Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks

Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information sciences Jg. 640; S. 119067
Hauptverfasser: Zheng, Liang, Bao, Ji, Mei, Zhenyu
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Inc 01.09.2023
Schlagworte:
ISSN:0020-0255, 1872-6291
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective, the study develops two bi-level simulation-based optimization (SO) models and solves them using an improved biobjective robust simulation-based optimization (IBORSO) algorithm. The attack-defense process is formulated as a Stackelberg game, where the lower level attacker aims to find optimal attack plans to degrade traffic efficiency and safety indices, while the upper level defender adjusts the signal control plan to compensate for the effects of the attack on traffic efficiency and safety indices. The proposed approach is evaluated on an urban road network in Changsha, China. The results show that the developed robust signal control plans can withstand risk-averse and worst-case attacks and perform better than the counterpart ones in terms of biobjective performance. The proposed bi-level modeling framework and solution algorithm can be used to build robust traffic signal control systems that are resilient to cyberattacks.
AbstractList Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive countermeasure by designing robust signal control plans to mitigate the risks of worst-case and risk-averse cyberattacks. To achieve this objective, the study develops two bi-level simulation-based optimization (SO) models and solves them using an improved biobjective robust simulation-based optimization (IBORSO) algorithm. The attack-defense process is formulated as a Stackelberg game, where the lower level attacker aims to find optimal attack plans to degrade traffic efficiency and safety indices, while the upper level defender adjusts the signal control plan to compensate for the effects of the attack on traffic efficiency and safety indices. The proposed approach is evaluated on an urban road network in Changsha, China. The results show that the developed robust signal control plans can withstand risk-averse and worst-case attacks and perform better than the counterpart ones in terms of biobjective performance. The proposed bi-level modeling framework and solution algorithm can be used to build robust traffic signal control systems that are resilient to cyberattacks.
ArticleNumber 119067
Author Bao, Ji
Mei, Zhenyu
Zheng, Liang
Author_xml – sequence: 1
  givenname: Liang
  orcidid: 0000-0002-4161-9630
  surname: Zheng
  fullname: Zheng, Liang
  email: zhengliang@csu.edu.cn
  organization: School of Traffic & Transportation Engineering, Central South University, Changsha, China
– sequence: 2
  givenname: Ji
  surname: Bao
  fullname: Bao, Ji
  organization: School of Traffic & Transportation Engineering, Central South University, Changsha, China
– sequence: 3
  givenname: Zhenyu
  surname: Mei
  fullname: Mei, Zhenyu
  organization: Institute of Intelligent Transportation System, Zhejiang University, Hangzhou, China
BookMark eNp9kMtKQzEQhoMo2FYfwF1e4NRczi24kuINCoJYXMbJ5ZS0p0lJYqE-vafWlYuuhll8M___jdG5D94idEPJlBJa366mzqcpI4xPKRWkbs7QiLYNK2om6DkaEcJIQVhVXaJxSitCSNnU9Qh9LqICj3OErnMaJ7f00GMdfI6hxzGor5Rx2Ga3cd-QXfAYljC8yvjNpXUBOxuTxeAN_ggx5ULDsOq9shFyBr1OV-iigz7Z6785QYvHh_fZczF_fXqZ3c8LzUSTC2NaXVWGW0uEEYxz1goNGpQ2dQvWqpLXzBhVVsKKFhpTlQCKVpoRziul-AQ1x7s6hpSi7aR2-Tfx0M31khJ5ECVXckgvD6LkUdRA0n_kNroNxP1J5u7I2KHSztkok3bWa2tctDpLE9wJ-gc6lIYE
CitedBy_id crossref_primary_10_1111_mice_13354
crossref_primary_10_1177_00375497251331487
crossref_primary_10_1007_s10479_024_05963_0
crossref_primary_10_1016_j_trc_2024_104870
crossref_primary_10_1016_j_ins_2024_120805
crossref_primary_10_1093_tse_tdae002
crossref_primary_10_1109_TITS_2025_3538095
crossref_primary_10_1016_j_trc_2025_105116
crossref_primary_10_1016_j_cor_2025_107179
crossref_primary_10_1016_j_chaos_2025_116906
crossref_primary_10_1016_j_trc_2024_104838
Cites_doi 10.1109/TEVC.2003.810758
10.1016/j.trb.2020.07.002
10.1111/mice.12876
10.1287/ijoc.1090.0319
10.1016/j.conengprac.2020.104718
10.1016/j.ins.2021.08.010
10.1007/978-1-4419-6142-6_2
10.1109/TGCN.2022.3162649
10.1016/j.trb.2016.05.017
10.1287/ijoc.1110.0465
10.1287/trsc.2015.0661
10.1287/ijoc.2022.1196
10.1109/TDSC.2018.2883057
10.1016/j.ins.2022.07.010
10.1016/j.ejor.2021.08.040
10.1016/j.ins.2022.11.074
10.1016/j.cose.2019.101576
10.1016/j.trb.2019.01.020
10.1016/j.jfranklin.2022.11.037
10.1016/j.asoc.2019.01.046
10.1109/ICCPS.2016.7479122
10.1109/NOMS47738.2020.9110349
10.1109/TITS.2021.3056658
10.1109/ACCESS.2020.2992536
10.1016/j.adhoc.2017.03.006
10.14722/autosec.2021.23005
10.1016/j.ins.2022.11.092
10.1287/ijoc.2019.0920
10.1177/0361198118756885
10.1162/evco.2006.14.4.463
10.1023/A:1008306431147
10.1287/opre.1090.0715
10.1016/j.ins.2022.08.025
10.1016/j.trb.2019.03.001
10.1088/1361-6501/ac8368
ContentType Journal Article
Copyright 2023 Elsevier Inc.
