Citation: | YANG Li, WEI Xiukun, WEN Chenglin, “A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System,” Chinese Journal of Electronics, vol. 32, no. 5, pp. 992-1001, 2023, doi: 10.23919/cje.2022.00.248 |
[1] |
Z. X. Deng, H. F. Song, H. Huang, et al., “Multi-sensor based train localization and data fusion in autonomous train control system,” in Proceedings of 2020 Chinese Automation Congress (CAC), Shanghai, China, 2020.
|
[2] |
T. Wen, G. Xie, Y. Cao, et al., “A DNN-based channel model for network planning in train control systems,” IEEE Transactions on Intelligent Transportation Systems, vol.23, no.3, pp.2392–2399, 2022. doi: 10.1109/TITS.2021.3093025
|
[3] |
L. Yang, C. L. Wen, and T. Wen, “Multilevel fine fingerprint authentication method for key operating equipment identification in cyber-physical systems,” IEEE Transactions on Industrial Informatics, vol.19, no.2, pp.1217–1226, 2023. doi: 10.1109/TII.2022.3193955
|
[4] |
S. Kim, Y. Won, I. H. Park, et al., “Cyber-physical vulnerability analysis of communication-based train control,” IEEE Internet of Things Journal, vol.6, no.4, pp.6353–6362, 2019. doi: 10.1109/JIOT.2019.2919066
|
[5] |
H. W. Wang, F. R. Yu, L. Zhu, et al., “A cognitive control approach to communication-based train control systems,” IEEE Transactions on Intelligent Transportation Systems, vol.16, no.4, pp.1676–1689, 2015. doi: 10.1109/TITS.2014.2377115
|
[6] |
X. Wang, L. Zhu, H. W. Wang, et al., “Robust distributed cruise control of multiple high-speed trains based on disturbance observer,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.1, pp.267–279, 2021. doi: 10.1109/TITS.2019.2956162
|
[7] |
L. Zhu, Y. Li, F. R. Yu, et al., “Cross-layer defense methods for jamming-resistant CBTC systems,” IEEE Transactions on Intelligent Transportation Systems, vol.22, no.11, pp.7266–7278, 2021. doi: 10.1109/TITS.2020.3005931
|
[8] |
L. Wang, X. H. Cao, B. W. Sun, et al., “Optimal schedule of secure transmissions for remote state estimation against eavesdropping,” IEEE Transactions on Industrial Informatics, vol.17, no.3, pp.1987–1997, 2021. doi: 10.1109/TII.2020.2995385
|
[9] |
B. Gao and B. Bu, “Deep reinforcement learning-based resilient control method for CBTC systems through train-to-train communications under adversarial attacks,” in Proceedings of 2021 IEEE International Intelligent Transportation Systems Conference (ITSC), Indianapolis, IN, USA, pp.3679–3684, 2021.
|
[10] |
S. M. Ma, B. Bu, and H. W. Wang, “A virtual coupling approach based on event-triggering control for CBTC systems under jamming attacks,” in Proceedings of the IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, pp.1–6, 2020.
|
[11] |
T. Wen, L. Zou, J. L. Liang, et al., “Recursive filtering for communication-based train control systems with packet dropouts,” Neurocomputing, vol.275, pp.948–957, 2018. doi: 10.1016/j.neucom.2017.09.038
|
[12] |
L. Zou, T. Wen, Z. D. Wang, et al., “State estimation for communication-based train control systems with CSMA protocol,” IEEE Transactions on Intelligent Transportation Systems, vol.20, no.3, pp.843–854, 2019. doi: 10.1109/TITS.2018.2835655
|
[13] |
J. H. Huang, D. W. C. Ho, F. F. Li, et al., “Secure remote state estimation against linear man-in-the-middle attacks using watermarking,” Automatica, vol.121, article no.109182, 2020. doi: 10.1016/j.automatica.2020.109182
|
[14] |
H. Guo, Z. H. Pang, J. Sun, et al., “An output-coding-based detection scheme against replay attacks in cyber-physical systems,” IEEE Transactions on Circuits and Systems Ⅱ: Express Briefs, vol.68, no.10, pp.3306–3310, 2021. doi: 10.1109/TCSII.2021.3063835
|
[15] |
W. Yang, D. K. Li, H. Zhang, et al., “An encoding mechanism for secrecy of remote state estimation,” Automatica, vol.120, article no.109116, 2020. doi: 10.1016/j.automatica.2020.109116
|
[16] |
X. Y. Wang, J. C. Wang, X. Ma, et al., “A differential privacy strategy based on local features of non-Gaussian noise in federated learning,” Sensors, vol.22, no.7, article no.2424, 2022. doi: 10.3390/s22072424
|
[17] |
B. Jia, X. S. Zhang, J. W. Liu, et al., “Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in ⅡoT,” IEEE Transactions on Industrial Informatics, vol.18, no.6, pp.4049–4058, 2022. doi: 10.1109/TII.2021.3085960
|
[18] |
L. Yang and C. L. Wen, “Optimal jamming attack system against remote state estimation in Wireless network control systems,” IEEE Access, vol.9, pp.51679–51688, 2021. doi: 10.1109/ACCESS.2020.3046483
|
[19] |
Y. E. Sun, H. Huang, W. J. Yang, et al., “Toward differential privacy for traffic measurement in vehicular cyber-physical systems,” IEEE Transactions on Industrial Informatics, vol.18, no.6, pp.4078–4087, 2022. doi: 10.1109/TII.2021.3120232
|
[20] |
B. Jiang, J. Q. Li, G. H. Yue, et al., “Differential privacy for industrial internet of things: Opportunities, applications, and challenges,” IEEE Internet of Things Journal, vol.8, no.13, pp.10430–10451, 2021. doi: 10.1109/JIOT.2021.3057419
|
[21] |
L. H. Peng, X. H. Cao, C. Y. Sun, et al., “Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems,” Neurocomputing, vol.272, pp.571–583, 2018. doi: 10.1016/j.neucom.2017.07.036
|
[22] |
C. Y. Li, J. N. Wang, J. Y. Shan, et al., “Robust cooperative control of networked train platoons: A negative-imaginary systems’ perspective,” IEEE Transactions on Control of Network Systems, vol.8, no.4, pp.1743–1753, 2021. doi: 10.1109/TCNS.2021.3084064
|
[23] |
H. F. Song, S. G. Gao, Y. D. Li, et al., “Train-centric communication based autonomous train control system,” IEEE Transactions on Intelligent Vehicles, vol.8, no.1, pp.721–731, 2023. doi: 10.1109/TIV.2022.3192476
|
[24] |
Q. Dong, K. Hayashi, and M. Kaneko, “A new adaptive modulation and coding method for communication-based train control systems using WLAN,” IFAC-PapersOnLine, vol.49, no.22, pp.139–144, 2016. doi: 10.1016/j.ifacol.2016.10.386
|
[25] |
X. H. Sun, C. L. Wen, and T. Wen, “Maximum correntropy high-order extended Kalman filter,” Chinese Journal of Electronics, vol.31, no.1, pp.190–198, 2022. doi: 10.1049/cje.2020.00.334
|
[26] |
M. X. Zhang, “Study on operation control system of medium-low speed maglev train,” Master’s Thesis, Southwest Jiaotong University, Chengdu, China, 2019. (in Chinese)
|
[27] |
L. F. Liu, Z. Y. Xi, et al., “Noise-based-protection message dissemination method for insecure opportunistic underwater sensor networks,” IEEE Transactions on Information Forensics and Security, vol.17, pp.1610–1623, 2022. doi: 10.1109/TIFS.2022.3167911
|