A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons

Vehicle-to-vehicle communication enables autonomous platoons to boost traffic efficiency and safety, while ensuring string stability with a constant spacing policy. However, communication-based controllers are susceptible to a range of cyber-attacks. In this paper, we propose a distributed attack mitigation defense framework with a dual-mode control system reconfiguration scheme to prevent a compromised platoon member from causing collisions via message falsification attacks. In particular, we model it as a switched system consisting of a communication-based cooperative controller and a sensor-based local controller and derive conditions to achieve global uniform exponential stability (GUES) as well as string stability in the sense of platoon operation. The switching decision comes from game-theoretic analysis of the attacker and the defender’s interactions. In this framework, the attacker acts as a leader that chooses whether to engage in malicious activities and the defender decides which control system to deploy with the help of an anomaly detector. Imperfect detection reports associate the game with imperfect information. A dedicated state constraint further enhances safety against bounded but aggressive message modifications in which a bounded solution may still violate practical constraint e.g. vehicles nearly crashing. Our formulation uniquely combines switched systems with security games to strategically improve the safety of such autonomous vehicle systems.

[1]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[2]  Sara Dadras,et al.  Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment , 2018, 2018 Annual American Control Conference (ACC).

[3]  Geir E. Dullerud,et al.  Optimal Disturbance Attenuation for Discrete-Time Switched and Markovian Jump Linear Systems , 2006, SIAM J. Control. Optim..

[4]  Junqi Yang,et al.  Simultaneous state and output disturbance estimations for a class of switched linear systems with unknown inputs , 2017, Int. J. Syst. Sci..

[5]  Dan Zhang,et al.  Distributed Secure Platoon Control of Connected Vehicles Subject to DoS Attack: Theory and Application , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[6]  Jianqiang Wang,et al.  Stability and Scalability of Homogeneous Vehicular Platoon: Study on the Influence of Information Flow Topologies , 2016, IEEE Transactions on Intelligent Transportation Systems.

[7]  Junaid Qadir,et al.  Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.

[8]  Sushanta Karmakar,et al.  A Game Theory Based Multi Layered Intrusion Detection Framework for Wireless Sensor Networks , 2018, Int. J. Wirel. Inf. Networks.

[9]  Mai Abdelhakim,et al.  Anomaly Detection for Cooperative Adaptive Cruise Control in Autonomous Vehicles Using Statistical Learning and Kinematic Model , 2021, IEEE Transactions on Intelligent Transportation Systems.

[10]  Andrew McLennan,et al.  Gambit: Software Tools for Game Theory , 2006 .

[11]  Rajesh Rajamani,et al.  Vehicle dynamics and control , 2005 .

[12]  Tarek Raïssi,et al.  Interval observers based fault detection for switched systems with L∞ performances , 2020, 2020 European Control Conference (ECC).

[13]  Edison Pignaton de Freitas,et al.  Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning , 2017, 2017 IEEE Vehicular Networking Conference (VNC).

[14]  Dr.Irshad Ahmed Sumra,et al.  Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .

[15]  Luca Zaccarian,et al.  Practical Stabilization of Switched Affine Systems With Dwell-Time Guarantees , 2019, IEEE Transactions on Automatic Control.

[16]  Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[17]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[18]  Guosong Yang,et al.  Finite data-rate stabilization of a switched linear system with unknown disturbance* , 2016 .

[19]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[20]  Ilya V. Kolmanovsky,et al.  Game Theory Controller for Hybrid Electric Vehicles , 2014, IEEE Transactions on Control Systems Technology.

[21]  Hideaki Ishii,et al.  Dynamic Quantized Leader-follower Consensus under Denial-of-Service Attacks , 2020, 2020 59th IEEE Conference on Decision and Control (CDC).

[22]  Hesham A. Rakha,et al.  Game theory algorithm for intersection-based cooperative adaptive cruise control (CACC) systems , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.

[23]  Yang Tao,et al.  Power control algorithm of cognitive radio based on non-cooperative game theory , 2013, China Communications.

[24]  Riccardo M. G. Ferrari,et al.  A Sliding Mode Observer Approach for Attack Detection and Estimation in Autonomous Vehicle Platoons using Event Triggered Communication , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[25]  Miguel Torres-Torriti,et al.  Introductory Survey to Open-Source Mobile Robot Simulation Software , 2010, 2010 Latin American Robotics Symposium and Intelligent Robotics Meeting.

[26]  Pierluigi Pisu,et al.  Replay Attack Detection in a Platoon of Connected Vehicles with Cooperative Adaptive Cruise Control , 2018, 2018 Annual American Control Conference (ACC).

[27]  Li Li,et al.  String stability for vehicular platoon control: Definitions and analysis methods , 2019, Annu. Rev. Control..

[28]  Tansu Alpcan,et al.  Strategic Mitigation Against Wireless Attacks on Autonomous Platoons , 2021, ECML/PKDD.

[29]  Jason R. Marden,et al.  Game Theory and Distributed Control , 2015 .

[30]  Falko Dressler,et al.  Plexe: A platooning extension for Veins , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[31]  Tansu Alpcan,et al.  Network Security , 2010 .

[32]  Michael Defoort,et al.  Hybrid sliding mode observer for switched linear systems with unknown inputs , 2014, J. Frankl. Inst..

[33]  Sidi-Mohammed Senouci,et al.  A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology , 2016, 2016 IEEE International Conference on Communications (ICC).