Copyright_xml – notice: 2023 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.ins.2023.119067
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
EISSN 1872-6291
ExternalDocumentID 10_1016_j_ins_2023_119067
S0020025523006527
GroupedDBID --K
--M
--Z
-~X
.DC
.~1
0R~
1B1
1OL
1RT
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
AAYFN
ABAOU
ABBOA
ABEFU
ABFNM
ABJNI
ABMAC
ABTAH
ABUCO
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
KOM
LG9
LY1
M41
MHUIS
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SST
SSV
SSW
SSZ
T5K
TN5
TWZ
UHS
WH7
WUQ
XPP
YYP
ZMT
ZY4
~02
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c297t-dd8c55d3ee09d9233289cacabcd68aeeb4362ddb459e98a7d54aab15c20335bb3
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001048624100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0020-0255
IngestDate Tue Nov 18 21:12:24 EST 2025
Sat Nov 29 06:54:52 EST 2025
Fri Feb 23 02:36:52 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cyberattacks
Traffic signal control
Bi-level model
Biobjectives
Robust simulation-based optimization
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c297t-dd8c55d3ee09d9233289cacabcd68aeeb4362ddb459e98a7d54aab15c20335bb3
ORCID 0000-0002-4161-9630
ParticipantIDs crossref_citationtrail_10_1016_j_ins_2023_119067
crossref_primary_10_1016_j_ins_2023_119067
elsevier_sciencedirect_doi_10_1016_j_ins_2023_119067
PublicationCentury 2000
PublicationDate September 2023
2023-09-00
PublicationDateYYYYMMDD 2023-09-01
PublicationDate_xml – month: 09
  year: 2023
  text: September 2023
PublicationDecade 2020
PublicationTitle Information sciences
PublicationYear 2023
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Zheng, Bao, Xu, Tan (b0140) 2022; 299
A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin, X. Koutsoukos, Vulnerability of transportation networks to traffic-signal tampering, In Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems (2016) 1-10.
Tao, Cheng, Qiu, Stojanovic (b0175) 2022; 33
Z.A. Sabra, D. Gettman, R.D. Henry, V. Nallamothu, Balancing Safety and Capacity in an Adaptive Signal Control System–Phase 1 (No. FHWA-HRT-10-038), Federal Highway Administration, Washington, DC (2010).
S. Grad, Engineers who hacked into a traffic signal computer, jamming streets, sentenced. Los Angeles Times (2009).
Hale, Zhu, Zhou (b0145) 2020; 32
Laszka, Abbas, Vorobeychik, Koutsoukos (b0075) 2019; 87
M. Fellendorf, P. Vortisch, Microscopic traffic flow simulator VISSIM. In Fundamentals of traffic simulation, Springer, New York, NY (2010) 63-93.
Zhao, Du, Zhou, Tian (b0170) 2022; 608
Han, Zhang, Yang, Hou, Qiao (b0160) 2023; 621
Allen, Shin, Cooper (b0190) 1978
Tanınmış, Sinnl (b0125) 2022; 34
Deb, Gupta (b0215) 2006; 14
Jin, Chen, Zhang, Yuan, Wang (b0085) 2021; 579
Bertsimas, Nohadani, Teo (b0130) 2010; 58
.
M. Behrisch, L. Bieker, J. Erdmann, D. Krajzewicz, SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind (2011).
Dellino, Kleijnen, Meloni (b0230) 2012; 24
D. Estrin, Israeli road control hacked, shutting down Haifa highway. The spokesman-review (2013)
S. Bernstein, A. Blankstein, Key signals targeted officials say, Los Angeles Times (2007)
Thodi, Mulumba, Jabari (b0045) 2020; 8
Sakiz, Sen (b0080) 2017; 61
Zheng, Li (b0180) 2023; 38
S.E. Huang, W. Wong, Y.H. Feng, Q.A. Chen, Z.M. Mao, H.X. Liu, Impact evaluation of falsified data attacks on connected vehicle based traffic signal control, In NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec) (2021).
