EconPapers    
Economics at your fingertips  
 

Jam traffic pattern of a multi-phase lattice hydrodynamic model integrating a continuous self-stabilizing control protocol to boycott the malicious cyber-attacks

Cong Zhai, Weitiao Wu, Yingping Xiao, Jiyong Zhang and Min Zhai

Chaos, Solitons & Fractals, 2025, vol. 197, issue C

Abstract: While connected-automated vehicles (CAVs) can share traffic data with external nodes through vehicle-vehicle or vehicle-infrastructure communication, the exoteric workshop communication setting makes the vehicles susceptible to cyber-attack interference, which will affect the normal information interaction between vehicles. Besides, in practice, the driver uses the accelerator, gear shift lever or brake pedal to accelerate and decelerate the vehicle, whereas the complex piecewise acceleration process is negligible in existing works. In doing so, we use historical traffic information to compensate for the missing core data caused by malicious cyber-attacks. We then propose a novel multi-phase lattice hydrodynamics model considering malicious cyber-attacks. A switch continuous self-stabilizing security control protocol is embedded to reinforce the steadiness of traffic flow. The typical optimal velocity function, which frequently serves as a basic hyperbolic tangent function, is swapped with a two-stage (three-phase) optimal velocity function to elucidate the intricate three-phase traffic flow system. Following the linear stability theorem, the critical stability criteria for the new model are identified. The outcome reveals that the cyber-attack intensity and control gain coefficient have profound effects on the steadiness of traffic flow, and the stage of phase transition is determined by what amount of turning points are contained in the optimal velocity function. The modified Korteweg–de Vries (mKdV) equation that indicates the density wave in a bottleneck area is established with the aid of nonlinear stability analysis and the associated analytical solution is obtained. Numerical studies have been conducted under periodic boundary circumstances to verify the correctness of the mathematical analysis.

Keywords: Lattice hydrodynamic model; Multi-phase; Continuous self-stabilizing security control; Malicious cyber-attack; Stability (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0960077925005442
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:chsofr:v:197:y:2025:i:c:s0960077925005442

DOI: 10.1016/j.chaos.2025.116531

Access Statistics for this article

Chaos, Solitons & Fractals is currently edited by Stefano Boccaletti and Stelios Bekiros

More articles in Chaos, Solitons & Fractals from Elsevier
Bibliographic data for series maintained by Thayer, Thomas R. ().

 
Page updated 2025-06-17
Handle: RePEc:eee:chsofr:v:197:y:2025:i:c:s0960077925005442