A Cross-Layer Defense Scheme for Edge Intelligence-Enabled CBTC Systems Against MitM Attacks

被引:56
作者
Li, Yang [1 ]
Zhu, Li [1 ]
Wang, Hongwei [2 ]
Yu, F. Richard [3 ]
Liu, Shichao [4 ]
机构
[1] Beijing Jiaotong Univ, State Key Lab Rail Traff Control & Safety, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Natl Res Ctr Railway Safety Assessment, Beijing 100044, Peoples R China
[3] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[4] Carleton Univ, Dept Elect, Ottawa, ON K1S 5B6, Canada
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Servers; Control systems; Safety; Computers; Rails; Intrusion detection; Image edge detection; CBTC; edge intelligence; MitM attacks; cross-layer defense scheme; TRAIN CONTROL-SYSTEMS; PERFORMANCE; INTERNET; DESIGN; GAME;
D O I
10.1109/TITS.2020.3030496
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
While communication-based train control (CBTC) systems play a crucial role in the efficient and reliable operation of urban rail transits, its high penetration level of communication networks opens doors to Man-in-the-Middle (MitM) attacks. Current researches regarding MitM attacks do not consider the characteristics of CBTC systems. Particularly, the limited computing capability of the on-board computers prevents the direct implementation of most existing intrusion detection and defense algorithms against the MitM attack. In order to tackle this dilemma, in this article, we first introduce edge intelligence (EI) into CBTC systems to enhance the computing capability of the system. A cross-layer defense scheme, which includes the detection and defense stages, are proposed next. For the cross-layer detection stage, we propose a Long Short-Term Memory (LSTM) and Support Vector Machine (SVM) based detection method to combine the detection probability calculated from the train control parameter sequence and operation log files. For the cross-layer defense stage, we construct a Bayesian game based defense model to derive the optimal defense policy against MitM attacks. To further improve the accuracy of the defense scheme as well as optimize the communication resource allocation scheme, we propose an optimal communication resource allocation scheme based on the Asynchronous Advantage Actor-Critic (A3C) algorithm at last. Extensive simulation results show that the proposed scheme achieves excellent performance in defending against MitM attacks.
引用
收藏
页码:2286 / 2298
页数:13
相关论文
共 39 条
  • [1] Mobile Edge Computing: A Survey
    Abbas, Nasir
    Zhang, Yan
    Taherkordi, Amir
    Skeie, Tor
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 450 - 465
  • [2] [Anonymous], 2011, Security NIST Special Publication
  • [3] Bastow M. D, 2014, CYBER SECURITY RAILW
  • [4] Decentralized Computation Offloading Game for Mobile Cloud Computing
    Chen, Xu
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 974 - 983
  • [5] Clayton M., 2011, CHRISTIAN SCI MONITO, V18, P1
  • [6] ARTIFICIAL INTELLIGENCE EMPOWERED EDGE COMPUTING AND CACHING FOR INTERNET OF VEHICLES
    Dai, Yueyue
    Xu, Du
    Maharjan, Sabita
    Qiao, Guanhua
    Zhang, Yan
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) : 12 - 18
  • [7] A survey on security control and attack detection for industrial cyber-physical systems
    Ding, Derui
    Han, Qing-Long
    Xiang, Yang
    Ge, Xiaohua
    Zhang, Xian-Ming
    [J]. NEUROCOMPUTING, 2018, 275 : 1674 - 1683
  • [8] Detection of Man-in-the-Middle Attacks on Industrial Control Networks
    Eigner, Oliver
    Kreimel, Philipp
    Tavolato, Paul
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2016, : 64 - 69
  • [9] Ge H, 2017, CHIN CONTR CONF, P4266, DOI 10.23919/ChiCC.2017.8028028
  • [10] Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
    Glass, Stephen
    Muthukkumurasamy, Vallipuram
    Portmann, Marius
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 530 - +