Zitzler, Thiele, Laumanns, Fonseca, Fonseca (b0225) 2003; 7
Bertsimas, Nohadani, Teo (b0135) 2010; 22
Zhang, Song, Song, Stojanovic (b0155) 2023; 360
Cerrudo (b0010) 2015; 17
Jones, Schonlau, Welch (b0245) 1998; 13
Ghafouri, Abbas, Vorobeychik, Koutsoukos (b0035) 2016
Lopez, Jin, Al Faruque (b0025) 2020; 139
Poudel, Munir (b0070) 2018; 18
T. Halabi, O.A. Wahab, M. Zulkernine, A game-theoretic approach for distributed attack mitigation in intelligent transportation systems, NOMS IEEE/IFIP Network Operations and Management Symposium (2020) 1-6.
He, Chen, Xiong, Zhu, Zhang (b0250) 2017; 51
A. Tuladhar, X. Ou, Understanding Security Issues in Vehicle Transportation Systems in a Holistic, Context-aware Manner (2019)
J. Hayward, Near Miss Determination Through Use of a Scale of Danger. Report TTSC-7115. The Pennsylvania State University, University Park (1972).
Li, Niu, Tian, Chen, Xie, Wu, Xiang, Tong, Baker, Liu (b0115) 2022; 6
He, Qi, Yan, Cheng, Shi (b0165) 2023; 621
Zhuang, Tao, Chen, Stojanovic, Paszke (b0150) 2022
Zheng, Xue, Xu, Ran (b0235) 2019; 122
Liu, Yang (b0120) 2022; 610
Reilly, Martin, Payer, Bayen (b0060) 2016; 91
Dijkstra (b0195) 2011
Feng, Huang, Chen, Liu, Mao (b0030) 2018; 2672
B. Ghena, W. Beyer, A, Hillaker, J. Pevarnek, J.A. Halderman, Green lights forever: analyzing the security of traffic infrastructure, The 8th USENIX Workshop on Offensive Technologies (2014) 7.
Santiago, Huacuja, Dorronsoro, Pecero, Santillan, Barbosa, Monterrubio (b0220) 2014
M. Wu, S. Amin, Security of transportation networks: modeling attacker-defender interaction, arXiv:1804.00391 (2018) https://arxiv.org/abs/1804.00391v1.
Mercader, Haddad (b0105) 2021; 109
Haddad, Mirkin (b0100) 2020; 132
Zheng, Xu, Jin, Ran (b0240) 2019; 77
Yen, Ghosal, Zhang, Chuah (b0110) 2021; 23
10.1016/j.ins.2023.119067_b0065
10.1016/j.ins.2023.119067_b0020
10.1016/j.ins.2023.119067_b0185
Ghafouri (10.1016/j.ins.2023.119067_b0035) 2016
Deb (10.1016/j.ins.2023.119067_b0215) 2006; 14
Dellino (10.1016/j.ins.2023.119067_b0230) 2012; 24
Santiago (10.1016/j.ins.2023.119067_b0220) 2014
Yen (10.1016/j.ins.2023.119067_b0110) 2021; 23
Tanınmış (10.1016/j.ins.2023.119067_b0125) 2022; 34
Zhang (10.1016/j.ins.2023.119067_b0155) 2023; 360
Dijkstra (10.1016/j.ins.2023.119067_b0195) 2011
Zheng (10.1016/j.ins.2023.119067_b0140) 2022; 299
Han (10.1016/j.ins.2023.119067_b0160) 2023; 621
Lopez (10.1016/j.ins.2023.119067_b0025) 2020; 139
Liu (10.1016/j.ins.2023.119067_b0120) 2022; 610
Bertsimas (10.1016/j.ins.2023.119067_b0130) 2010; 58
Laszka (10.1016/j.ins.2023.119067_b0075) 2019; 87
Zheng (10.1016/j.ins.2023.119067_b0240) 2019; 77
He (10.1016/j.ins.2023.119067_b0250) 2017; 51
10.1016/j.ins.2023.119067_b0200
10.1016/j.ins.2023.119067_b0005
Feng (10.1016/j.ins.2023.119067_b0030) 2018; 2672
Allen (10.1016/j.ins.2023.119067_b0190) 1978
10.1016/j.ins.2023.119067_b0040
Thodi (10.1016/j.ins.2023.119067_b0045) 2020; 8
Zhao (10.1016/j.ins.2023.119067_b0170) 2022; 608
Haddad (10.1016/j.ins.2023.119067_b0100) 2020; 132
Cerrudo (10.1016/j.ins.2023.119067_b0010) 2015; 17
10.1016/j.ins.2023.119067_b0205
Mercader (10.1016/j.ins.2023.119067_b0105) 2021; 109
Zhuang (10.1016/j.ins.2023.119067_b0150) 2022
Zheng (10.1016/j.ins.2023.119067_b0235) 2019; 122
10.1016/j.ins.2023.119067_b0210
10.1016/j.ins.2023.119067_b0055
Bertsimas (10.1016/j.ins.2023.119067_b0135) 2010; 22
Sakiz (10.1016/j.ins.2023.119067_b0080) 2017; 61
Jin (10.1016/j.ins.2023.119067_b0085) 2021; 579
Zheng (10.1016/j.ins.2023.119067_b0180) 2023; 38
10.1016/j.ins.2023.119067_b0015
10.1016/j.ins.2023.119067_b0090
Tao (10.1016/j.ins.2023.119067_b0175) 2022; 33
