Cyber Attack Detection in Platoon-Based Vehicular Networked Control Systems

This paper is concerned with cyber attack detection problem in a platoon-based vehicular networked control system. In such a system, the information among vehicles is transmitted through a shared wireless communication network and also each vehicle has access to its own information measured by local sensors. These kind of systems are highly vulnerable to cyber attacks and therefore, cyber-security issues need to be properly addressed to ensure the safety of the systems. Among various cyber-security aspects, reliable attack detection is of utmost importance as the ability to detect cyber attacks in a timely manner can reduce the damage to the systems. Therefore, we present a cyber attack detection algorithm that is capable of detecting attacks violating both measurements and control command data. This algorithm is based on an ellipsoidal set-membership filtering approach which consists of two sets: prediction ellipsoid set and an estimation ellipsoid set calculated through updating the prediction ellipsoid set with the measurement data. The detection method depends on the existence of intersection between these two sets computed by the filter. Simulation results for some possible cyber attacks are provided to demonstrate the effectiveness of the proposed method.

[1]  Xiang Zhang,et al.  A Survey on Platoon-Based Vehicular Cyber-Physical Systems , 2016, IEEE Communications Surveys & Tutorials.

[2]  G. Karagiannis,et al.  Impact of packet loss on CACC string stability performance , 2011, 2011 11th International Conference on ITS Telecommunications.

[3]  Shixi Wen,et al.  Communication Scheduling and Control of a Platoon of Vehicles in VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[4]  Nathan van de Wouw,et al.  Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.

[5]  J K Hedrick,et al.  Optimized Vehicle Control/Communication Interaction in an Automated Highway System , 2001 .

[6]  P. Varaiya,et al.  Ellipsoidal Toolbox (ET) , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[7]  Andrea Goldsmith,et al.  Effects of communication delay on string stability in vehicle platoons , 2001, ITSC 2001. 2001 IEEE Intelligent Transportation Systems. Proceedings (Cat. No.01TH8585).

[8]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[9]  Mashrur Chowdhury,et al.  A Review of Communication, Driver Characteristics, and Controls Aspects of Cooperative Adaptive Cruise Control (CACC) , 2016, IEEE Transactions on Intelligent Transportation Systems.

[10]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[11]  Ge Guo,et al.  Hierarchical platoon control with heterogeneous information feedback , 2011 .

[12]  Raja Sengupta,et al.  An H/sub /spl infin// approach to networked control , 2005, IEEE Transactions on Automatic Control.

[13]  C.J. Tomlin,et al.  Decentralized spacing control of a string of multiple vehicles over lossy datalinks , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[14]  Peter J Seiler,et al.  Analysis of communication losses in vehicle control problems , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).

[15]  Antonio Pescapè,et al.  A consensus-based approach for platooning with inter-vehicular communications , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).