Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavi...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/181002 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-181002 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1810022024-11-11T02:06:54Z Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks Yang, Tianci Murguia, Carlos Nesi, Dragan Yuen, Chau School of Electrical and Electronic Engineering School of Mechanical and Aerospace Engineering Engineering Connected vehicles Cyber-physical systems Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavily rely on embedded software, hardware, and communication networks that make them vulnerable to a range of cyberattacks. Cyberattacks to a particular CAV compromise the entire platoon as CACC schemes propagate corrupted data to neighboring vehicles potentially leading to traffic delays and collisions. Physics-based monitors can be used to detect the presence of False Data Injection (FDI) attacks to CAV sensors; however, given enough system knowledge, adversaries are still able to launch a range of attacks that can surpass the detection scheme by hiding within the system disturbances and uncertainty - we refer to this class of attacks as stealthy FDI attacks. Stealthy attacks are hard to deal with as they affect the platoon dynamics without being noticed. In this manuscript, we propose a design methodology (built around a series convex programs) to synthesize distributed attack monitors and H ∞ CACC controllers that minimize the joint effect of stealthy FDI attacks and system disturbances on the platoon dynamics while guaranteeing a prescribed platooning performance. Computer simulations are provided to illustrate the performance of out tools. 2024-11-11T02:06:54Z 2024-11-11T02:06:54Z 2024 Journal Article Yang, T., Murguia, C., Nesi, D. & Yuen, C. (2024). Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks. IEEE Internet of Things Journal, 3459590-. https://dx.doi.org/10.1109/JIOT.2024.3459590 2327-4662 https://hdl.handle.net/10356/181002 10.1109/JIOT.2024.3459590 2-s2.0-85205141293 3459590 en IEEE Internet of Things Journal © 2024 IEEE. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering Connected vehicles Cyber-physical systems |
spellingShingle |
Engineering Connected vehicles Cyber-physical systems Yang, Tianci Murguia, Carlos Nesi, Dragan Yuen, Chau Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
description |
Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavily rely on embedded software, hardware, and communication networks that make them vulnerable to a range of cyberattacks. Cyberattacks to a particular CAV compromise the entire platoon as CACC schemes propagate corrupted data to neighboring vehicles potentially leading to traffic delays and collisions. Physics-based monitors can be used to detect the presence of False Data Injection (FDI) attacks to CAV sensors; however, given enough system knowledge, adversaries are still able to launch a range of attacks that can surpass the detection scheme by hiding within the system disturbances and uncertainty - we refer to this class of attacks as stealthy FDI attacks. Stealthy attacks are hard to deal with as they affect the platoon dynamics without being noticed. In this manuscript, we propose a design methodology (built around a series convex programs) to synthesize distributed attack monitors and H ∞ CACC controllers that minimize the joint effect of stealthy FDI attacks and system disturbances on the platoon dynamics while guaranteeing a prescribed platooning performance. Computer simulations are provided to illustrate the performance of out tools. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Yang, Tianci Murguia, Carlos Nesi, Dragan Yuen, Chau |
format |
Article |
author |
Yang, Tianci Murguia, Carlos Nesi, Dragan Yuen, Chau |
author_sort |
Yang, Tianci |
title |
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
title_short |
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
title_full |
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
title_fullStr |
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
title_full_unstemmed |
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
title_sort |
towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/181002 |
_version_ |
1816858927271247872 |