Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks

Published 19 Jun 2021 in eess.SY and cs.SY | (2106.10448v1)

Abstract: Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of vehicles on the highway to form in closely-coupled automated platoons to increase highway capacity and safety, and decrease fuel consumption and CO2 emissions. The underlying mechanism behind CACC is the use of Vehicle-to-Vehicle (V2V) wireless communication networks to transmit acceleration commands to adjacent vehicles in the platoon. However, the use of V2V networks leads to increased vulnerabilities against faults and cyberattacks at the communication channels. Communication networks serve as new access points for malicious agents trying to deteriorate the platooning performance or even cause crashes. Here, we address the problem of increasing robustness of CACC schemes against cyberattacks by the use of multiple V2V networks and a data fusion algorithm. The idea is to transmit acceleration commands multiple times through different communication networks (channels) to create redundancy at the receiver side. We exploit this redundancy to obtain attack-free estimates of acceleration commands. To accomplish this, we propose a data-fusion algorithm that takes data from all channels, returns an estimate of the true acceleration command, and isolates compromised channels. Note, however, that using estimated data for control introduces uncertainty into the loop and thus decreases performance. To minimize performance degradation, we propose a robust $H_{\infty}$ controller that reduces the joint effect of estimation errors and sensor/channel noise in the platooning performance (tracking performance and string stability). We present simulation results to illustrate the performance of our approach.

Citations (9)

Summary

  • The paper introduces a robust CACC scheme that uses multiple wireless V2V channels and a resilient data fusion algorithm to reconstruct true acceleration commands even under cyberattacks.
  • The method guarantees bounded reconstruction error through majority-based selection from redundant channels, ensuring vehicle platoon stability and enhanced control performance.
  • Integration of a discrete-time H∞ controller secures input-to-state stability by mitigating noise and disturbances, even during continuous adversarial attacks.

Robust Cooperative Adaptive Cruise Control under Cyber-Attacks via Multiple V2V Networks

Introduction

Cooperative Adaptive Cruise Control (CACC) technology leverages vehicle-to-vehicle (V2V) communication to enable closely-coupled vehicle platoons for increased highway capacity and improved safety, as well as reduced fuel consumption and emissions. However, the integration of V2V communication channels exposes platoons to cyber-attacks—primarily due to the vulnerabilities inherent in wireless networking. The paper "A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks" (2106.10448) addresses the need for resilience in CACC systems by proposing an architecture that utilizes multiple redundant wireless networks and a robust data fusion algorithm to mitigate attacks and transmission faults.

System Model and Attack Threats

The proposed CACC system is modeled as a platoon of vehicles where each follower receives multiple, independent streams of acceleration command data from its predecessor through different wireless networks (e.g., LTE/5G and DSRC). This redundancy creates the potential for robust estimation and isolation of malicious or faulty channels. Figure 1

Figure 1: CACC-equipped vehicle platoon under network attacks, where vehicles leverage multiple network channels for V2V communication, with some channels possibly under attack.

Attacks can manifest as arbitrary additive vector corruptions on any subset of the channels, which may be chosen in a time-varying manner. The dominant cyber-physical attack modalities addressed include injection attacks (e.g., false data injection, replay, and jamming) that either disrupt message integrity or introduce spurious signals. The attack model is general: the set of attacked channels at each step is unknown and time-varying, but the attacker is assumed not to control half or more of the communication channels simultaneously.

Secure Data Fusion via Redundant V2V Channels

The core enabler of resilience is a data fusion and estimation technique that aggregates possibly compromised channel signals. Let NN denote the total number of channels, qq the (unknown) upper bound on the number of attacked channels (q<N/2q < N/2), and ui1u_{i-1} the true acceleration command sent from vehicle i1i-1. Each vehicle ii receives a vector UiU_i of measurements from its NN inbound channels, each of which may be corrupted by both noise and attack signals.

The critical insight (proved in the paper via contradiction) is that unique reconstruction of ui1u_{i-1} from UiU_i is possible if and only if strictly fewer than half of the channels are compromised at each time step (cf. Mo & Sinopoli, 2015; Fawzi et al., 2014). Thus, majority logic can be exploited: attack- and noise-resilient estimation reduces to an appropriate selection over subsets of the received data.

