly perturbed PDE systems publication-title: J. Franklin Inst. doi: 10.1016/j.jfranklin.2022.11.037 – volume: 77 start-page: 678 year: 2019 ident: 10.1016/j.ins.2023.119067_b0240 article-title: Network-wide signal timing stochastic simulation optimization with environmental concerns publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2019.01.046 – ident: 10.1016/j.ins.2023.119067_b0055 doi: 10.1109/ICCPS.2016.7479122 – ident: 10.1016/j.ins.2023.119067_b0095 doi: 10.1109/NOMS47738.2020.9110349 – volume: 23 start-page: 6406 issue: 7 year: 2021 ident: 10.1016/j.ins.2023.119067_b0110 article-title: Security vulnerabilities and protection algorithms for backpressure-based traffic signal control at an isolated intersection publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2021.3056658 – volume: 8 start-page: 86149 year: 2020 ident: 10.1016/j.ins.2023.119067_b0045 article-title: Noticeability versus impact in traffic signal tampering publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2992536 – volume: 61 start-page: 33 year: 2017 ident: 10.1016/j.ins.2023.119067_b0080 article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2017.03.006 – volume: 17 start-page: 137 year: 2015 ident: 10.1016/j.ins.2023.119067_b0010 article-title: An emerging US (and world) threat: cities wide open to cyber attacks publication-title: Securing Smart Cities – ident: 10.1016/j.ins.2023.119067_b0050 – start-page: 453 year: 2014 ident: 10.1016/j.ins.2023.119067_b0220 – ident: 10.1016/j.ins.2023.119067_b0200 – ident: 10.1016/j.ins.2023.119067_b0185 – ident: 10.1016/j.ins.2023.119067_b0040 doi: 10.14722/autosec.2021.23005 – volume: 621 start-page: 248 year: 2023 ident: 10.1016/j.ins.2023.119067_b0160 article-title: Data-driven robust optimal control for nonlinear system with uncertain disturbances publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.11.092 – volume: 32 start-page: 565 issue: 3 year: 2020 ident: 10.1016/j.ins.2023.119067_b0145 article-title: Domination measure: a new metric for solving multiobjective optimization publication-title: INFORMS J. Comput. doi: 10.1287/ijoc.2019.0920 – ident: 10.1016/j.ins.2023.119067_b0210 – volume: 2672 start-page: 1 issue: 1 year: 2018 ident: 10.1016/j.ins.2023.119067_b0030 article-title: Vulnerability of traffic control system under cyberattacks with falsified data publication-title: Transp. Res. Rec. doi: 10.1177/0361198118756885 – volume: 14 start-page: 463 issue: 4 year: 2006 ident: 10.1016/j.ins.2023.119067_b0215 article-title: Introducing robustness in multi-objective optimization publication-title: Evol. Comput. doi: 10.1162/evco.2006.14.4.463 – volume: 13 start-page: 455 issue: 4 year: 1998 ident: 10.1016/j.ins.2023.119067_b0245 article-title: Efficient global optimization of expensive black-box functions publication-title: J. Glob. Optim. doi: 10.1023/A:1008306431147 – ident: 10.1016/j.ins.2023.119067_b0065 – volume: 58 start-page: 161 issue: 1 year: 2010 ident: 10.1016/j.ins.2023.119067_b0130 article-title: Robust optimization for unconstrained simulation-based problems publication-title: Oper. Res. doi: 10.1287/opre.1090.0715 – volume: 610 start-page: 674 year: 2022 ident: 10.1016/j.ins.2023.119067_b0120 article-title: Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.08.025 – volume: 122 start-page: 287 year: 2019 ident: 10.1016/j.ins.2023.119067_b0235 article-title: A stochastic simulation-based optimization method for equitable and efficient network-wide signal timing under uncertainties publication-title: Transp. Res. B Methodol. doi: 10.1016/j.trb.2019.03.001 – volume: 33 start-page: 115005 issue: 11 year: 2022 ident: 10.1016/j.ins.2023.119067_b0175 article-title: Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic publication-title: Meas. Sci. Technol. doi: 10.1088/1361-6501/ac8368 |
| SSID | ssj0004766 |
| Score | 2.4883056 |
| Snippet | Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 119067 |
| SubjectTerms | Bi-level model Biobjectives Cyberattacks Robust simulation-based optimization Traffic signal control |
| Title | Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks |
| URI | https://dx.doi.org/10.1016/j.ins.2023.119067 |
| Volume | 640 |
| WOSCitedRecordID | wos001048624100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6291 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004766 issn: 0020-0255 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZgy4EeUCmgtlDkA-LAylJqO2v7WKEiilCFUCtWXIJfabeFbJXNovbfM46dbCgPARKXKIriPDyfx9_Y80DomRETJXWuidVcEC69JsoLR_Y0sAlDYYaisdiEODqS06l6l6qiLtpyAqKq5NWVuvyvooZrIOwQOvsX4u4fChfgHIQORxA7HP9I8Ce1gTHb1DokhxgH_4w2BUj0SK_nZrloxnNQFF9SBOZYn-oZkMTx-9nigujgphG3FD7MgRlC7waH9msTki83ISB_SGdTMFP7mDSX9hz945mPeuQtIPB0tWIat3pmvaR9608Q7r5eDtcgKOudrNLCWBcc853vZmCiJJgscaqJ-lUKSiY0FujqFPAkJmz6QZnHdYVzsEBCXnXKQL2rLBbvuJEjO2w5t9YRGFTAqai4jdaoyJUcobX9w4Ppm1WorIjb1923dRvdrcvfjRf9nKoM6MfxBrqX7Aa8H-V9H93y1SZaH2ST3ES7KQYFP8cDueCkvR-gTy0ycEIGjsjACRk4IgMPkYETMvAAGRiQgVfIwENkPEQnrw6OX74mqcAGsVSJhjgnbZ475n2mHIxNBta31VYb6yZSe2840BvnDM-VhxEtXM61Nnu5pRljuTHsERpV88pvIVyWZca8LZU0kvPcaac5MFOqZcngNXIbZV1fFjZlnw9FUD4XnZvheQF_VITuL2L3b6MXfZPLmHrldzfzTkBFwnvkhAWg6dfNdv6t2WN0dzUMnqBRUy_9LrpjvzazRf00Ye4bl0aWNg |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Urban+traffic+signal+control+robust+optimization+against+Risk-averse+and+Worst-case+cyberattacks&rft.jtitle=Information+sciences&rft.au=Zheng%2C+Liang&rft.au=Bao%2C+Ji&rft.au=Mei%2C+Zhenyu&rft.date=2023-09-01&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.eissn=1872-6291&rft.volume=640&rft_id=info:doi/10.1016%2Fj.ins.2023.119067&rft.externalDocID=S0020025523006527 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon |