Security of Vehicle Platooning: A Game-Theoretic Approach

被引:24
|
作者
Basiri, Mohammad Hossein [1 ]
Pirani, Mohammad [2 ]
Azad, Nasser L. [3 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Waterloo, Dept Syst Design Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Game theory; graph theory; Nash equilibrium; security; sensor placement; ADAPTIVE CRUISE CONTROL; CONTROL-SYSTEMS; IMPLEMENTATION; PERFORMANCE; ATTACKS; IMPACT; SAFETY;
D O I
10.1109/ACCESS.2019.2961002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The edge weights specify the quality of the communication links between the vehicles in both the unidirectional/bidirectional data transfer environments. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attackers objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as it can. The existence of Nash Equilibrium (NE) strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication weights between vehicles on the game value. The simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses.
引用
收藏
页码:185565 / 185579
页数:15
相关论文
共 50 条
  • [1] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [2] Dynamic Computation Offloading for Platooning Vehicles: A Stochastic Game-Theoretic Approach
    Liu, Shiyi
    Zhou, Jianshan
    Tian, Daxin
    Ren, Chenghao
    Duan, Xuting
    Sheng, Zhengguo
    [J]. PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 1505 - 1514
  • [3] Game-theoretic Approach for Complete Vehicle Energy Management
    Chen, H.
    Kessels, J. T. B. A.
    Donkers, M. C. F.
    Weiland, S.
    [J]. 2014 IEEE VEHICLE POWER AND PROPULSION CONFERENCE (VPPC), 2014,
  • [4] A game-theoretic approach to stochastic security and dependability evaluation
    Sallhammar, Karin
    Helvik, Bjarne E.
    Knapskog, Sven J.
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 61 - +
  • [5] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    [J]. 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [6] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    [J]. FUTURE INTERNET, 2022, 14 (12):
  • [7] A Game-Theoretic Framework for Studying Truck Platooning Incentives
    Farokhi, Farhad
    Johansson, Karl H.
    [J]. 2013 16TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS - (ITSC), 2013, : 1253 - 1260
  • [8] Game-theoretic Approach to Fleet Management for Vehicle to Grid Services
    Ziad, Choucair
    Rajamani, Haile-Selassie
    Manikas, Ioannis
    [J]. 2019 IEEE 19TH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2019), 2019,
  • [9] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [10] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64