Interaction network-based resilient consensus of connected vehicles against cyber-attacks

被引:1
|
作者
Liu, Yonggui [1 ,4 ]
Li, Zeming [1 ]
Guo, Ge [2 ,3 ]
机构
[1] South China Univ Technol, Sch Automat Sci & Engn, Key Lab Autonomous Syst & Network Control, Guangzhou, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Peoples R China
[3] Northeastern Univ Qinhuangdao, Sch Control Engn, Qinhuangdao, Peoples R China
[4] South China Univ Technol, Sch Automat Sci & Engn, Key Lab Autonomous Syst & Network Control, Guangzhou 510640, Peoples R China
来源
IET CONTROL THEORY AND APPLICATIONS | 2023年 / 17卷 / 06期
基金
中国国家自然科学基金;
关键词
SYSTEMS;
D O I
10.1049/cth2.12394
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper investigates a consensus problem of connected vehicle systems (CVSs) under cyber-attacks. In real application, dynamics and amplitude of cyber attacks are unknown and stochastic. From the defender's perspective, the neighbouring matrix based on threshold defence mechanism is designed to exclude exogenous and large enough attacks. For cyber-attacks whose amplitude lies in the measurement range, the dynamics is assumed to be an unknown nonlinear function of the states of the attacks and the vehicles. Based on such attack model, the neighbouring matrix and the control protocols of the vehicles, a state space model is first established for the CVSs. Then, an interaction network between the platoon layer in the original CVSs and the hidden layer in the virtual systems is constructed. By designing competitive interact matrices, stability of the overall system is ensured such that the state errors converge into a bounded range when the platoon layer suffers from cyber-attacks. The results still hold for the worst case, for example, both the platoon layer and the hidden layer are attacked simultaneously. The effectiveness and superiority of the method are illustrated by simulations.
引用
收藏
页码:744 / 756
页数:13
相关论文
共 50 条
  • [1] Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks
    Liu, Yonggui
    Li, Ziyuan
    Shen, Zhiping
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (05): : 2780 - 2800
  • [2] Internet of connected vehicles against cyber-attacks based on resilient adaptive event trigger mechanism control
    Yue, Wei
    Guo, Xiangjun
    Shen, Hongxia
    [J]. TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (02) : 223 - 236
  • [3] Observer-based adaptive ISMC for connected vehicles against cyber-attacks
    Yue, Wei
    Shen, Hongxia
    Guo, Xiangjun
    Wang, Liyuan
    [J]. MEASUREMENT & CONTROL, 2023, 56 (3-4): : 638 - 653
  • [4] Resilient Design of Leader-Follower Consensus Against Cyber-Attacks
    Sadabadi, Mahdieh S.
    Atman, Made Widhi Surya
    Aynala, Anirudh
    Gusrialdi, Azwirman
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 1080 - 1092
  • [5] Resilient Distributed Optimization Against Cyber-Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 3956 - 3961
  • [6] Distributed resilient consensus on general digraphs under cyber-attacks
    Iqbal, Muhammad
    Qu, Zhihua
    Gusrialdi, Azwirman
    [J]. EUROPEAN JOURNAL OF CONTROL, 2022, 68
  • [7] Influence of cyber-attacks on longitudinal safety of connected and automated vehicles
    Li, Ye
    Tu, Yu
    Fan, Qi
    Dong, Changyin
    Wang, Wei
    [J]. ACCIDENT ANALYSIS AND PREVENTION, 2018, 121 : 148 - 156
  • [8] Design of Resilient Supervisory Control for Autonomous Connected Vehicles Approaching Unsignalized Intersection in presence of Cyber-Attacks
    De Tommasi, Gianmaria
    Motta, Carlo
    Petrillo, Alberto
    Santini, Stefania
    [J]. IFAC PAPERSONLINE, 2023, 56 (02): : 587 - 592
  • [9] An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles
    Gupta, Sandeep
    Maple, Carsten
    Passerone, Roberto
    [J]. IEEE ACCESS, 2023, 11 : 90641 - 90669
  • [10] Design of Load Forecast Systems Resilient Against Cyber-Attacks
    Barreto, Carlos
    Koutsoukos, Xenofon
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 1 - 20