Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection

AI-generated keywords: Compromised ACC Mixed-Autonomy Traffic Random Deceleration Attacks Anomaly Detection Real-world Feasibility

AI-generated Key Points

  • The paper presents a study on the impact of compromised adaptive cruise control (ACC) vehicles on mixed-autonomy traffic performance.
  • Supply-chain level compromise of ACC capability can significantly degrade system-level performance, causing congestion waves that decrease average speed and network throughput.
  • Random deceleration attacks (RDAs) can have varying effects depending on underlying traffic congestion levels and what percentage of ACC vehicles can be compromised.
  • In moderate congestion regimes, mean commuter speed can be degraded by over 7%, while overall network throughput can be reduced by up to 3% in high-density regimes. Commuters may also incur costs exceeding 300 USD/km hr in moderate to high congestion regimes.
  • Anomaly detection technique using GPS traces is unable to distinguish between compromised ACCs and benign/normal drivers, making these attacks stealthy to detection.
  • Stronger attacks can be accurately labeled as malicious, indicating that there is a limit to how impactful attacks can be before they are no longer stealthy.
  • RDA attack was experimentally executed on a real commercially available ACC vehicle demonstrating its possible real-world feasibility.
  • Findings highlight potential vulnerabilities in current mixed-autonomy traffic systems and underscore the need for improved security measures at both supply-chain and system levels.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel Work

License: CC BY 4.0

Abstract: We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy freeway networks. Via a simple threat model which causes random deceleration attacks (RDAs), compromised vehicles create congestion waves in the traffic that decrease average speed and network throughput. We use a detailed and realistic traffic simulation environment to quantify the impacts of the attack on a model of a real high-volume freeway in the United States. We find that the effect of the attack depends both on the level of underlying traffic congestion, and what percentage of ACC vehicles can be compromised. In moderate congestion regimes the attack can degrade mean commuter speed by over 7%. In high density regimes overall network throughput can be reduced by up to 3%. And, in moderate to high congestion regimes, it can cost commuters on the network over 300 USD/km hr. All of these results motivate that the proposed attack is able to significantly degrade performance of the traffic network. We also develop an anomaly detection technique that uses GPS traces on vehicles to identify malicious/compromised vehicles. We employ this technique on data from the simulation experiments and find that it is unable to identify compromised ACCs compared to benign/normal drivers. That is, these attacks are stealthy to detection. Stronger attacks can be accurately labeled as malicious, motivating that there is a limit to how impactful attacks can be before they are no longer stealthy. Finally, we experimentally execute the attack on a real and commercially available ACC vehicle, demonstrating the possible real world feasibility of an RDA.

Submitted to arXiv on 22 Dec. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2112.11986v1

The paper presents a study on the impact of compromised adaptive cruise control (ACC) vehicles on mixed-autonomy traffic performance. The authors demonstrate that a supply-chain level compromise of the ACC capability can significantly degrade system-level performance, causing congestion waves that decrease average speed and network throughput. Using a realistic traffic simulation environment, the authors quantify the impacts of random deceleration attacks (RDAs) on a model of a high-volume freeway in the United States. The results show that the effect of the attack depends on both underlying traffic congestion levels and what percentage of ACC vehicles can be compromised. In moderate congestion regimes, mean commuter speed can be degraded by over 7%, while overall network throughput can be reduced by up to 3% in high-density regimes. Commuters may also incur costs exceeding 300 USD/km hr in moderate to high congestion regimes. The authors also develop an anomaly detection technique using GPS traces to identify malicious/compromised vehicles; however, they find that this technique is unable to distinguish between compromised ACCs and benign/normal drivers, making these attacks stealthy to detection. Stronger attacks can be accurately labeled as malicious, indicating that there is a limit to how impactful attacks can be before they are no longer stealthy. Finally, the authors experimentally execute the RDA attack on a real commercially available ACC vehicle demonstrating its possible real-world feasibility. These findings highlight potential vulnerabilities in current mixed-autonomy traffic systems and underscore the need for improved security measures at both supply-chain and system levels.
Created on 23 May. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.