Research Paper:
False Data Injection Attack Detection for Virtual Coupling Systems of Heavy-Haul Trains: A Deep Learning Approach
Xiaoquan Yu*, Wei Li*, Shuo Li**,, Yingze Yang*, and Jun Peng*
*College of Railway, Central South University
22 Shaoshan South Road, Tianxin District, Changsha, Hunan 410075, China
**Changsha University of Science and Technology
No.960, Section 2, Wanjiali South Road, Tianxin District, Changsha, Hunan 410004, China
Corresponding author
Cooperative control for virtual coupling systems of multiple heavy-haul trains can improve the safety and efficiency of heavy-haul railway transportation. However, the false data injection attack for the virtual coupling system is a serious obstacle, which will lead to imprecise train operation control. To address this issue, a deep learning-based false data injection attack (FDIA) detection for virtual coupling systems of heavy-haul trains is proposed. First, the cyber-physical model of the virtual coupling system is established. Second, a cooperative control law is designed for the virtual coupling system, and the effects of the FDIA on the virtual coupling system is analyzed. Then, the unsupervised autoencoder method is introduced to achieve the false data injection attack detection. The autoencoder network model is trained with normal operation data and tested with abnormal operation data. The performance of the proposed method is verified in four different simulation scenarios: normal case, velocity attack case, position attack case, and joint attack case. Simulation results show that the proposed method can effectively increase the detection accuracy and reduce the error rate with other supervised methods.
- [1] J. Zou, Y. Zhang, S. Yang, Y. Liu, and J. Zheng, “Adaptive neighborhood selection for many-objective optimization problems,” Applied Soft Computing, Vol.64, pp. 186-198, 2018. https://doi.org/10.1016/j.asoc.2017.11.041
- [2] Y. Cao, J. Wen, and L. Ma, “Tracking and collision avoidance of virtual coupling train control system,” Future Generation Computer Systems, Vol.120, pp. 76-90, 2021. https://doi.org/10.1016/j.future.2021.02.014
- [3] D. Bauso, C. Fecarotti, and A. Khaleghi, “Cooperative control and stability analysis for virtual coupling of rail vehicles,” Control Engineering Practice, Vol.133, Article No.105452, 2023. https://doi.org/10.1016/j.conengprac.2023.105452
- [4] F. Corman, A. D’Ariano, D. Pacciarelli, and M. Pranzo, “Dispatching and coordination in multi-area railway traffic management,” Computers & Operations Research, Vol.44, pp. 146-160, 2014. https://doi.org/10.1016/j.cor.2013.11.011
- [5] S. Huang, F. Zhang, Q. Guo et al., “Synchronous control system based on wireless data transmission for 50,000-t heavy-haul trains,” Advances in Mechanical Engineering, Vol.10, No.7, Article No.1687814018784827, 2018. https://doi.org/10.1177/1687814018784827
- [6] X. Wang, S. Li, and T. Tang, “Robust optimal predictive control of heavy haul train under imperfect communication,” ISA Trans., Vol.91, pp. 52-65, 2019. https://doi.org/10.1016/j.isatra.2019.01.029
- [7] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety,” IEEE Communications Magazine, Vol.44, No.1, pp. 74-82, 2006. https://doi.org/10.1109/MCOM.2006.1580935
- [8] E. Moradi-Pari, D. Tian, M, Bahramgiri et al., “DSRC Versus LTE-V2X: Empirical Performance Analysis of Direct Vehicular Communication Technologies,” IEEE Trans. on Intelligent Transportation Systems, Vol.24, No.5, pp. 4889-4903, 2023. https://doi.org/10.1109/TITS.2023.3247339
- [9] W. Li, C. Chen, H. Li et al., “Analysis of the different locomotive wireless multi-traction synchronous control systems for heavy-haul combined trains and their performance,” Transportation Safety and Environment, Vol.2, No.3, pp. 202-215, 2020. https://doi.org/10.1093/tse/tdaa025
- [10] K. Gao, Z. Huang, J. Wang et al., “Decentralized control of heavy-haul trains with input constraints and communication delays,” Control Engineering Practice, Vol.21, No.4, pp. 420-427, 2013. https://doi.org/10.1016/j.conengprac.2012.12.010