10.1016/j.ins.2023.119067_b0050
Jones (10.1016/j.ins.2023.119067_b0245) 1998; 13
10.1016/j.ins.2023.119067_b0095
Hale (10.1016/j.ins.2023.119067_b0145) 2020; 32
Reilly (10.1016/j.ins.2023.119067_b0060) 2016; 91
Poudel (10.1016/j.ins.2023.119067_b0070) 2018; 18
Li (10.1016/j.ins.2023.119067_b0115) 2022; 6
He (10.1016/j.ins.2023.119067_b0165) 2023; 621
Zitzler (10.1016/j.ins.2023.119067_b0225) 2003; 7
References_xml – reference: D. Estrin, Israeli road control hacked, shutting down Haifa highway. The spokesman-review (2013)
– reference: B. Ghena, W. Beyer, A, Hillaker, J. Pevarnek, J.A. Halderman, Green lights forever: analyzing the security of traffic infrastructure, The 8th USENIX Workshop on Offensive Technologies (2014) 7.
– reference: M. Behrisch, L. Bieker, J. Erdmann, D. Krajzewicz, SUMO–simulation of urban mobility: an overview. In Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind (2011).
– volume: 299
  start-page: 249
  year: 2022
  end-page: 262
  ident: b0140
  article-title: Biobjective robust simulation-based optimization for unconstrained problems
  publication-title: Eur. J. Oper. Res.
– volume: 132
  start-page: 44
  year: 2020
  end-page: 59
  ident: b0100
  article-title: Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks
  publication-title: Transp. Res. B Methodol.
– start-page: 1
  year: 2022
  end-page: 13
  ident: b0150
  article-title: An optimal iterative learning control approach for linear systems with nonuniform trial lengths under input constraints
  publication-title: IEEE Trans. Syst. Man Cybernet.: Syst.
– volume: 6
  start-page: 1448
  year: 2022
  end-page: 1458
  ident: b0115
  article-title: Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation
  publication-title: IEEE Trans. Green Commun. Netw.
– volume: 77
  start-page: 678
  year: 2019
  end-page: 687
  ident: b0240
  article-title: Network-wide signal timing stochastic simulation optimization with environmental concerns
  publication-title: Appl. Soft Comput.
– year: 2011
  ident: b0195
  article-title: En route to safer roads: How road structure and road classification can affect road safety
– start-page: 67
  year: 1978
  end-page: 74
  ident: b0190
  article-title: Analysis of Traffic Conflicts and Collisions. Transportation Research Record 667
– volume: 579
  start-page: 814
  year: 2021
  end-page: 831
  ident: b0085
  article-title: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning
  publication-title: Inf. Sci.
– volume: 38
  start-page: 640
  year: 2023
  end-page: 659
  ident: b0180
  article-title: Simulation-based optimization method for arterial signal control considering traffic safety and efficiency under uncertainties
  publication-title: Comput. Aided Civ. Inf. Eng.
– volume: 58
  start-page: 161
  year: 2010
  end-page: 178
  ident: b0130
  article-title: Robust optimization for unconstrained simulation-based problems
  publication-title: Oper. Res.
– volume: 18
  start-page: 235
  year: 2018
  end-page: 252
  ident: b0070
  article-title: Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 109
  year: 2021
  ident: b0105
  article-title: Resilient multivariable perimeter control of urban road networks under cyberattacks
  publication-title: Control Eng. Pract.
– volume: 34
  start-page: 2634
  year: 2022
  end-page: 2657
  ident: b0125
  article-title: A branch-and-cut algorithm for submodular interdiction games
  publication-title: INFORMS J. Comput.
– volume: 13
  start-page: 455
  year: 1998
  end-page: 492
  ident: b0245
  article-title: Efficient global optimization of expensive black-box functions
  publication-title: J. Glob. Optim.
