• Corpus ID: 26124528

Resiliency of Mobility-asa-Service Systems to Denial-of-Service Attacks

  title={Resiliency of Mobility-asa-Service Systems to Denial-of-Service Attacks},
  author={J{\'e}r{\^o}me Thai and Chenyang Yuan and Alexandre M. Bayen},
Mobility-as-a-Service (MaaS) systems such as ride sharing services have expanded very quickly over the past years. However, the popularity of MaaS systems make them increasingly vulnerable to Denial-of-Service (DOS) attacks, in which attackers attempt to disrupt the system to make it unavailable to the customers. Expanding on an established queuing-theoretical model for MaaS systems, attacks are modeled as a malicious control of a fraction of vehicles in the network. We then formulate a… 
2 Citations

Figures and Tables from this paper

Mobility services data models for open and inclusive MaaS infrastructures

A definition of the transportation service data model suitable for a MaaS platform, as well as two different implementation approaches, a custom-design approach and an ontology-based approach are presented and compared with each other based on a set of key performance indicators (KPIs) such as code complexity, code maintainability, and performance.

Security for Shared Electric and Automated Mobility Services in Smart Cities

This article highlights cybersecurity for SEAM, including peer-to-peer car sharing, and presents security solutions based on conjugated authentication and authorization, as a complementary feature of urban mobility in smart cities.



On Cybersecurity of Freeway Control Systems: Analysis of Coordinated Ramp Metering Attacks

This article focuses on cybersecurity of transportation systems and investigates their vulnerability to attacks on the sensing and control infrastructure, using a methodology for precise and intelligent onramp metering attacks based on finite-horizon optimal control techniques and multi-objective optimization.

Fleet-sizing and service availability for a vehicle rental system via closed queueing networks

Closed Queuing Systems with Exponential Servers

It is found that the distribution of customers in the closed queuing system is regulated by the stage or stages with the slowest effective service rate, which means that closed systems are shown to be stochastically equivalent to open systems in which the number of customers cannot exceed N.

Coping with Time‐Varying Demand When Setting Staffing Requirements for a Service System

This work shows how to adapt stationary queueing models for use in nonstationary environments so that time-dependent performance is captured and staffing requirements can be set in service systems where customer demand varies in a predictable pattern over the day.

An Overview of the Economics of Cybersecurity and Cybersecurity Policy

The paper examines how these questions can be addressed using fairly standard principles and tools from economic policy analysis and potential policy research questions.

Dialing Back Abuse on Phone Verified Accounts

It is found that miscreants rampantly abuse free VOIP services to circumvent the intended cost of acquiring phone numbers, in effect undermining phone verification, which correlates with a market-wide price drop for Google PVA until Google penalized verifications from frequently abused carriers.

Urban Operations Research

Secure Control: Towards Survivable Cyber-Physical Systems

This position paper identifies and defines the problem of secure control, investigates the defenses that information security and control theory can provide, and proposes a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.

Theoretical Statistics: Topics for a Core Course

Probability and Measure.- Exponential Families.- Risk, Sufficiency, Completeness, and Ancillarity.- Unbiased Estimation.- Curved Exponential Families.- Conditional Distributions.- Bayesian

Computer Performance Modeling Handbook

The capability exists to model thermal hydraulic phenomena in both the oil and gas industry and the performance levels can be incorporated into the failure-repair model to study overall system behavior.