- [11] Z. Huang, P. Wang, F. Zhou, W. Liu, and J. Peng, “Cooperative Tracking Control of the Multiple-High-Speed Trains System Using a Tunable Artificial Potential Function,” J. of Advanced Transportation, Vol.2022, No.1, Article No.3639586, 2022. https://doi.org/10.1155/2022/3639586
- [12] B. Chen, R. Zhang, F. Zhou, and W. Du, “An Observer-Driven Distributed Consensus Braking Control Method for Urban Railway Trains with Unknown Disturbances,” Actuators, Vol.12, No.3, Article No.111, 2023. https://doi.org/10.3390/act12030111
- [13] J. Li, T. Feng, J. Zhang et al., “Optimal distributed cooperative control for multi-agent systems with constrains on convergence speed and control input,” Neurocomputing, Vol.426, pp. 14-25, 2021. https://doi.org/10.1016/j.neucom.2020.10.058
- [14] W. Xu, G. Hu, D. W. C. Ho et al., “Distributed secure cooperative control under denial-of-service attacks from multiple adversaries,” IEEE Trans. on Cybernetics, Vol.50, No.8, pp. 3458-3467, 2019. https://doi.org/10.1109/TCYB.2019.2896160
- [15] A. B. Alexandru, M. S. Darup, and G. J. Pappas, “Encrypted cooperative control revisited,” 2019 IEEE 58th Conf. on Decision and Control (CDC), pp. 7196-7202, 2019. https://doi.org/10.1109/CDC40024.2019.9030124
- [16] X.-Y. Kong and G.-H. Yang, “An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems,” IEEE Trans. on Industrial Electronics, Vol.70, No.8, pp. 8468-8476, 2023. https://doi.org/10.1109/TIE.2022.3213899
- [17] X.-X. Ren and G.-H. Yang, “Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks,” Int. J. of Robust and Nonlinear Control, Vol.30, No.1, pp. 65-79, 2020. https://doi.org/10.1002/rnc.4749
- [18] K. Manandhar, X. Cao, F. Hu et al., “Detection of faults and attacks including false data injection attack in smart grid using Kalman filter,” IEEE Trans. on Control of Network Systems, Vol.1, No.4, pp. 370-379, 2014. https://doi.org/10.1109/TCNS.2014.2357531
- [19] M. N. Kurt, Y. Yılmaz, and X. Wang, “Distributed quickest detection of cyber-attacks in smart grid,” IEEE Trans. on Information Forensics and Security, Vol.13, No.8, pp. 2015-2030, 2018. https://doi.org/10.1109/TIFS.2018.2800908
- [20] D. Ye and T.-Y. Zhang, “Summation detector for false data-injection attack in cyber-physical systems,” IEEE Trans. on Cybernetics, Vol.50, No.6, pp. 2338-2345, 2019. https://doi.org/10.1109/TCYB.2019.2915124
- [21] L. Yang, Y. Li, and Z. Li, “Improved-ELM method for detecting false data attack in smart grid,” Int. J. of Electrical Power & Energy Systems, Vol.91, pp. 183-191, 2017. https://doi.org/10.1016/j.ijepes.2017.03.011
- [22] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism,” IEEE Trans. on Smart Grid, Vol.8, No.5, pp. 2505-2516, 2017. https://doi.org/10.1109/TSG.2017.2703842
- [23] M. Lu, L. Wang, Z. Cao et al., “False data injection attacks detection on power systems with convolutional neural network,” J. of Physics: Conf. Series, Vol.1633, No.1, Article No.012134, 2020. https://doi.org/10.1088/1742-6596/1633/1/012134
- [24] V. Krishna, R. Iyer, and W. Sanders, “ARIMA-based modeling and validation of consumption readings in power grids,” E. Rome, M. Theocharidou, and S. Wolthusen (Eds.), “Critical Information Infrastructures Security,” Springer, pp. 199-210, 2016. https://doi.org/10.1007/978-3-319-33331-1_16
- [25] P. Jokar, N. Arianpoo, and V. C. Leung, “Electricity theft detection in AMI using customers’ consumption patterns,” IEEE Trans. Smart Grid, Vol.7, No.1, pp. 216-226, 2016. https://doi.org/10.1109/TSG.2015.2425222
- [26] W. Ren, J. Peng, X. Yu et al., “False Data Injection Attack Detection for Virtual Coupling Heavy-Haul Trains,” Proc. of 2023 7th Chinese Conf. on Swarm Intelligence and Cooperative Control. Singapore: Springer Nature Singapore, pp. 166-174, 2023. https://doi.org/10.1007/978-981-97-3332-3_15
This article is published under a Creative Commons Attribution-NoDerivatives 4.0 Internationa License.