– volume: 122
  start-page: 287
  year: 2019
  end-page: 308
  ident: b0235
  article-title: A stochastic simulation-based optimization method for equitable and efficient network-wide signal timing under uncertainties
  publication-title: Transp. Res. B Methodol.
– reference: M. Fellendorf, P. Vortisch, Microscopic traffic flow simulator VISSIM. In Fundamentals of traffic simulation, Springer, New York, NY (2010) 63-93.
– volume: 51
  start-page: 412
  year: 2017
  end-page: 426
  ident: b0250
  article-title: Optimal time-varying pricing for toll roads under multiple objectives: a simulation-based optimization approach
  publication-title: Transp. Sci.
– volume: 87
  year: 2019
  ident: b0075
  article-title: Detection and mitigation of attacks on transportation networks as a multi-stage security game
  publication-title: Comput. Secur.
– volume: 608
  start-page: 1245
  year: 2022
  end-page: 1260
  ident: b0170
  article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks
  publication-title: Inf. Sci.
– volume: 621
  start-page: 248
  year: 2023
  end-page: 264
  ident: b0160
  article-title: Data-driven robust optimal control for nonlinear system with uncertain disturbances
  publication-title: Inf. Sci.
– volume: 610
  start-page: 674
  year: 2022
  end-page: 693
  ident: b0120
  article-title: Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
  publication-title: Inf. Sci.
– volume: 33
  start-page: 115005
  year: 2022
  ident: b0175
  article-title: Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic
  publication-title: Meas. Sci. Technol.
– reference: M. Wu, S. Amin, Security of transportation networks: modeling attacker-defender interaction, arXiv:1804.00391 (2018) https://arxiv.org/abs/1804.00391v1.
– volume: 23
  start-page: 6406
  year: 2021
  end-page: 6417
  ident: b0110
  article-title: Security vulnerabilities and protection algorithms for backpressure-based traffic signal control at an isolated intersection
  publication-title: IEEE Trans. Intell. Transp. Syst.
– volume: 14
  start-page: 463
  year: 2006
  end-page: 494
  ident: b0215
  article-title: Introducing robustness in multi-objective optimization
  publication-title: Evol. Comput.
– reference: A. Tuladhar, X. Ou, Understanding Security Issues in Vehicle Transportation Systems in a Holistic, Context-aware Manner (2019)
– reference: S. Grad, Engineers who hacked into a traffic signal computer, jamming streets, sentenced. Los Angeles Times (2009).
– volume: 17
  start-page: 137
  year: 2015
  end-page: 151
  ident: b0010
  article-title: An emerging US (and world) threat: cities wide open to cyber attacks
  publication-title: Securing Smart Cities
– reference: Z.A. Sabra, D. Gettman, R.D. Henry, V. Nallamothu, Balancing Safety and Capacity in an Adaptive Signal Control System–Phase 1 (No. FHWA-HRT-10-038), Federal Highway Administration, Washington, DC (2010).
– volume: 32
  start-page: 565
  year: 2020
  end-page: 581
  ident: b0145
  article-title: Domination measure: a new metric for solving multiobjective optimization
  publication-title: INFORMS J. Comput.
– volume: 91
  start-page: 366
  year: 2016
  end-page: 382
  ident: b0060
  article-title: Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security
  publication-title: Transp. Res. B Methodol.
– volume: 139
  start-page: 473
  year: 2020
  end-page: 495
  ident: b0025
  article-title: Security analysis for fixed-time traffic control systems
  publication-title: Transp. Res. B Methodol.
– reference: S.E. Huang, W. Wong, Y.H. Feng, Q.A. Chen, Z.M. Mao, H.X. Liu, Impact evaluation of falsified data attacks on connected vehicle based traffic signal control, In NDSS Workshop on Automotive and Autonomous Vehicle Security (AutoSec) (2021).
– reference: S. Bernstein, A. Blankstein, Key signals targeted officials say, Los Angeles Times (2007)
– start-page: 453
  year: 2014
  end-page: 465
  ident: b0220
  article-title: A survey of decomposition methods for multi-objective optimization, recent advances on hybrid approaches for designing intelligent systems
– volume: 8
  start-page: 86149
  year: 2020
  end-page: 86161
  ident: b0045
  article-title: Noticeability versus impact in traffic signal tampering
  publication-title: IEEE Access
– volume: 360
  start-page: 841
  year: 2023
  end-page: 861
  ident: b0155
  article-title: Finite-Time sliding mode control for singularly perturbed PDE systems
  publication-title: J. Franklin Inst.
– reference: J. Hayward, Near Miss Determination Through Use of a Scale of Danger. Report TTSC-7115. The Pennsylvania State University, University Park (1972).
– reference: A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin, X. Koutsoukos, Vulnerability of transportation networks to traffic-signal tampering, In Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems (2016) 1-10.
