A resource-aware control approach to vehicle platoons under false data injection attacks

被引:6
|
作者
Yang, Fan [1 ]
Gu, Zhou [1 ]
Hua, Lingzhi [2 ]
Yan, Shen [1 ]
机构
[1] Nanjing Forestry Univ, Coll Mech & Elect Engn, Nanjing 210037, Peoples R China
[2] Nanjing Univ Finance & Econ, Grad Sch, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicle platoon; String stability; Cooperative adaptive cruise control; Event -triggered mechanism; Cyber attack; EVENT-TRIGGERED CONTROL; ADAPTIVE CRUISE CONTROL; COOPERATIVE CONTROL; COMMUNICATION; SYSTEMS; DELAY;
D O I
10.1016/j.isatra.2022.04.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless vehicle-to-vehicle communication brings inevitable imperfections. This work simultaneously addresses the resource utilization and security issues for a vehicle platoon. Inspired by the modeling of denial of service attacks, a novel queuing model is constructed to depict false data injection attacks. A switched event-triggered mechanism is proposed to optimize network resources. The transmission rate can be actively reduced when the system is under malicious attacks. Then, a unified error system is established, where string stability is interpreted as global exponential stability. By using a proper Lyapunov function, a co-design approach is developed for closed-loop controllers and event-triggering parameters, with which the vehicle platoon can maintain a small safety distance and resist the negative impacts of cyber attacks. Finally, the proposed methods are verified by a virtual vehicle platoon.(c) 2022 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:367 / 376
页数:10
相关论文
共 50 条
  • [41] Self-Healing Control of Nuclear Power Plants Under False Data Injection Attacks
    Yoo, Stephen
    Mohler, Greg
    Zhang, Fan
    NUCLEAR SCIENCE AND ENGINEERING, 2025, 199 (01) : 162 - 175
  • [42] Model-free predictive control of nonlinear systems under False Data Injection attacks?
    Zhang, Zeyu
    Li, Hongran
    Zhang, Heng
    Zhang, Jian
    Zhong, Zhaoman
    Xu, Weiwei
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [43] Cooperative Security Analysis of Industry Cloud Control Systems Under False Data Injection Attacks
    Zhao, Bing
    Gao, Qing
    Li, Yuzhe
    Lu, Jinhu
    Zhang, Kexin
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (05): : 3124 - 3133
  • [44] A Framework for Evaluating Connected Vehicle Security against False Data Injection Attacks
    Koley, Ipsita
    Adhikary, Sunandan
    Rohit, Rohit
    Dey, Soumyajit
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 913 - 920
  • [45] False Data Injection Attacks in Healthcare
    Ahmed, Mohiuddin
    Ullah, Abu S. S. M. Barkat
    DATA MINING, AUSDM 2017, 2018, 845 : 192 - 202
  • [46] Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements
    Taghiabadi, Elham Ramezani
    Gromov, Vladimir
    Fahland, Dirk
    van der Aalst, Wil M. P.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2014 CONFERENCES, 2014, 8841 : 237 - 257
  • [47] Accurate and resource-aware classification based on measurement data
    Marconato, Anna
    Gubian, Michele
    Boni, Andrea
    Caprile, Bruno G.
    Petri, Dario
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2008, 57 (09) : 2044 - 2051
  • [48] A Secure Control Design for Networked Control System with Nonlinear Dynamics under False-Data-Injection Attacks
    Sargolzaei, Arman
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 2693 - 2699
  • [49] Resource-Aware Multimedia Content Delivery: A Gambling Approach
    Allani, Mouna
    Garbinato, Benoit
    Pedone, Fernando
    COMPUTER JOURNAL, 2010, 53 (02): : 234 - 248
  • [50] Adaptive control of bilateral teleoperation systems with false data injection attacks and attacks detection
    Cai, Chuanjie
    Zhang, Yijun
    Chen, Qian
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 4407 - 4412