single-jc.php

JACIII Vol.29 No.1 pp. 175-186
doi: 10.20965/jaciii.2025.p0175
(2025)

Research Paper:

False Data Injection Attack Detection for Virtual Coupling Systems of Heavy-Haul Trains: A Deep Learning Approach

Xiaoquan Yu*, Wei Li*, Shuo Li**,†, Yingze Yang*, and Jun Peng*

*College of Railway, Central South University
22 Shaoshan South Road, Tianxin District, Changsha, Hunan 410075, China

**Changsha University of Science and Technology
No.960, Section 2, Wanjiali South Road, Tianxin District, Changsha, Hunan 410004, China

Corresponding author

Received:
May 15, 2024
Accepted:
November 13, 2024
Published:
January 20, 2025
Keywords:
heavy-haul trains, cooperative control, autoencoder, FDIA detection
Abstract

Cooperative control for virtual coupling systems of multiple heavy-haul trains can improve the safety and efficiency of heavy-haul railway transportation. However, the false data injection attack for the virtual coupling system is a serious obstacle, which will lead to imprecise train operation control. To address this issue, a deep learning-based false data injection attack (FDIA) detection for virtual coupling systems of heavy-haul trains is proposed. First, the cyber-physical model of the virtual coupling system is established. Second, a cooperative control law is designed for the virtual coupling system, and the effects of the FDIA on the virtual coupling system is analyzed. Then, the unsupervised autoencoder method is introduced to achieve the false data injection attack detection. The autoencoder network model is trained with normal operation data and tested with abnormal operation data. The performance of the proposed method is verified in four different simulation scenarios: normal case, velocity attack case, position attack case, and joint attack case. Simulation results show that the proposed method can effectively increase the detection accuracy and reduce the error rate with other supervised methods.