The estimation strategy proceeds by:

  • Exhaustively calculating, for all subsets JJ of size NqN-q, the statistic πiJ=maxjJu^iJUij\pi_{iJ} = \max_{j \in J} |\hat{u}_{iJ} - U_{ij}| where u^iJ\hat{u}_{iJ} is the mean of the subset.
  • Selecting the subset σi\sigma_i with the minimal πiJ\pi_{iJ}.
  • Using u^σi\hat{u}_{\sigma_i} as the robust, attack-resilient estimate of ui1u_{i-1}.

The reconstruction error is guaranteed to be bounded by a constant multiple of the worst-case channel noise, independent of the attacker’s injected signal magnitude. An example with N=3N=3 channels and randomized per-step attacks demonstrates that the fusion algorithm can reliably track the true acceleration, maintaining bounded estimation errors even with high attack variance.

Channel Attack Detection and Isolation

Beyond providing resilient estimation, the architecture includes mechanisms for online attack detection and channel isolation:

  • A simple thresholding rule based on known channel noise bounds is used: if any channel’s signal deviates from the consensus mean by more than a conservative threshold, an attack is detected.
  • Isolation is performed by comparing each channel’s value to a randomly selected "trusted" channel from the identified benign subset, again using a threshold based on expected noise statistics.

The efficiency of this scheme is characterized by empirical hit-rates in simulations, successfully isolating active attacks in the majority of steps even with nonstationary attack profiles and network-induced perturbations.

HH_\infty Robust Controller Integration

Using estimated, potentially uncertain acceleration commands for feedback can degrade control performance or stability. To mitigate this, the paper integrates a discrete-time HH_\infty controller for string stability. The controller synthesizes state feedback gains using standard linear matrix inequality (LMI) techniques (Boyd et al., 1994; He & Wang, 2006), incorporating both estimation errors from the fusion stage and sensor/actuator noise. Figure 2

Figure 2: Schematic of the proposed data fusion algorithm as embedded in each vehicle’s controller pipeline.

Key results include:

  • The closed-loop platoon dynamics with the HH_\infty controller and fusion estimator are proven to be Input-to-State Stable (ISS) with respect to aggregate noise and estimation errors, even under continuous adversarial action, provided the q<N/2q < N/2 assumption holds.
  • Simulation with N=3N=3 channels per V2V link and q=1q=1 per time step shows that HH_\infty-optimized gains substantially reduce the attenuation of disturbances and error amplification compared with classical CACC controllers, achieving γ=1.0198\gamma=1.0198 vs. baseline γ=5.1000\gamma=5.1000 in HH_\infty norm.

Implications, Limitations, and Future Directions

This research provides a concrete framework for enhancing CACC resilience via data-level voting and robust estimation, as opposed to relying solely on cryptographic/secure network protocols or fallback safety logics. The strategy is particularly practical given the heterogeneous multi-channel wireless interfaces available in modern vehicles (DSRC, C-V2X, 4G/5G), and places computational requirements only on local channel subset selection, mean/absolute deviation computation, and LMI-based control law synthesis.

However, the approach assumes a known upper bound qq, sufficient channel diversity (N3N \geq 3), and that the majority of channels remain uncompromised at each instant—constraints that reflect realistic but not universal attacker models. Further, channel noise bounds must be characterized for thresholds to be robust, and the method assumes that compromised channels are not colluding to mimic valid statistics.

Practical implementation would also require robust channel time-synchronization, rapid attack isolation at the per-packet level, and integration with existing V2V security protocols. Scalability to higher NN is feasible but increases computational burden.

Potential future directions include:

  • Adaptive estimation of qq in real time based on observed channel statistics.
  • Integration with cryptographic attestation schemes for multi-level authentication.
  • Extension to nonlinear vehicle dynamics and non-homogeneous platoons.
  • Exploration of distributed voting among multiple follower vehicles exploiting network topology for redundancy.

Conclusion

The proposed multi-channel fusion and robust control framework demonstrably enhances the resilience of CACC systems to cyber-attacks on V2V channels and outperforms controller designs not accounting for communication channel vulnerabilities. This design paradigm provides a complementary strategy to traditional detection/isolation and protocol-layer defenses, and is applicable to a broad range of networked cyber-physical systems where communication-induced vulnerabilities are present.


Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.