Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks

Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavi...

Full description

Saved in:
Bibliographic Details
Main Authors: Yang, Tianci, Murguia, Carlos, Nesi, Dragan, Yuen, Chau
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/181002
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-181002
record_format dspace
spelling sg-ntu-dr.10356-1810022024-11-11T02:06:54Z Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks Yang, Tianci Murguia, Carlos Nesi, Dragan Yuen, Chau School of Electrical and Electronic Engineering School of Mechanical and Aerospace Engineering Engineering Connected vehicles Cyber-physical systems Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavily rely on embedded software, hardware, and communication networks that make them vulnerable to a range of cyberattacks. Cyberattacks to a particular CAV compromise the entire platoon as CACC schemes propagate corrupted data to neighboring vehicles potentially leading to traffic delays and collisions. Physics-based monitors can be used to detect the presence of False Data Injection (FDI) attacks to CAV sensors; however, given enough system knowledge, adversaries are still able to launch a range of attacks that can surpass the detection scheme by hiding within the system disturbances and uncertainty - we refer to this class of attacks as stealthy FDI attacks. Stealthy attacks are hard to deal with as they affect the platoon dynamics without being noticed. In this manuscript, we propose a design methodology (built around a series convex programs) to synthesize distributed attack monitors and H ∞ CACC controllers that minimize the joint effect of stealthy FDI attacks and system disturbances on the platoon dynamics while guaranteeing a prescribed platooning performance. Computer simulations are provided to illustrate the performance of out tools. 2024-11-11T02:06:54Z 2024-11-11T02:06:54Z 2024 Journal Article Yang, T., Murguia, C., Nesi, D. & Yuen, C. (2024). Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks. IEEE Internet of Things Journal, 3459590-. https://dx.doi.org/10.1109/JIOT.2024.3459590 2327-4662 https://hdl.handle.net/10356/181002 10.1109/JIOT.2024.3459590 2-s2.0-85205141293 3459590 en IEEE Internet of Things Journal © 2024 IEEE. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering
Connected vehicles
Cyber-physical systems
spellingShingle Engineering
Connected vehicles
Cyber-physical systems
Yang, Tianci
Murguia, Carlos
Nesi, Dragan
Yuen, Chau
Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
description Cooperative Adaptive Cruise Control (CACC) enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions. However, CAVs heavily rely on embedded software, hardware, and communication networks that make them vulnerable to a range of cyberattacks. Cyberattacks to a particular CAV compromise the entire platoon as CACC schemes propagate corrupted data to neighboring vehicles potentially leading to traffic delays and collisions. Physics-based monitors can be used to detect the presence of False Data Injection (FDI) attacks to CAV sensors; however, given enough system knowledge, adversaries are still able to launch a range of attacks that can surpass the detection scheme by hiding within the system disturbances and uncertainty - we refer to this class of attacks as stealthy FDI attacks. Stealthy attacks are hard to deal with as they affect the platoon dynamics without being noticed. In this manuscript, we propose a design methodology (built around a series convex programs) to synthesize distributed attack monitors and H ∞ CACC controllers that minimize the joint effect of stealthy FDI attacks and system disturbances on the platoon dynamics while guaranteeing a prescribed platooning performance. Computer simulations are provided to illustrate the performance of out tools.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Yang, Tianci
Murguia, Carlos
Nesi, Dragan
Yuen, Chau
format Article
author Yang, Tianci
Murguia, Carlos
Nesi, Dragan
Yuen, Chau
author_sort Yang, Tianci
title Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
title_short Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
title_full Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
title_fullStr Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
title_full_unstemmed Towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
title_sort towards crash-free autonomous driving: anomaly detection and control for resilience to stealthy sensor attacks
publishDate 2024
url https://hdl.handle.net/10356/181002
_version_ 1816858927271247872