Cite this article as:
X. Yu, W. Li, S. Li, Y. Yang, and J. Peng, “False Data Injection Attack Detection for Virtual Coupling Systems of Heavy-Haul Trains: A Deep Learning Approach,” J. Adv. Comput. Intell. Intell. Inform., Vol.29 No.1, pp. 175-186, 2025.
Data files:
References
  1. [1] J. Zou, Y. Zhang, S. Yang, Y. Liu, and J. Zheng, “Adaptive neighborhood selection for many-objective optimization problems,” Applied Soft Computing, Vol.64, pp. 186-198, 2018. https://doi.org/10.1016/j.asoc.2017.11.041
  2. [2] Y. Cao, J. Wen, and L. Ma, “Tracking and collision avoidance of virtual coupling train control system,” Future Generation Computer Systems, Vol.120, pp. 76-90, 2021. https://doi.org/10.1016/j.future.2021.02.014
  3. [3] D. Bauso, C. Fecarotti, and A. Khaleghi, “Cooperative control and stability analysis for virtual coupling of rail vehicles,” Control Engineering Practice, Vol.133, Article No.105452, 2023. https://doi.org/10.1016/j.conengprac.2023.105452
  4. [4] F. Corman, A. D’Ariano, D. Pacciarelli, and M. Pranzo, “Dispatching and coordination in multi-area railway traffic management,” Computers & Operations Research, Vol.44, pp. 146-160, 2014. https://doi.org/10.1016/j.cor.2013.11.011
  5. [5] S. Huang, F. Zhang, Q. Guo et al., “Synchronous control system based on wireless data transmission for 50,000-t heavy-haul trains,” Advances in Mechanical Engineering, Vol.10, No.7, Article No.1687814018784827, 2018. https://doi.org/10.1177/1687814018784827
  6. [6] X. Wang, S. Li, and T. Tang, “Robust optimal predictive control of heavy haul train under imperfect communication,” ISA Trans., Vol.91, pp. 52-65, 2019. https://doi.org/10.1016/j.isatra.2019.01.029
  7. [7] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety,” IEEE Communications Magazine, Vol.44, No.1, pp. 74-82, 2006. https://doi.org/10.1109/MCOM.2006.1580935
  8. [8] E. Moradi-Pari, D. Tian, M, Bahramgiri et al., “DSRC Versus LTE-V2X: Empirical Performance Analysis of Direct Vehicular Communication Technologies,” IEEE Trans. on Intelligent Transportation Systems, Vol.24, No.5, pp. 4889-4903, 2023. https://doi.org/10.1109/TITS.2023.3247339
  9. [9] W. Li, C. Chen, H. Li et al., “Analysis of the different locomotive wireless multi-traction synchronous control systems for heavy-haul combined trains and their performance,” Transportation Safety and Environment, Vol.2, No.3, pp. 202-215, 2020. https://doi.org/10.1093/tse/tdaa025
  10. [10] K. Gao, Z. Huang, J. Wang et al., “Decentralized control of heavy-haul trains with input constraints and communication delays,” Control Engineering Practice, Vol.21, No.4, pp. 420-427, 2013. https://doi.org/10.1016/j.conengprac.2012.12.010
  11. [11] Z. Huang, P. Wang, F. Zhou, W. Liu, and J. Peng, “Cooperative Tracking Control of the Multiple-High-Speed Trains System Using a Tunable Artificial Potential Function,” J. of Advanced Transportation, Vol.2022, No.1, Article No.3639586, 2022. https://doi.org/10.1155/2022/3639586
  12. [12] B. Chen, R. Zhang, F. Zhou, and W. Du, “An Observer-Driven Distributed Consensus Braking Control Method for Urban Railway Trains with Unknown Disturbances,” Actuators, Vol.12, No.3, Article No.111, 2023. https://doi.org/10.3390/act12030111
  13. [13] J. Li, T. Feng, J. Zhang et al., “Optimal distributed cooperative control for multi-agent systems with constrains on convergence speed and control input,” Neurocomputing, Vol.426, pp. 14-25, 2021. https://doi.org/10.1016/j.neucom.2020.10.058
  14. [14] W. Xu, G. Hu, D. W. C. Ho et al., “Distributed secure cooperative control under denial-of-service attacks from multiple adversaries,” IEEE Trans. on Cybernetics, Vol.50, No.8, pp. 3458-3467, 2019. https://doi.org/10.1109/TCYB.2019.2896160
  15. [15] A. B. Alexandru, M. S. Darup, and G. J. Pappas, “Encrypted cooperative control revisited,” 2019 IEEE 58th Conf. on Decision and Control (CDC), pp. 7196-7202, 2019. https://doi.org/10.1109/CDC40024.2019.9030124
  16. [16] X.-Y. Kong and G.-H. Yang, “An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems,” IEEE Trans. on Industrial Electronics, Vol.70, No.8, pp. 8468-8476, 2023. https://doi.org/10.1109/TIE.2022.3213899
  17. [17] X.-X. Ren and G.-H. Yang, “Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks,” Int. J. of Robust and Nonlinear Control, Vol.30, No.1, pp. 65-79, 2020. https://doi.org/10.1002/rnc.4749
  18. [18] K. Manandhar, X. Cao, F. Hu et al., “Detection of faults and attacks including false data injection attack in smart grid using Kalman filter,” IEEE Trans. on Control of Network Systems, Vol.1, No.4, pp. 370-379, 2014. https://doi.org/10.1109/TCNS.2014.2357531
  19. [19] M. N. Kurt, Y. Yılmaz, and X. Wang, “Distributed quickest detection of cyber-attacks in smart grid,” IEEE Trans. on Information Forensics and Security, Vol.13, No.8, pp. 2015-2030, 2018. https://doi.org/10.1109/TIFS.2018.2800908
  20. [20] D. Ye and T.-Y. Zhang, “Summation detector for false data-injection attack in cyber-physical systems,” IEEE Trans. on Cybernetics, Vol.50, No.6, pp. 2338-2345, 2019. https://doi.org/10.1109/TCYB.2019.2915124
  21. [21] L. Yang, Y. Li, and Z. Li, “Improved-ELM method for detecting false data attack in smart grid,” Int. J. of Electrical Power & Energy Systems, Vol.91, pp. 183-191, 2017. https://doi.org/10.1016/j.ijepes.2017.03.011
  22. [22] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism,” IEEE Trans. on Smart Grid, Vol.8, No.5, pp. 2505-2516, 2017. https://doi.org/10.1109/TSG.2017.2703842
  23. [23] M. Lu, L. Wang, Z. Cao et al., “False data injection attacks detection on power systems with convolutional neural network,” J. of Physics: Conf. Series, Vol.1633, No.1, Article No.012134, 2020. https://doi.org/10.1088/1742-6596/1633/1/012134
  24. [24] V. Krishna, R. Iyer, and W. Sanders, “ARIMA-based modeling and validation of consumption readings in power grids,” E. Rome, M. Theocharidou, and S. Wolthusen (Eds.), “Critical Information Infrastructures Security,” Springer, pp. 199-210, 2016. https://doi.org/10.1007/978-3-319-33331-1_16
  25. [25] P. Jokar, N. Arianpoo, and V. C. Leung, “Electricity theft detection in AMI using customers’ consumption patterns,” IEEE Trans. Smart Grid, Vol.7, No.1, pp. 216-226, 2016. https://doi.org/10.1109/TSG.2015.2425222
  26. [26] W. Ren, J. Peng, X. Yu et al., “False Data Injection Attack Detection for Virtual Coupling Heavy-Haul Trains,” Proc. of 2023 7th Chinese Conf. on Swarm Intelligence and Cooperative Control. Singapore: Springer Nature Singapore, pp. 166-174, 2023. https://doi.org/10.1007/978-981-97-3332-3_15

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on Feb. 07, 2025