A resource-aware control approach to vehicle platoons under false data injection attacks

被引:6
|
作者
Yang, Fan [1 ]
Gu, Zhou [1 ]
Hua, Lingzhi [2 ]
Yan, Shen [1 ]
机构
[1] Nanjing Forestry Univ, Coll Mech & Elect Engn, Nanjing 210037, Peoples R China
[2] Nanjing Univ Finance & Econ, Grad Sch, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicle platoon; String stability; Cooperative adaptive cruise control; Event -triggered mechanism; Cyber attack; EVENT-TRIGGERED CONTROL; ADAPTIVE CRUISE CONTROL; COOPERATIVE CONTROL; COMMUNICATION; SYSTEMS; DELAY;
D O I
10.1016/j.isatra.2022.04.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless vehicle-to-vehicle communication brings inevitable imperfections. This work simultaneously addresses the resource utilization and security issues for a vehicle platoon. Inspired by the modeling of denial of service attacks, a novel queuing model is constructed to depict false data injection attacks. A switched event-triggered mechanism is proposed to optimize network resources. The transmission rate can be actively reduced when the system is under malicious attacks. Then, a unified error system is established, where string stability is interpreted as global exponential stability. By using a proper Lyapunov function, a co-design approach is developed for closed-loop controllers and event-triggering parameters, with which the vehicle platoon can maintain a small safety distance and resist the negative impacts of cyber attacks. Finally, the proposed methods are verified by a virtual vehicle platoon.(c) 2022 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:367 / 376
页数:10
相关论文
共 50 条
  • [1] Resilient algorithm for distributed resource allocation under false data injection attacks
    Chen, Xingzhi
    Cai, Xin
    Gao, Bingpeng
    Nan, Xinyuan
    ASIAN JOURNAL OF CONTROL, 2024, 26 (04) : 1635 - 1645
  • [2] USV Control With Adaptive Compensation Under False Data Injection Attacks
    Bai, Panxin
    Zhang, Heng
    Zhang, Jian
    Li, Hongran
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [3] Linear Quadratic Gaussian Control Under False Data Injection Attacks
    Clark, Andrew
    Niu, Luyao
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 5737 - 5743
  • [4] Distributed Cooperative Control of Microgrid Under False Data Injection Attacks
    Chen, Yulin
    Qi, Donglian
    Li, Zhenming
    Wang, Zhenyu
    Zhang, Jianliang
    Yu, Miao
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2021, 45 (05): : 97 - 103
  • [5] Secure LQG control for a Quadrotor under false data injection attacks
    Lin, Hong
    Sun, Pei
    Cai, Chenxiao
    Lu, Shan
    Liu, He
    IET CONTROL THEORY AND APPLICATIONS, 2022, 16 (09): : 925 - 934
  • [6] Decoupling-Based Resilient Control of Vehicular Platoons Under Injection of False Wireless Data
    Yang, Kang
    Liu, Di
    Baldi, Simone
    Yu, Wenwu
    Lv, Chen
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (12) : 21500 - 21514
  • [7] A holistic approach for resource-aware adaptive data stream mining
    Gaber M.M.
    Yu P.S.
    New Gener Comput, 2006, 1 (95-115): : 95 - 115
  • [8] Resilient Control of Vehicular Platoons in The Presence of False Data Injection Attack
    Akbari, Amirreza
    Pejman, Hirad
    Sharifi, Iman
    Naraghi, Mahyar
    2022 10TH RSI INTERNATIONAL CONFERENCE ON ROBOTICS AND MECHATRONICS (ICROM), 2022, : 408 - 413
  • [9] Safeguard Vehicle Platooning Based on Resilient Control Against False Data Injection Attacks
    Zhao, Chengcheng
    Ma, Ruijie
    Wang, Mengzhi
    Xu, Jinming
    Cai, Lin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) : 17023 - 17037
  • [10] A holistic approach for resource-aware adaptive data stream mining
    Gaber, Mohamed Medhat
    Yu, Philip S.
    NEW GENERATION COMPUTING, 2007, 25 (01) : 95 - 115