2020
DOI: 10.1109/tits.2019.2934481
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Cyber Attacks Detection and Recovery Mechanism for Vehicle Platooning

Abstract: This paper is concerned with the distributed attack detection and recovery in a vehicle platooning control system, wherein inter-vehicle information is propagated via a wireless communication network. An active adversary may launch malicious cyber attacks to compromise both sensor measurements and control command data due to the openness of the wireless communication. First, a distributed attack detection algorithm is developed to identify any of those attacks. The core of the algorithm lies in that each desig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
46
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 126 publications
(46 citation statements)
references
References 52 publications
0
46
0
Order By: Relevance
“…This completes the proof. Remark 4: In light of Theorem 1, the proposed distributed joint state and sensor fault estimation problem can be cast into the feasibility problem of a set of recursive linear matrix inequality (RLMI) in (22). Through Theorem 1, one can recursively solve out the estimator i's gain matrix sequence L i for each T-S fuzzy model rule and determine optimized state estimation ellipsoids X i k+1 enclosing the true augmented state of the vehicle despite the existence of UBB external disturbance, UBB measurement noise, incomplete measurement, and sensor saturation.…”
Section: Applying a Cholesky Factorization One Hasmentioning
confidence: 99%
See 1 more Smart Citation
“…This completes the proof. Remark 4: In light of Theorem 1, the proposed distributed joint state and sensor fault estimation problem can be cast into the feasibility problem of a set of recursive linear matrix inequality (RLMI) in (22). Through Theorem 1, one can recursively solve out the estimator i's gain matrix sequence L i for each T-S fuzzy model rule and determine optimized state estimation ellipsoids X i k+1 enclosing the true augmented state of the vehicle despite the existence of UBB external disturbance, UBB measurement noise, incomplete measurement, and sensor saturation.…”
Section: Applying a Cholesky Factorization One Hasmentioning
confidence: 99%
“…Remark 5: The interior-point algorithm usually has a polynomial-time complexity O(RM 3 ), where R is the total row size of the main LMIs, M is the total number of scalar decision variables of the main LMI (22). Since R and M are dependent on n x , n u , n y , n w , n v , and n f , the computational complexity of the developed recursive algorithm depends polynomially on the dimensions of each sensing node's parameter variables.…”
Section: Applying a Cholesky Factorization One Hasmentioning
confidence: 99%
“…To improve the cyberphysical security of EVs with four motor drives, [151] proposed a coordinated detection methodology that combines state observer and performance-based evaluation metrics. Currently, the research of cybersecurity of EVs is still at an early stage, and most of the literature focus on driving-level control systems, such as detection and recovery mechanism design for vehicle platooning [19], [20]. Cyber-physical security issues of vehicle powertrain and power electronic systems are not well addressed in both academia and the industries, and few studies have been devoted to this area.…”
Section: Stealthy Attackmentioning
confidence: 99%
“…Further, [3], [12]- [15] presented mitigation techniques and solution frameworks to defend modern vehicles against cyber-attacks such as secure onboard diagnostics (OBD-II) port, better firewall, reliable hardware, secure software updates, penetration testing, and code reviews. In addition, some analytics and detection methodologies for in-vehicle network security [16]- [18] and control systems [19], [20] have been studied. Fig.…”
mentioning
confidence: 99%
See 1 more Smart Citation