– reference: .
– reference: T. Halabi, O.A. Wahab, M. Zulkernine, A game-theoretic approach for distributed attack mitigation in intelligent transportation systems, NOMS IEEE/IFIP Network Operations and Management Symposium (2020) 1-6.
– start-page: 130
  year: 2016
  end-page: 135
  ident: b0035
  article-title: Vulnerability of fixed-time control of signalized intersections to cyber-tampering
  publication-title: Resilience Week (RWS)
– volume: 621
  start-page: 596
  year: 2023
  end-page: 610
  ident: b0165
  article-title: Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks
  publication-title: Inf. Sci.
– volume: 22
  start-page: 44
  year: 2010
  end-page: 58
  ident: b0135
  article-title: Nonconvex robust optimization for problems with constraints
  publication-title: INFORMS J. Comput.
– volume: 24
  start-page: 471
  year: 2012
  end-page: 484
  ident: b0230
  article-title: Robust optimization in simulation: Taguchi and Krige combined
  publication-title: INFORMS J. Comput.
– volume: 2672
  start-page: 1
  year: 2018
  end-page: 11
  ident: b0030
  article-title: Vulnerability of traffic control system under cyberattacks with falsified data
  publication-title: Transp. Res. Rec.
– volume: 7
  start-page: 117
  year: 2003
  end-page: 132
  ident: b0225
  article-title: Performance assessment of multiobjective optimizers: an analysis and review
  publication-title: IEEE Trans. Evol. Comput.
– volume: 61
  start-page: 33
  year: 2017
  end-page: 50
  ident: b0080
  article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
  publication-title: Ad Hoc Netw.
– volume: 7
  start-page: 117
  issue: 2
  year: 2003
  ident: 10.1016/j.ins.2023.119067_b0225
  article-title: Performance assessment of multiobjective optimizers: an analysis and review
  publication-title: IEEE Trans. Evol. Comput.
  doi: 10.1109/TEVC.2003.810758
– volume: 139
  start-page: 473
  year: 2020
  ident: 10.1016/j.ins.2023.119067_b0025
  article-title: Security analysis for fixed-time traffic control systems
  publication-title: Transp. Res. B Methodol.
  doi: 10.1016/j.trb.2020.07.002
– volume: 38
  start-page: 640
  issue: 5
  year: 2023
  ident: 10.1016/j.ins.2023.119067_b0180
  article-title: Simulation-based optimization method for arterial signal control considering traffic safety and efficiency under uncertainties
  publication-title: Comput. Aided Civ. Inf. Eng.
  doi: 10.1111/mice.12876
– volume: 22
  start-page: 44
  issue: 1
  year: 2010
  ident: 10.1016/j.ins.2023.119067_b0135
  article-title: Nonconvex robust optimization for problems with constraints
  publication-title: INFORMS J. Comput.
  doi: 10.1287/ijoc.1090.0319
– volume: 109
  year: 2021
  ident: 10.1016/j.ins.2023.119067_b0105
  article-title: Resilient multivariable perimeter control of urban road networks under cyberattacks
  publication-title: Control Eng. Pract.
  doi: 10.1016/j.conengprac.2020.104718
– ident: 10.1016/j.ins.2023.119067_b0020
– volume: 579
  start-page: 814
  year: 2021
  ident: 10.1016/j.ins.2023.119067_b0085
  article-title: Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.08.010
– ident: 10.1016/j.ins.2023.119067_b0090
– ident: 10.1016/j.ins.2023.119067_b0205
  doi: 10.1007/978-1-4419-6142-6_2
– volume: 6
  start-page: 1448
  issue: 3
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0115
  article-title: Multiagent reinforcement learning-based signal planning for resisting congestion attack in green transportation
  publication-title: IEEE Trans. Green Commun. Netw.
  doi: 10.1109/TGCN.2022.3162649
– volume: 91
  start-page: 366
  year: 2016
  ident: 10.1016/j.ins.2023.119067_b0060
  article-title: Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security
  publication-title: Transp. Res. B Methodol.
  doi: 10.1016/j.trb.2016.05.017
– ident: 10.1016/j.ins.2023.119067_b0005
– volume: 24
  start-page: 471
  issue: 3
  year: 2012
  ident: 10.1016/j.ins.2023.119067_b0230
  article-title: Robust optimization in simulation: Taguchi and Krige combined
  publication-title: INFORMS J. Comput.
  doi: 10.1287/ijoc.1110.0465
– ident: 10.1016/j.ins.2023.119067_b0015
– volume: 51
  start-page: 412
  issue: 2
  year: 2017
  ident: 10.1016/j.ins.2023.119067_b0250
  article-title: Optimal time-varying pricing for toll roads under multiple objectives: a simulation-based optimization approach
  publication-title: Transp. Sci.
