Malicious user detection for cooperative mobility tracking in autonomous driving

Wang Pi, Pengtao Yang, Dongliang Duan, Chen Chen, Xiang Cheng, Liuqing Yang, Hang Li

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

The mobility status of self and surrounding vehicles provides important information to various tasks in autonomous driving (AD) and intelligent transportation system (ITS). Accordingly, a precise, stable, and robust mobility tracking framework is essential. Compared with self-tracking that relies only on mobility observations from onboard sensors [e.g., global positioning system (GPS), inertial measurement unit (IMU), and camera], cooperative tracking markedly increases the precision and reliability of the mobility information by integrating observations from roadside units (RSUs) and nearby vehicles through vehicle-to-everything (V2X) communications in the Internet of Vehicles (IoV). Nevertheless, cooperative tracking can be quite vulnerable if there are malicious users sending bogus observations in the cooperative network. In this article, we present a malicious user detection framework, which includes two sequential detection algorithms and a secure mobility data exchange and fusion model to detect and remove bogus mobility information and integrate proposed detection algorithms with previous data fusion algorithms, which secures the cooperative mobility tracking in AD, ITS. Simulations validate the effectiveness and robustness of the proposed framework under different types of attacks.

Original languageEnglish (US)
Article number8998259
Pages (from-to)4922-4936
Number of pages15
JournalIEEE Internet of Things Journal
Volume7
Issue number6
DOIs
StatePublished - Jun 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Autonomous driving (AD)
  • Cooperative mobility tracking
  • Intelligent transportation system (ITS)
  • Internet of Vehicles (IoV)
  • Malicious user detection
  • Sequential detection

Fingerprint

Dive into the research topics of 'Malicious user detection for cooperative mobility tracking in autonomous driving'. Together they form a unique fingerprint.

Cite this