2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) 2017
DOI: 10.1109/hase.2017.39
|View full text |Cite
|
Sign up to set email alerts
|

String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks

Abstract: Cooperative Adaptive Cruise Control (CACC) is considered as a key enabling technology to automatically regulate the intervehicle distances in a vehicle platoon to improve traffic efficiency while maintaining safety. Although the wireless communication and physical processes in the existing CACC systems are integrated in one control framework, the coupling between wireless communication reliability and system states is not well modeled. Furthermore, the research on the impact of jamming attacks on the system st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(33 citation statements)
references
References 19 publications
0
33
0
Order By: Relevance
“…There are many kinds of cyber-attack such as denial of service (DoS), interference attack, false data injection attack and so on [21][22][23]. In this section we consider the false data injection attack.…”
Section: False Data Injection Attack Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many kinds of cyber-attack such as denial of service (DoS), interference attack, false data injection attack and so on [21][22][23]. In this section we consider the false data injection attack.…”
Section: False Data Injection Attack Modelsmentioning
confidence: 99%
“…Following the method in [21], the safe inter-vehicle distance is greatly shortened. Alipour-Fanid et al [22] conducted a comprehensive analysis of stability and safety for vehicle strings over wireless Rician fading channels under jamming attacks. They showed that fading channels degrade the performance of CACC systems through rich simulation experiments under various attacked scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…In Section III-D, we discuss the attacks that are still possible in the context of proactive security. This covers both general cITS and a specific example application, cooperative adaptive cruise control (CACC) [8], [9], [10], [11]. This application is a primary example of new developments in the field of cITS, which has recently gained the interest of the security community.…”
Section: Introductionmentioning
confidence: 99%
“…From a technological perspective, an adversary can perpetrate DoS attacks through disrupting the radio frequencies on wireless communication channels, which leads to congestion of those channels. Platoon behavior under DoS attacks is investigated in [23], where a drone flying above the platoon, namely the adversary, disrupts the platoon by using its limited power. It is shown that the best possible location to carry out an attack with a huge adverse impact is above the second vehicle and the impact decreases when the adversary moves down in the string.…”
Section: Introductionmentioning
confidence: 99%