  doi: 10.1287/trsc.2015.0661
– volume: 34
  start-page: 2634
  issue: 5
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0125
  article-title: A branch-and-cut algorithm for submodular interdiction games
  publication-title: INFORMS J. Comput.
  doi: 10.1287/ijoc.2022.1196
– start-page: 130
  year: 2016
  ident: 10.1016/j.ins.2023.119067_b0035
  article-title: Vulnerability of fixed-time control of signalized intersections to cyber-tampering
  publication-title: Resilience Week (RWS)
– volume: 18
  start-page: 235
  issue: 1
  year: 2018
  ident: 10.1016/j.ins.2023.119067_b0070
  article-title: Design and evaluation of a reconfigurable ecu architecture for secure and dependable automotive cps
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2018.2883057
– start-page: 1
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0150
  article-title: An optimal iterative learning control approach for linear systems with nonuniform trial lengths under input constraints
  publication-title: IEEE Trans. Syst. Man Cybernet.: Syst.
– volume: 608
  start-page: 1245
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0170
  article-title: Anti-saturation resilient control of cyber-physical systems under actuator attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.07.010
– volume: 299
  start-page: 249
  issue: 1
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0140
  article-title: Biobjective robust simulation-based optimization for unconstrained problems
  publication-title: Eur. J. Oper. Res.
  doi: 10.1016/j.ejor.2021.08.040
– volume: 621
  start-page: 596
  year: 2023
  ident: 10.1016/j.ins.2023.119067_b0165
  article-title: Adaptive fuzzy resilient control for switched systems with state constraints under deception attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.11.074
– volume: 87
  year: 2019
  ident: 10.1016/j.ins.2023.119067_b0075
  article-title: Detection and mitigation of attacks on transportation networks as a multi-stage security game
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.101576
– year: 2011
  ident: 10.1016/j.ins.2023.119067_b0195
– start-page: 67
  year: 1978
  ident: 10.1016/j.ins.2023.119067_b0190
– volume: 132
  start-page: 44
  year: 2020
  ident: 10.1016/j.ins.2023.119067_b0100
  article-title: Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks
  publication-title: Transp. Res. B Methodol.
  doi: 10.1016/j.trb.2019.01.020
– volume: 360
  start-page: 841
  issue: 2
  year: 2023
  ident: 10.1016/j.ins.2023.119067_b0155
  article-title: Finite-Time sliding mode control for singularly perturbed PDE systems
  publication-title: J. Franklin Inst.
  doi: 10.1016/j.jfranklin.2022.11.037
– volume: 77
  start-page: 678
  year: 2019
  ident: 10.1016/j.ins.2023.119067_b0240
  article-title: Network-wide signal timing stochastic simulation optimization with environmental concerns
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2019.01.046
– ident: 10.1016/j.ins.2023.119067_b0055
  doi: 10.1109/ICCPS.2016.7479122
– ident: 10.1016/j.ins.2023.119067_b0095
  doi: 10.1109/NOMS47738.2020.9110349
– volume: 23
  start-page: 6406
  issue: 7
  year: 2021
  ident: 10.1016/j.ins.2023.119067_b0110
  article-title: Security vulnerabilities and protection algorithms for backpressure-based traffic signal control at an isolated intersection
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2021.3056658
– volume: 8
  start-page: 86149
  year: 2020
  ident: 10.1016/j.ins.2023.119067_b0045
  article-title: Noticeability versus impact in traffic signal tampering
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2992536
– volume: 61
  start-page: 33
  year: 2017
  ident: 10.1016/j.ins.2023.119067_b0080
  article-title: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2017.03.006
– volume: 17
  start-page: 137
  year: 2015
  ident: 10.1016/j.ins.2023.119067_b0010
  article-title: An emerging US (and world) threat: cities wide open to cyber attacks
  publication-title: Securing Smart Cities
– ident: 10.1016/j.ins.2023.119067_b0050
– start-page: 453
  year: 2014
  ident: 10.1016/j.ins.2023.119067_b0220
– ident: 10.1016/j.ins.2023.119067_b0200
– ident: 10.1016/j.ins.2023.119067_b0185
– ident: 10.1016/j.ins.2023.119067_b0040
  doi: 10.14722/autosec.2021.23005
– volume: 621
  start-page: 248
  year: 2023
  ident: 10.1016/j.ins.2023.119067_b0160
  article-title: Data-driven robust optimal control for nonlinear system with uncertain disturbances
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.11.092
– volume: 32
  start-page: 565
  issue: 3
  year: 2020
  ident: 10.1016/j.ins.2023.119067_b0145
  article-title: Domination measure: a new metric for solving multiobjective optimization
  publication-title: INFORMS J. Comput.
