Abstract
The connected automated vehicle (CAV) is promising to enhance traffic efficiency, traveling safety, and energy savings. However, due to the open wireless communication, the CAV is vulnerable to cyber threats. Existing studies mainly focus on surveying related cyberattacks and evaluating the impact of attacks on vehicular longitudinal behaviors on a single lane. This paper aims to investigate the effects of cyberattacks on vehicular lateral behaviors on a two-lane highway, i.e., the lane-changing (LC) behaviors under cyberattacks. Based on a classical lane-changing model--minimizing overall braking induced by lane changes (MOBIL) model, and a classical car-following model--Intelligent Driver Model (IDM), this study proposes an extended lane-changing model (ELC) which can model CAV's lane-changing behaviors under cyberattacks. At the end, simulations are conducted to illustrate the impact of different malicious attacks on vehicles' LC movements. Results show that cyberattacks can imperil the LC maneuvers and lead to abnormal driving behaviors.
Connected automated vehicles (CAVs), which integrate vehicle-to-vehicle (V2V) communication and autonomous vehicles (AV) technologies, are expected to greatly improve traffic safety and efficiency
Lopez et al.
However, the existing work aims to investigate the impact of cyberattacks on CF behaviors. To the best of our knowledge, only a few previous studies have considered the impact of cyberattacks on LC behaviors. For instance, Khattak et al.
Although these studies present the influence of cyberattacks on LC behaviors using simulation experiments, they have not developed new lane-changing model with cyberattacks. In this research, we aim to construct an improved LC model associated with cyberattacks, through which we could better understand how the cyberattacks impact the LC maneuver and how to quantify this impact. The detailed description will be presented in the following sections.
This study improves a classic LC model, i.e., MOBIL (Minimizing Overall Braking Induced by Lane changes) model
The main contributions are described as below. (i) Cyberattacks on vehicles are formulized and integrated into the classical LC and CF models. (ii) The extended LC model and the improved IDM are used to describe the process of LC in two lanes. (iii) Various cyberattacks are classified into three types, i.e., velocity, position and acceleration attacks, and numerical simulations illustrate the changes of malicious attacks on vehicles' LC movements.
In general, a LC process consists of three phases, i.e., before, during, and after the lane change
To describe CAVs' LC behaviors under cyberattacks, we adopt the MOBIL model, which has many advantages
In this study, the MOBIL LC model is implemented to model a two-lane highway traffic. A simple diagram of a lane change on two-lane traffic is first provided in

