2019 IEEE 58th Conference on Decision and Control (CDC) 2019
DOI: 10.1109/cdc40024.2019.9029315
|View full text |Cite
|
Sign up to set email alerts
|

A Sliding Mode Observer Approach for Attack Detection and Estimation in Autonomous Vehicle Platoons using Event Triggered Communication

Abstract: Platoons of autonomous vehicles are being investigated as a way to increase road capacity and fuel efficiency. Cooperative Adaptive Cruise Control (CACC) is one approach to controlling platoons longitudinal dynamics, which requires wireless communication between vehicles. In the present paper we use a sliding mode observer to detect and estimate cyberattacks threatening such wireless communication. In particular we prove stability of the observer and robustness of the detection threshold in the case of event-t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…Several attempts have been made to detect communication-based attacks. A sliding mode observer is proposed for cyber-attack detection and estimation in the case of event-triggered communication [8]. There is also a growing body of literature that recognises the effectiveness of machine learning based intrusion detection system applied on vehicular platooning [9]- [12].…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Several attempts have been made to detect communication-based attacks. A sliding mode observer is proposed for cyber-attack detection and estimation in the case of event-triggered communication [8]. There is also a growing body of literature that recognises the effectiveness of machine learning based intrusion detection system applied on vehicular platooning [9]- [12].…”
Section: A Literature Reviewmentioning
confidence: 99%
“…In section III, an SMO-based attack detection approach will be presented. The used SMO based approach originally only considers attacks to appear in the state equation [7], [11]. In [12], also attacks on part of the output equation are considered.…”
Section: Extended System For Observer Implementationmentioning
confidence: 99%
“…To this end, the system is transformed and extended such that all attacks again appear in the state equation only. In this work the extended system from [12] is used with the observer and detection threshold from [7]. However, here an even broader class of attacks is considered, where all outputs are subject to attacks.…”
Section: Extended System For Observer Implementationmentioning
confidence: 99%
See 2 more Smart Citations