Security of Vehicle Platooning: A Game-Theoretic Approach

In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The edge weights specify the quality of the communication links between the vehicles in both the unidirectional/bidirectional data transfer environments. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attacker’s objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as it can. The existence of Nash Equilibrium (NE) strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication weights between vehicles on the game value. The simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses.

[1]  Rajnikant Sharma,et al.  Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control , 2015, CPS-SPC '15.

[2]  Feng Yu,et al.  Security for Safety: A Path Toward Building Trusted Autonomous Vehicles , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[3]  Donghoon Shin,et al.  Effects of Vehicular Communication on Risk Assessment in Automated Driving Vehicles , 2018, Applied Sciences.

[4]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[5]  Bidisha Biswas Analysis of False Data Injection in Vehicle Platooning , 2014 .

[6]  Prabir Barooah,et al.  Effect of network structure on the stability margin of large vehicle formation with distributed control , 2010, 49th IEEE Conference on Decision and Control (CDC).

[7]  Sebastian Fischmeister,et al.  Kalman Filter Based Secure State Estimation and Individual Attacked Sensor Detection in Cyber-Physical Systems , 2019, 2019 American Control Conference (ACC).

[8]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[9]  Nasser L. Azad,et al.  Adaptive Tube-Based Nonlinear MPC for Economic Autonomous Cruise Control of Plug-In Hybrid Electric Vehicles , 2018, IEEE Transactions on Vehicular Technology.

[10]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[11]  Jeroen Ploeg,et al.  Event-Triggered Control for String-Stable Vehicle Platooning , 2017, IEEE Transactions on Intelligent Transportation Systems.

[12]  Ulf Holmberg,et al.  A Modular CACC System Integration and Design , 2012, IEEE Transactions on Intelligent Transportation Systems.

[13]  Bruno Sinopoli,et al.  Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.

[14]  J. Hedrick,et al.  String stability of interconnected systems , 1995, Proceedings of 1995 American Control Conference - ACC'95.

[15]  Karl Henrik Johansson,et al.  Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter , 2017 .

[16]  Nathan van de Wouw,et al.  Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.

[17]  Piet Van Mieghem,et al.  Graph Spectra for Complex Networks , 2010 .

[18]  Pierluigi Pisu,et al.  Replay Attack Detection in a Platoon of Connected Vehicles with Cooperative Adaptive Cruise Control , 2018, 2018 Annual American Control Conference (ACC).

[19]  Nasser L. Azad,et al.  A Distributed Reference Governor Approach to Ecological Cooperative Adaptive Cruise Control , 2018, IEEE Transactions on Intelligent Transportation Systems.

[20]  Jayantha Katupitiya,et al.  Cooperative autonomous platoon maneuvers on highways , 2013, 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics.

[21]  Tao Zhang,et al.  Vehicular Communications Using DSRC: Challenges, Enhancements, and Evolution , 2013, IEEE Journal on Selected Areas in Communications.

[22]  Soodeh Dadras Insider Vs. Outsider threats to autonomous vehicle platooning , 2018 .

[23]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[24]  Simone Baldi,et al.  An Adaptive Switched Control Approach to Heterogeneous Platooning With Intervehicle Communication Losses , 2018, IEEE Transactions on Control of Network Systems.

[25]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[26]  Ulrich Lang,et al.  Managing Security in Intelligent Transport Systems , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[27]  Lei Chen,et al.  Interaction Protocol for Highway Platoon Merge , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[28]  Soodeh Dadras,et al.  Vehicular Platooning in an Adversarial Environment , 2015, AsiaCCS.

[29]  Daniel D. Dunn,et al.  Attacker-induced traffic flow instability in a stream of automated vehicles , 2015 .

[30]  Bilin Aksun Güvenç,et al.  Cooperative Adaptive Cruise Control Implementation of Team Mekar at the Grand Cooperative Driving Challenge , 2012, IEEE Transactions on Intelligent Transportation Systems.

[31]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[32]  Mashrur Chowdhury,et al.  A Review of Communication, Driver Characteristics, and Controls Aspects of Cooperative Adaptive Cruise Control (CACC) , 2016, IEEE Transactions on Intelligent Transportation Systems.

[33]  William H. Press,et al.  Numerical recipes in C. The art of scientific computing , 1987 .

[34]  B. Sinopoli,et al.  Simulation of Network Attacks on SCADA Systems , 2010 .

[35]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[36]  Jean-Pierre Hubaux,et al.  Game Theory in Wireless Networks: A Tutorial , 2006 .

[37]  Vicente Milanés Montero,et al.  Cooperative Adaptive Cruise Control in Real Traffic Situations , 2014, IEEE Transactions on Intelligent Transportation Systems.

