False Data Injection Attack in a Platoon of CACC: Real-Time Detection and Isolation With a PDE Approach
Connected vehicles are potential solutions to address some of the existing challenges in transportation systems, such as emission, traffic congestion, and fuel consumption. However, vehicular communication networks endure from reliability and security issues. Cyber-attacks with performance-disruptin...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on intelligent transportation systems 2022-07, Vol.23 (7), p.8692-8703 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Connected vehicles are potential solutions to address some of the existing challenges in transportation systems, such as emission, traffic congestion, and fuel consumption. However, vehicular communication networks endure from reliability and security issues. Cyber-attacks with performance-disrupting purposes can lead to catastrophic collisions in connected vehicles and increase traffic congestion. To ensure safety and reliability, a monitoring system with the capability of diagnosing cyber-attacks is necessary for connected vehicles. In this study, we consider a platoon of connected vehicles equipped with cooperative adaptive cruise control (CACC) that is subjected to a specific type of cyber-attack, namely "False Data Injection" (FDI) attack. A smart FDI attack is modeled with ghost vehicles injection into the connected vehicles network to disrupt the performance of the whole system. To ease the analysis, we develop a partial differential equation (PDE) model for the CACC vehicle dynamics using its ordinary differential equations (ODE). Furthermore, a PDE observer is designed to detect the FDI attack and locate the attack's injection point in the platoon. Lyapunov stability theory has been utilized to verify the observer's convergence under no-attack scenario and study residuals' behaviors in the presence of the attack. A non-zero constant threshold is considered to provide robustness in attack detection despite the measurement noises. Eventually, the effectiveness of the proposed algorithm is evaluated with simulation studies. |
---|---|
ISSN: | 1524-9050 1558-0016 |
DOI: | 10.1109/TITS.2021.3085196 |