EconPapers    
Economics at your fingertips  
 

A Malware Attack Enabled an Online Energy Strategy for Dynamic Wireless EVs within Transportation Systems

Fahad Alsokhiry, Andres Annuk (), Toivo Kabanen and Mohamed A. Mohamed ()
Additional contact information
Fahad Alsokhiry: Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah 21589, Saudi Arabia
Andres Annuk: Institute of Forestry and Engineering, Estonian University of Life Sciences, 51006 Tartu, Estonia
Toivo Kabanen: Institute of Forestry and Engineering, Estonian University of Life Sciences, 51006 Tartu, Estonia
Mohamed A. Mohamed: Electrical Engineering Department, Faculty of Engineering, Minia University, Minia 61519, Egypt

Mathematics, 2022, vol. 10, issue 24, 1-20

Abstract: Developing transportation systems (TSs) under the structure of a wireless sensor network (WSN) along with great preponderance can be an Achilles’ heel from the standpoint of cyber-attacks, which is worthy of attention. Hence, a crucial security concern facing WSNs embedded in electrical vehicles (EVs) is malware attacks. With this in mind, this paper addressed a cyber-detection method based on the offense–defense game model to ward off malware attacks on smart EVs developed by a wireless sensor for receiving data in order to control the traffic flow within TSs. This method is inspired by the integrated Nash equilibrium result in the game and can detect the probability of launching malware into the WSN-based EV technology. For effective realization, modeling the malware attacks in conformity with EVs was discussed. This type of attack can inflict untraceable detriments on TSs by moving EVs out of their optimal paths for which the EVs’ power consumption tends toward ascending thanks to the increasing traffic flow density. In view of this, the present paper proposed an effective traffic-flow density-based dynamic model for EVs within transportation systems. Additionally, on account of the uncertain power consumption of EVs, an uncertainty-based UT function was presented to model its effects on the traffic flow. It was inferred from the results that there is a relationship between the power consumption and traffic flow for the existence of malware attacks. Additionally, the results revealed the importance of repressing malware attacks on TSs.

Keywords: transportation system (TS); electrical vehicles (EVs); malware attack; offense–defense game; traffic flow; wireless sensor network (WSN); uncertainty (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/24/4691/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/24/4691/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:24:p:4691-:d:999787

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:24:p:4691-:d:999787