Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

Edward S. Canepa, Alexandre M. Bayen, Christian G. Claudel

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.
Original languageEnglish (US)
Pages (from-to)783-802
Number of pages20
JournalNetworks and Heterogeneous Media
Issue number3
StatePublished - Oct 4 2013

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01

ASJC Scopus subject areas

  • Applied Mathematics
  • General Engineering
  • Statistics and Probability
  • Computer Science Applications


Dive into the research topics of 'Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming'. Together they form a unique fingerprint.

Cite this