Fig. 1 A typical lane-changing scene
The MOBIL model has a comprehensive consideration of both LC safety and gain. Therefore, it needs to meet the following two essential conditions:
(1) The safety criterion: This condition aims to ensure the safety after the LC, i.e. both the accelerations of the subject vehicle and its new follower vehicle need to fit the following conditions:
(1) |
where and represent the predicted accelerations of the subject vehicle and its new follower vehicle after the subject vehicle changes the lane, respectively; and represents a maximum safe deceleration.
(2) The incentive condition: This criterion is used to decide whether a lane change improves the local traffic status. The incentive criterion is formalized as below:
(2) |
where indicates the acceleration of vehicle on the current lane, denotes the politeness factor, indicates the predicated acceleration of vehicle after the subject vehicle changes the lane, and is the LC threshold. The politeness factor can be interpreted as the degree of altruism, which is a variable that determines the impact of nearby vehicles on the LC decision of the subject vehicle. It can vary from for completely selfish lane-changers to for altruistic drivers who do not change lane if LC would deteriorate the traffic situation considering these followers. Furthermore, represents considering the benefits of other vehicles.
There are two different car-following models, linear and the other nonlinear model, to demonstrate the CAVs' following behaviors. Car-following models are used to formulate vehicle interactions and uncover CAV platoon dynamics. Linear car-following models include Pipes model, Helly's model, and Gazis–Herman–Rothery model. Nonlinear car-following models include Newell's model, optimal velocity model, and intelligent driver model (IDM). The critical difference between these two types of car-following models is that the nonlinear models capture a nonlinear relationship with deviation from the desired space gap and the relative velocity.
Compared to the linear car-following model, the nonlinear car-following is more suitable for describing the real traffic flow due to its nonlinearity and sophistication in capturing complex vehicle dynamics. This research adopts the IDM due to its advantages as follows. First, the IDM is a multi-regime model, which presents a greater realism than other nonlinear models when characterizing the congested traffic flow
(3) |
where indicates the acceleration of vehicle m; indicates the desired velocity in free flow; indicates the desired safe gap; denotes the space gap in completely stopped traffic; is the space gap between the preceding vehicle and vehicle ; is the length of vehicle; is the position of the vehicle m; is the velocity of vehicle m; and is the relative velocity between vehicle and its preceding vehicle . In addition, is the desired time gap between successive vehicles; and and indicate the vehicle's maximum acceleration and deceleration, respectively. Note if all vehicles travel uniformly, i.e., each vehicle's acceleration is equal to zero, each vehicle keeps the same velocity and space gap between consecutive vehicles.
In a normal CAV environment, each vehicle can receive dynamic information such as velocity, position, and acceleration from the surrounding vehicles. Vehicles' information will be accurately sent to the target vehicle on time. However, when an attack happens, the information transmission between vehicles could be interrupted, delayed, lost, or even falsified. Then, the vehicle's LC and CF behaviors can also be influenced. Note that this study only the V2V communication.
Much research has demonstrated that cyberattacks have an impact on the effective use of vehicles
(1) Spoofing attack: An adversary can compromise a vehicle and send fake messages such as fake location, velocity, and acceleration. For instance, GPS is responsible for delivering the real-time location message to the surrounding vehicles. When the spoofing attack happens, the spoofed GPS can send a fake location to the subject vehicle by releasing a strong-power signal from the GPS satellite simulator.
(2) Replay attack: An attacker captures the packets and replays them at a later time to disguise that they were sent by the true sender. Thus, the repeated message, which is sent after a while, could be accepted as a new message. Mathematically, the position, velocity, and position of vehicle may be unchanged during the attacking period.
(3) Impersonation attacks: In vehicular networks, an attacker could impersonate a roadside infrastructure or vehicle to trick others by applying their authentication details. For example, an attacker might impersonate an emergency vehicle, which would give them a higher priority within the vehicular network and result in less congestion. The position, velocity, and position of vehicle can be altered.
The above cyberattacks could affect vehicles' behaviors in their own manners. Essentially, all these attacks can release bogus messages which falsify the vehicle's dynamic information such as velocity, position, and acceleration. Hence, for simplicity, this research considers all these attacks as bogus attacks
To describe CAVs' dynamic traffic behaviors under cyberattack, we present the following two representative attacking cases. In the first case, we assume that the velocity and/or the position of the preceding vehicle of the subject vehicle is attacked, and vehicle sends falsified velocity and/or position messages to the subject vehicle . Then the subject vehicle's acceleration will be influenced. In this case, the influenced acceleration in MOBIL needs to be updated by the following extended IDM model:
(4) |
where and are the weight parameters to describe the impacts of cyberattacks on velocity and position of the subject vehicle’s nearest leader, respectively. If or ,
In the second case, we assume that the acceleration of the following vehicle after LC of the subject vehicle is falsified. In this situation, the weighting parameters are introduced to capture the change of acceleration influenced by attacks. An improved incentive criterion in the MOBIL model under cyberattacks can be formulated below:
(5) |
where and are the weighting parameters to describe the impacts of cyberattacks on the new follower vehicle after LC and the old follower vehicle before LC. Here, and have clear physical meanings. If , it indicates the CAV is moving without cyberattacks. While and/or , it denotes the CAV is influenced by cyberattacks. Specifically, if (), it represents that the subject vehicle receives overestimated acceleration messages of the following vehicle after (or before) LC; and if (), it represents that the subject vehicle receives an underestimated acceleration message from the following vehicle after (or before) LC.
Overall, these falsified messages could cause the vehicle to make the wrong decision, leading to potential collisions. To fully capture these impacts, based on above Eqs. (
(6) |
Note that
This section presents a series of simulations to verify the effectiveness of the proposed ELC model and illustrate the impact of cyberattacks on vehicles' LC behaviors. In this study, we use Python to show the change in vehicles' behaviors under cyberattacks. We select a two-lane highway whose length is long enough to conduct our simulation. The total simulation time is 30 s, and each sampling time is 0.01 s. For the convenience of investigation, we put forward the following assumptions (see

Fig. 2 Numerical simulation scenarios
To illustrate the impact of cyberattacks on the vehicle's lateral behaviors, we design five scenarios: without attacks, velocity attack, position attack, velocity and position attacks, and acceleration attack.
In all scenarios, each vehicle's initial space headway in the platoon is 35 m, and the initial velocity is set as 14 . As shown in
Parameter | Value | Description |
---|---|---|
12 | Number of vehicles | |
/() | 33.33 | Desired free-flow velocity |
/ | 1.6 | Safety time headway |
/ | 2 | Jam distance |
/() | 0.73 | Maximum acceleration |
/() | 1.67 | Desired deceleration |
/() | 4 | Maximum safety deceleration |
/() | 0.1 | Switching threshold |
0.1 | Politeness factor |
As a reference,

Fig. 3 Plots of position, velocity, acceleration, and space headway without attacks
Before the LC, each vehicle is traveling uniformly in the current lane. We can see that the

Fig. 4 Plots of position, velocity, acceleration, and space headway under underestimated velocity attacks when

Fig. 5 Plots of position, velocity, acceleration, and space headway under overestimated velocity attacks when

Fig. 6 Plots of position, velocity, acceleration, and space headway under underestimated position attacks when

Fig. 7 Plots of position, velocity, acceleration, and space headway under overestimated position attacks when
In this case, we discuss the effects of modification of both velocity and position on LC behaviors.

Fig. 8 Plots of position, velocity, acceleration, and space headway under underestimated velocity and position when

Fig. 9 Plots of position, velocity, acceleration, and space headway under overestimated velocity and position when
To be consistent with the proposed ELC model, we assume that the accelerations of the new follower after LC (the

Fig. 10 Plots of position, velocity, acceleration, and space headway under underestimated acceleration attacks when

Fig. 11 Plots of position, velocity, acceleration, and space headway under overestimated acceleration attacks when
The above five simulation experiments show that falsification of acceleration, velocity, and position will cause abnormal LC behavior, such as LC time in advance or delay and vehicles' oscillation amplitudes. These results demonstrated that cyberattacks could influence traffic efficiency and cause potential rear-end collisions.
With the advent of intelligent and connected technology, the impacts of cyberattacks on vehicles have drawn many scholars' attention. This research focuses on modeling LC behaviors under cyberattacks. To this end, based on the MOBIL and IDM models, this study proposes an extended LC (ELC) model with cyberattacks to describe the LC decision-making behavior. Through the numerical simulation, we found that cyberattacks could imperil the LC maneuvers and different attacks are able to result in different consequences such as LC time in advance or delay, and even potential rear-end collisions.
By studying the lane-changing behavior of connected vehicles under cyberattacks, the impact of cyberattacks on vehicle lane-changing behaviors is revealed. Attackers can attack with different parameters on vehicles according to different attack purposes and real-time traffic conditions to accomplish specific attack goals, such as causing collisions and increasing traffic congestion.
The research in this paper allows us to have a deeper understanding of the impact mechanism of cyberattacks, so that we can actively defend against attacks. By analyzing the manifestations and results of cyberattacks, the detection and defense of cyberattacks can be completed in time, so as to avoid personal and property hazards.
In actual vehicle applications, relevant algorithms can be installed to detect the dynamic information of the own vehicle and other vehicles, so as to quickly and timely find abnormal dynamic updates and communication information. At the same time, the detection method can also be used in combination with other cyberattacks detection methods to improve the detection rate of cyberattacks, and provide response strategies in time.
Vehicles have multiple strategies to defend against cyberattacks. In addition to cryptographic methods, communication information can also be verified by methods such as multi-sensor data fusion. At this time, the attacker needs more sophisticated attack strategies, such as performing compound attacks and attacking acceleration, speed, and position information at the same time, which also puts forward higher requirements for vehicle information security protection.
There are several directions for future study. First, it is expected that this research could help counter the detrimental effects caused by cyberattacks. By understanding the impacts on traffic dynamics caused by different cyberattacks, some possible traffic control, and management strategies could be developed and applied to resolve these impacts. Second, in this study, for the convenience of analysis, we just adopt two lane framework in our simulation studies, the framework will be extended to a multi-lane with thousands of vehicles. Third, it will be interesting to explore to assess the impact on more parameters like traffic flow, safety etc. At last, security work against malicious attacks such as detection of cyberattacks, privacy-preserving scheme between V2X and human driver intervention, etc. will be investigated in nearly future.
Contributions Statement
吴新开:构建框架,起草论文;
何山:调研文献,提出模型;
张少伟:调试参数,设计实验;
贺晓征:实验仿真,验证模型;
王斯奋:评阅论文,提供指导。
参考文献
TIAN D, WU G, BORIBOONSOMSIN K, et al. Performance measurement evaluation framework and co-benefit/tradeoff analysis for connected and automated vehicles (cav) applications: a survey[J]. IEEE Intelligent Transportation Systems Magazine, 2018,10(3): 110. [Baidu Scholar]
SARKER A, SHEN H, RAHMAN M, et al. A review of sensing and communication, human factors, and controller aspects for information-aware connected and automated vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2019,21(1): 7. [Baidu Scholar]
PAPADOULIS A, QUDDUS M, IMPRIALOU M. Evaluating the safety impact of connected and autonomous vehicles on motorways[J]. Accident Analysis & Prevention, 2019,124: 12. [Baidu Scholar]
FERRAG M A, MAGLARAS L A, JANICKE H, et al. Authentication protocols for internet of things: a comprehensive survey[J]. Security and Communication Networks, 2017,2017: 1. [Baidu Scholar]
ALNASSER A, SUN H, JIANG J. Cyber security challenges and solutions for v2x communications: a survey[J]. Computer Networks, 2019,151: 52. [Baidu Scholar]
KHATTAK Z H, SMITH B L, FONTAINE M D. Impact of cyberattacks on safety and stability of connected and automated vehicle platoons under lane changes[J]. Accident Analysis & Prevention, 2021,150: 105861. [Baidu Scholar]
HADDAD J, MIRKIN B. Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks[J]. Transportation research part B: methodological, 2020,132: 44. [Baidu Scholar]
LOPEZ A, JIN W, AL FARUQUE M A . Security analysis for fixed-time traffic control systems[J]. Transportation Research Part B: Methodological, 2020,139: 473. [Baidu Scholar]
FENG Y, HUANG S, CHEN Q A, et al. Vulnerability of traffic control system under cyberattacks with falsified data[J]. Transportation research record, 2018, 2672(1): 1. [Baidu Scholar]
KHALID KHAN S, SHIWAKOTI N, STASINOPOULOS P. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles[J]. Accident Analysis & Prevention, 2022,165: 106515. [Baidu Scholar]
MAGLARAS L, FERRAG M, DERHAB A, et al. Threats, countermeasures and attribution of cyber attacks on critical infrastructures[J]. EAI Endorsed Transactions on Security and Safety, 2018,5(16): 1. [Baidu Scholar]
DONG C, WANG H, NI D, et al. Impact evaluation of cyber-attacks on traffic flow of connected and automated vehicles[J]. IEEE Access, 2020(8): 86824. [Baidu Scholar]
LI Y, TU Y, FAN Q, et al. Influence of cyber-attacks on longitudinal safety of connected and automated vehicles[J]. Accident Analysis & Prevention, 2018,121: 148. [Baidu Scholar]
HU J, QI L, ZHANG Z, et al. A detection method for cyber-attack on connected signal phase and timing information[J]. Transportmetrica B: Transport Dynamics, 2022,10(1): 731. [Baidu Scholar]
KHATTAK Z H, SMITH B L, FONTAINE M D. Impact of cyberattacks on safety and stability of connected and automated vehicle platoons under lane changes[J]. Accident Analysis & Prevention, 2021,150: 105861. [Baidu Scholar]
KASHYAP A, CHAKRAVARTHY A, MENON P P. Detection of cyber-attacks in automotive traffic using macroscopic models and gaussian processes[J]. IEEE Control Systems Letters, 2022,6: 1688. [Baidu Scholar]
ZHAO X, ABDO A, LIAO X, et al. Evaluating Cybersecurity Risks of Cooperative Ramp Merging in Mixed Traffic Environments[J]. IEEE Intelligent Transportation Systems Magazine, 2022,14(6):52. [Baidu Scholar]
KESTING A, TREIBER M, HELBING D. General lane-changing model mobil for car-following models[J]. Transportation Research Record, 2007,1999(1): 86. [Baidu Scholar]
TREIBER M, HENNECKE A, HELBING D. Congested traffic states in empirical observations and microscopic simulations[J]. Physical Review E, 2000,62(2): 1805. [Baidu Scholar]
SALVUCCI D D, LIU A. The time course of a lane change: driver control and eye-movement behavior[J]. Transportation Research Part F: Traffic Psychology and Behaviour, 2002,5(2): 123. [Baidu Scholar]
KESTING A, TREIBER M, SCHÖNHOF M, et al. Adaptive cruise control design for active congestion avoidance[J]. Transportation Research Part C: Emerging Technologies, 2008,16(6): 668. [Baidu Scholar]
ZHENG Y, RAN B, QU X, et al. Cooperative lane changing strategies to improve traffic operation and safety nearby freeway off-ramps in a connected and automated vehicles environment[J]. IEEE Transactions on Intelligent Transportation Systems, 2019,21(11): 4605. [Baidu Scholar]
ZHENG Y, ZHANG G, LI Y, et al. Optimal jam-absorption driving strategy for mitigating rear-end collision risks with oscillations on freeway straight segments[J]. Accident Analysis & Prevention, 2020,135: 105367. [Baidu Scholar]
ALIWA E, RANA O, PERERA C, et al. Cyberattacks and countermeasures for in-vehicle networks[J]. ACM Computing Surveys, 2021,54(1): 1. [Baidu Scholar]
WANG P, WU X, HE X. Modeling and analyzing cyberattack effects on connected automated vehicular platoons[J]. Transportation Research Part C: Emerging Technologies, 2020,115: 102625. [Baidu Scholar]
ZHANG T, YE D. False data injection attacks with complete stealthiness in cyber–physical systems: a self-generated approach[J]. Automatica, 2020,120: 109117. [Baidu Scholar]