Employing a Model of Computation for Testing and Verifying the Security of Connected and Autonomous Vehicles

被引:0
|
作者
Alnaser, Ala Jamil [1 ]
Holland, James [2 ]
Sargolzaei, Arman [2 ]
机构
[1] Florida Polytech Univ, Math, Lakeland, FL 33805 USA
[2] Univ S Florida, Mech Engn Dept, Tampa, FL USA
关键词
Connected and autonomous; vehicles; Coverage; Model of; computation; Safety and; security; Testing and; verification framework; Secure cooperative adaptive; cruise control; NONLINEAR DYNAMICS; CONTROL DESIGN; SYSTEMS; GENERATION; VALIDATION; VERIFICATION; FRAMEWORK; DELAY;
D O I
10.4271/12-07-03-0020
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Testing and verifying the security of connected and autonomous vehicles (CAVs) under cyber-physical attacks is a critical challenge for ensuring their safety and reliability. Proposed in this article is a novel testing framework based on a model of computation that generates scenarios and attacks in a closed-loop manner, while measuring the safety of the unit under testing (UUT), using a verification vector. The framework was applied for testing the performance of two cooperative adaptive cruise control (CACC) controllers under false data injection (FDI) attacks. Serving as the baseline controller is one of a traditional design, while the proposed controller uses a resilient design that combines a model and learning-based algorithm to detect and mitigate FDI attacks in real-time. The simulation results show that the resilient controller outperforms the traditional controller in terms of maintaining a safe distance, staying below the speed limit, and the accuracy of the FDI estimation.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Security of connected and automated vehicles
    Chowdhury, Mashrur
    Islam, Mhafuzul
    Khan, Zadid
    Bridge, 2019, 49 (03) : 46 - 56
  • [32] TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing
    Kobashi, Takanori
    Yoshizawa, Masatoshi
    Washizaki, Hironori
    Fukazawa, Yoshiaki
    Yoshioka, Nobukazu
    Okubo, Takano
    Kaiya, Haruhiko
    2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), 2015,
  • [33] Security Analysis of Connected Autonomous Vehicles (CAVs): Challenges, Issues, Defenses, and Open Problems
    Chowdhury, N. M. Istiak
    Hasan, Ragib
    2024 IEEE WORLD FORUM ON PUBLIC SAFETY TECHNOLOGY, WFPST 2024, 2024, : 81 - 86
  • [34] Safety and security of autonomous vehicles
    Kumari, Saru
    Xiong, Hu
    Khoukhi, Lyes
    Rodrigues, Joel J. P. C.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [35] Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles
    He, Qiyi
    Meng, Xiaolin
    Qu, Rong
    Xi, Ruijie
    MATHEMATICS, 2020, 8 (08)
  • [36] Increased security for autonomous vehicles
    JOT, Journal fuer Oberflaechentechnik, 2020, 60 (03): : 24 - 25
  • [37] Impact of Connected Vehicles and Autonomous Vehicles on Future Transportation
    Lin, Pei-Sung
    Wang, Zhenyu
    Guo, Rui
    Bridging the East and West: Theories and Practices of Transportation in the Asia Pacific, 2016, : 46 - 53
  • [38] Guest Editorial: Connected And Autonomous Vehicles
    Yang, Qing
    Wang, Honggang
    Shi, Weisong
    Liu, Ye
    Dinh Thai Hoang
    Molinaro, Antonella
    Onishi, Ryokichi
    IEEE NETWORK, 2023, 37 (04): : 180 - 182
  • [39] Secure Operations of Connected and Autonomous Vehicles
    Han, Jinpeng
    Ju, Zhiyang
    Chen, Xiaoguang
    Yang, Manzhi
    Zhang, Hui
    Huai, Rouxing
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2023, 8 (11): : 4484 - 4497
  • [40] Connected autonomous vehicles: State of practice
    Islam, Muhammad Mobaidul
    Newaz, Abdullah Al Redwan
    Song, Li
    Lartey, Benjamin
    Lin, Shih-Chun
    Fan, Wei
    Hajbabaie, Ali
    Khan, Mubbashar Altaf
    Partovi, Alireza
    Phuapaiboon, Tienake
    Homaifar, Abdollah
    Karimoddini, Ali
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2023, 39 (05) : 684 - 700