  doi: 10.1287/ijoc.2019.0920
– ident: 10.1016/j.ins.2023.119067_b0210
– volume: 2672
  start-page: 1
  issue: 1
  year: 2018
  ident: 10.1016/j.ins.2023.119067_b0030
  article-title: Vulnerability of traffic control system under cyberattacks with falsified data
  publication-title: Transp. Res. Rec.
  doi: 10.1177/0361198118756885
– volume: 14
  start-page: 463
  issue: 4
  year: 2006
  ident: 10.1016/j.ins.2023.119067_b0215
  article-title: Introducing robustness in multi-objective optimization
  publication-title: Evol. Comput.
  doi: 10.1162/evco.2006.14.4.463
– volume: 13
  start-page: 455
  issue: 4
  year: 1998
  ident: 10.1016/j.ins.2023.119067_b0245
  article-title: Efficient global optimization of expensive black-box functions
  publication-title: J. Glob. Optim.
  doi: 10.1023/A:1008306431147
– ident: 10.1016/j.ins.2023.119067_b0065
– volume: 58
  start-page: 161
  issue: 1
  year: 2010
  ident: 10.1016/j.ins.2023.119067_b0130
  article-title: Robust optimization for unconstrained simulation-based problems
  publication-title: Oper. Res.
  doi: 10.1287/opre.1090.0715
– volume: 610
  start-page: 674
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0120
  article-title: Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.08.025
– volume: 122
  start-page: 287
  year: 2019
  ident: 10.1016/j.ins.2023.119067_b0235
  article-title: A stochastic simulation-based optimization method for equitable and efficient network-wide signal timing under uncertainties
  publication-title: Transp. Res. B Methodol.
  doi: 10.1016/j.trb.2019.03.001
– volume: 33
  start-page: 115005
  issue: 11
  year: 2022
  ident: 10.1016/j.ins.2023.119067_b0175
  article-title: Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic
  publication-title: Meas. Sci. Technol.
  doi: 10.1088/1361-6501/ac8368
SSID ssj0004766
Score 2.4883802
Snippet Ensuring the cybersecurity of urban traffic signal control systems has become increasingly important in the digital age. This study proposes a passive...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 119067
SubjectTerms Bi-level model
Biobjectives
Cyberattacks
Robust simulation-based optimization
Traffic signal control
Title Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks
URI https://dx.doi.org/10.1016/j.ins.2023.119067
Volume 640
WOSCitedRecordID wos001048624100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6291
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004766
  issn: 0020-0255
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELeg4wEe0BggNhjyA-KBylKXxLH9OKGhbZomhDZR8RL8ldEB6ZSm0_bfcxc7aRgfAiReoiqK09b38_nufPc7Ql7AFu54CQupLMucZU6WTCrusQokT0tYUHynLRQ-EsfHcjpVb2NX1EXbTkBUlby6Uhf_VdRwD4SNpbN_Ie7-pXADPoPQ4Qpih-sfCf60NrBmm1ojOcQY8zNaCpCQkV7PzXLRjOegKL7GCsyxPtMzMBLH72aLz0xjmkY4Ung_B8uQWY0J7dcGyZcbLMgfmrOxmKl9TdxLexv9wycf9MgRIPBsFTENRz2zXtK-zSfAp6-XwxhEkvZJVjEw1hXHfJe7iZYoQ5clbDVBv0qRsDwJDbo6BZwHwqYflHmIK5yDB4K86kkK6l1NQvOOGxzZeOTcekfgUIFNlYjbZC0RXMkRWds92JserkplRTi-7n5bd9Ddpvzd-KKfmyoD8-NkndyPfgPdDfJ-QG75aoPcG7BJbpDtWINCX9KBXGjU3g_JxxYZNCKDBmTQiAwakEGHyKARGXSADArIoCtk0CEyHpHTN3snr_dZbLDBbKJEw5yTlnOXej9RDiz9FLxvq6021uVSe28yMG-cMxlXXkktHM-0NjvcJpM05cakj8momlf-CaEceQm500Jrixx8khvpHYYTwOEvE79JJt1cFjayz2MTlC9Fl2Z4XsA_KnD6izD9m-RVP-QiUK_87uGsE1AR8R5swgLQ9OthW_827Cm5u1oGz8ioqZd-m9yxl81sUT-PmPsGrXSVlg
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Urban+traffic+signal+control+robust+optimization+against+Risk-averse+and+Worst-case+cyberattacks&rft.jtitle=Information+sciences&rft.au=Zheng%2C+Liang&rft.au=Bao%2C+Ji&rft.au=Mei%2C+Zhenyu&rft.date=2023-09-01&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.eissn=1872-6291&rft.volume=640&rft_id=info:doi/10.1016%2Fj.ins.2023.119067&rft.externalDocID=S0020025523006527
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon