A resource-aware control approach to vehicle platoons under false data injection attacks

被引:6
|
作者
Yang, Fan [1 ]
Gu, Zhou [1 ]
Hua, Lingzhi [2 ]
Yan, Shen [1 ]
机构
[1] Nanjing Forestry Univ, Coll Mech & Elect Engn, Nanjing 210037, Peoples R China
[2] Nanjing Univ Finance & Econ, Grad Sch, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicle platoon; String stability; Cooperative adaptive cruise control; Event -triggered mechanism; Cyber attack; EVENT-TRIGGERED CONTROL; ADAPTIVE CRUISE CONTROL; COOPERATIVE CONTROL; COMMUNICATION; SYSTEMS; DELAY;
D O I
10.1016/j.isatra.2022.04.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless vehicle-to-vehicle communication brings inevitable imperfections. This work simultaneously addresses the resource utilization and security issues for a vehicle platoon. Inspired by the modeling of denial of service attacks, a novel queuing model is constructed to depict false data injection attacks. A switched event-triggered mechanism is proposed to optimize network resources. The transmission rate can be actively reduced when the system is under malicious attacks. Then, a unified error system is established, where string stability is interpreted as global exponential stability. By using a proper Lyapunov function, a co-design approach is developed for closed-loop controllers and event-triggering parameters, with which the vehicle platoon can maintain a small safety distance and resist the negative impacts of cyber attacks. Finally, the proposed methods are verified by a virtual vehicle platoon.(c) 2022 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:367 / 376
页数:10
相关论文
共 50 条
  • [31] A gambling approach to scalable resource-aware streaming
    Allani, Mouna
    Garbinato, Benoit
    Pedone, Fernando
    Stamenkovic, Marij A.
    SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2007, : 288 - +
  • [32] Resource-Aware Data Parallel Array Processing
    Clemens Grelck
    Cédric Blom
    International Journal of Parallel Programming, 2020, 48 : 652 - 674
  • [33] Ubiquitous Resource-Aware Clustering of Data Streams
    Chao, Ching-Ming
    Chao, Guan-Lin
    ENTERPRISE INFORMATION SYSTEMS, ICEIS 2011, 2012, 102 : 81 - 97
  • [34] Distributed Data-Driven Control for a Connected Autonomous Vehicle Platoon Subjected to False Data Injection Attacks
    Zhu, Panpan
    Jin, Shangtai
    Bu, Xuhui
    Hou, Zhongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (04) : 7527 - 7538
  • [35] Resource-Aware Data Parallel Array Processing
    Grelck, Clemens
    Blom, Cedric
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (04) : 652 - 674
  • [36] Resource-Aware Control and Dynamic Scheduling in CPS
    Heemels, W. P. M. H.
    CYBER PHYSICAL SYSTEMS: DESIGN, MODELING, AND EVALUATION, CYPHY 2015, 2015, 9361 : 1 - 7
  • [37] Detection of False Data Injection Attacks Using the Autoencoder Approach
    Wang, Chenguang
    Tindemans, Simon
    Pan, Kaikai
    Palensky, Peter
    2020 INTERNATIONAL CONFERENCE ON PROBABILISTIC METHODS APPLIED TO POWER SYSTEMS (PMAPS), 2020,
  • [38] False Data Injection Attacks for Output Tracking Control Systems
    Pang Zhonghua
    Hou Fangyuan
    Zhou Yuguo
    Sun Dehui
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 6747 - 6752
  • [39] Resource-Aware Estimation and Control for Edge Robotics: A Set-Based Approach
    Spatharakis, Dimitrios
    Avgeris, Marios
    Athanasopoulos, Nikolaos
    Dechouniotis, Dimitrios
    Papavassiliou, Symeon
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 2003 - 2020
  • [40] BMI-Based Load Frequency Control in Microgrids Under False Data Injection Attacks
    Javanmardi, Hamidreza
    Dehghani, Maryam
    Mohammadi, Mohsen
    Siamak, Sara
    Hesamzadeh, Mohammad Reza
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1021 - 1031