A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory

被引:1
作者
Pan, Ke [1 ]
Wang, Li [1 ]
Zhang, Lingyu [1 ]
Jimenez, Felipe
机构
[1] North China Univ Technol, Beijing Key Lab Urban Intelligent Control Technol, Beijing 100144, Peoples R China
关键词
evolutionary game theory; urban traffic control; information security;
D O I
10.3390/electronics12234856
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been significant development in intelligent technologies for urban traffic control, such as smart city and vehicle-to-everything (V2X) communication. These advancements aim to provide more efficient and convenient services to participants in urban transportation. As the urban traffic control (UTC) system integrates with various networks and physical infrastructure, the potential threats of malicious attacks and breaches pose significant risks to the safety of individuals and their properties. To address this issue, this academic paper focuses on studying the network structure of the UTC system. A signal security game model is constructed based on the concepts of evolutionary game theory (EGT), involving three parties: attackers, upper computers (UC), and traffic signal machines (TSM). The model aims to analyze the evolutionary stability of the strategies chosen by each party, and to explore the relationships between various factors and the strategy choices of the three parties. Furthermore, the stability of equilibrium points in the three-party game system is analyzed using the Liapunov method. The conditions in which UC and TSM, dependent on detection rates and defense costs, choose to abandon defense at pure-strategy equilibrium points were obtained. Finally, MATLAB is utilized for simulation analysis to validate the impact of attack costs, defense costs, and detection rates on the information security of UTC systems.
引用
收藏
页数:13
相关论文
共 24 条
  • [1] Applications of evolutionary game theory in urban road transport network: A state of the art review
    Ahmad, Furkan
    Shah, Zubair
    Al-Fagih, Luluwah
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2023, 98
  • [2] [Anonymous], 2005, International Journal of Information Security
  • [3] Chungang Gao, 2021, Journal of Physics: Conference Series, V1812, DOI 10.1088/1742-6596/1812/1/012039
  • [4] Ghena B., 2014, PROC 8 USENIX WORKSH
  • [5] Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks
    Haddad, Jack
    Mirkin, Boris
    [J]. TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2020, 132 (132) : 44 - 59
  • [6] Hewett R., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference, P109
  • [7] Khalil H. K., 1996, NONLINEAR SYSTEMS
  • [8] Investigating Cybersecurity Issues in Active Traffic Management Systems
    Khattak, Zulqarnain H.
    Park, Hyungjun
    Hong, Seongah
    Boateng, Richard Atta
    Smith, Brian L.
    [J]. TRANSPORTATION RESEARCH RECORD, 2018, 2672 (19) : 79 - 90
  • [9] Assessing and mitigating cybersecurity risks of traffic light systems in smart citiesInspec keywordsOther keywords
    Li, Zhiyi
    Jin, Dong
    Hannon, Christopher
    Shahidehpour, Mohammad
    Wang, Jianhui
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) : 60 - 69
  • [10] Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack
    Mairaj, Aakif
    Javaid, Ahmad Y.
    [J]. COMPUTER NETWORKS, 2022, 211