[38]  Shreyas Sundaram,et al.  On the Smallest Eigenvalue of Grounded Laplacian Matrices , 2014, IEEE Transactions on Automatic Control.

[39]  Fan Bai,et al.  Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers , 2010, MobiCom.

[40]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[41]  Srinivas Peeta,et al.  Cooperative Adaptive Cruise Control for Connected Autonomous Vehicles by Factoring Communication-Related Constraints , 2018, Transportation Research Part C: Emerging Technologies.

[42]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[43]  Qiong Wang,et al.  Fuel-Efficient En Route Speed Planning and Tracking Control of Truck Platoons , 2019, IEEE Transactions on Intelligent Transportation Systems.

[44]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[45]  Kevin Heaslip,et al.  CPS: an efficiency-motivated attack against autonomous vehicular transportation , 2013, ACSAC.

[46]  Yang Lu,et al.  Ecological Driving System for Connected/Automated Vehicles Using a Two-Stage Control Hierarchy , 2018, IEEE Transactions on Intelligent Transportation Systems.

[47]  Xiang Zhang,et al.  A Survey on Platoon-Based Vehicular Cyber-Physical Systems , 2016, IEEE Communications Surveys & Tutorials.

[48]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[49]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[50]  Bart van Arem,et al.  The Impact of Cooperative Adaptive Cruise Control on Traffic-Flow Characteristics , 2006, IEEE Transactions on Intelligent Transportation Systems.

[51]  G. Karagiannis,et al.  Impact of packet loss on CACC string stability performance , 2011, 2011 11th International Conference on ITS Telecommunications.

[52]  Jason R. Marden,et al.  Cooperative Control and Potential Games , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[53]  Theodore L. Willke,et al.  A survey of inter-vehicle communication protocols and their applications , 2009, IEEE Communications Surveys & Tutorials.

[54]  Mario Gerla,et al.  Platoon-Based Driving Protocol Based on Game Theory for Multimedia Transmission over VANET , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[55]  Liuqing Yang,et al.  Intelligent transportation spaces: vehicles, traffic, communications, and beyond , 2010, IEEE Communications Magazine.

[56]  Pavle Bujanovic,et al.  Development of a simulation platform for safety impact analysis considering vehicle dynamics, sensor errors, and communication latencies: Assessing cooperative adaptive cruise control under cyber attack , 2018, Transportation Research Part C: Emerging Technologies.

[57]  Xiao-Yun Lu,et al.  Cooperative Adaptive Cruise Control (CACC) for Truck Platooning: Operational Concept Alternatives , 2015 .

[58]  Philip N. Brown,et al.  Security Against Impersonation Attacks in Distributed Systems , 2017, IEEE Transactions on Control of Network Systems.

[59]  Nathan van de Wouw,et al.  Graceful degradation of CACC performance subject to unreliable wireless communication , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).

[60]  Guoyuan Wu,et al.  Developing a Distributed Consensus-Based Cooperative Adaptive Cruise Control System for Heterogeneous Vehicles with Predecessor Following Topology , 2017 .

[61]  Sanjay E. Sarma,et al.  A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.

[62]  Jeroen Ploeg,et al.  Interaction Protocols for Cooperative Merging and Lane Reduction Scenarios , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[63]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[64]  Qing-Long Han,et al.  Cyber Attack Detection in Platoon-Based Vehicular Networked Control Systems , 2018, 2018 IEEE 27th International Symposium on Industrial Electronics (ISIE).

[65]  C. F. Mecklenbrauker,et al.  Performance analysis of vehicle-to-vehicle tunnel measurements at 5.9 GHz , 2011, 2011 XXXth URSI General Assembly and Scientific Symposium.

[66]  Karl Henrik Johansson,et al.  A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems , 2018, 2019 American Control Conference (ACC).

[67]  Stephen P. Boyd,et al.  Minimizing Effective Resistance of a Graph , 2008, SIAM Rev..

[68]  Wenhu Qin,et al.  Research on a DSRC-Based Rear-End Collision Warning Model , 2014, IEEE Transactions on Intelligent Transportation Systems.

[69]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[70]  Prabir Barooah,et al.  Stability and robustness of large platoons of vehicles with double‐integrator models and nearest neighbor interaction , 2013 .

[71]  Pandi Vijayakumar,et al.  Comprehensive survey on security services in vehicular ad-hoc networks , 2016 .

[72]  Ming Li,et al.  Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[73]  Philip Koopman,et al.  Autonomous Vehicle Safety: An Interdisciplinary Challenge , 2017, IEEE Intelligent Transportation Systems Magazine.

[74]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[75]  Paulo Tabuada,et al.  Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).