Chapter
Sep 8, 2022
An Improved Lane-Changing Model for Connected Automated Vehicles under Cyberattacks
Authors: Shan He [email protected], Shaowei Zhang [email protected], Hengwei Chen [email protected], and Pengcheng Wang [email protected]Author Affiliations
Publication: CICTP 2022
ABSTRACT
Existing studies focus on surveying cyberattacks and evaluating their impacts on vehicular longitudinal behaviors on a single lane. This paper investigates the effects of cyberattacks on vehicular lateral behaviors on a two-lane highway, i.e., the lane-changing behaviors under cyberattacks. The lane change is a complex maneuver, which requires integrating neighbor vehicles’ dynamical parameters such as velocity, position and/or acceleration. This study introduces a car-following model to derive vehicles’ dynamical parameters. Specifically, this study adopts the Intelligent Driver Model (IDM) to characterize the car-following movements. Then, incorporating a classical lane-changing model, i.e., minimizing overall braking induced by lane changes (MOBIL) model, this study proposes an extended lane-changing model with cyberattacks to obtain the decision-making conditions. Finally, simulations are conducted to illustrate the impact of different malicious attacks such as falsified acceleration, speed, and position on vehicles’ movements. These results demonstrate that cyberattacks could cause traffic congestion, low traffic efficiency, and collisions.
Get full access to this article
View all available purchase options and get full access to this chapter.
Information & Authors
Information
Published In
History
Published online: Sep 8, 2022
Permissions
Request permissions for this article.
Authors
Affiliations
1School of Transportation Science and Engineering, Beihang Univ., Beijing, China. Email: [email protected]
2School of Transportation Science and Engineering, Beihang Univ., Beijing, China. Email: [email protected]
3School of Transportation Science and Engineering, Beihang Univ., Beijing, China. Email: [email protected]
4School of Cyber Science and Technology, Beihang Univ., Beijing, China. Email: [email protected]
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.
View Options
Get Access
Access content
Please select your options to get access
Log in/Register
Log in via your institution (Shibboleth)
ASCE Members:
Please log in to see member pricing
Purchase
Save for later Item saved, go to cart Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Get Access
Access content
Please select your options to get access
Log in/Register
Log in via your institution (Shibboleth)
ASCE Members:
Please log in to see member pricing
Purchase
Save for later Item saved, go to cart Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.