Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions (2401.02306v3)

Published 4 Jan 2024 in eess.SY and cs.SY

Abstract: We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to safely navigate through a conflict area (e.g., traffic intersections, merging roadways, roundabouts). Previous studies have shown that such a network can be targeted by adversarial attacks causing traffic jams or safety violations ending in collisions. We focus on attacks targeting the V2X communication network used to share vehicle data and consider as well uncertainties due to noise in sensor measurements and communication channels. To combat these, motivated by recent work on the safe control of CAVs, we propose a trust-aware robust event-triggered decentralized control and coordination framework that can provably guarantee safety. We maintain a trust metric for each vehicle in the network computed based on their behavior and used to balance the tradeoff between conservativeness (when deeming every vehicle as untrustworthy) and guaranteed safety and security. It is important to highlight that our framework is invariant to the specific choice of the trust framework. Based on this framework, we propose an attack detection and mitigation scheme which has twofold benefits: (i) the trust framework is immune to false positives, and (ii) it provably guarantees safety against false positive cases. We use extensive simulations (in SUMO and CARLA) to validate the theoretical guarantees and demonstrate the efficacy of our proposed scheme to detect and mitigate adversarial attacks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (33)
  1. D. W. L. Li and D. Yao, “A survey of traffic control with vehicular communications,” IEEE Trans. on Intelligent Trans. Sys, vol. 15, no. 1, pp. pp. 425–432, 2013.
  2. D. de Waard, C. Dijksterhuis, and K. Brookhuis, “Merging into heavy motorway traffic by young and elderly drivers,” Accident Analysis & Prevention, vol. 41, no. 3, pp. pp. 588–597, 2009.
  3. I. Kavalchuk, A. Kolbasov, K. Karpukhin, A. Terenchenko et al., “The performance assessment of low-cost air pollution sensor in city and the prospect of the autonomous vehicle for air pollution reduction,” in IOP Conference Series: Materials Science and Engineering, vol. 819, no. 1.   IOP Publishing, 2020, p. 012018.
  4. V. A. van den Berg and E. T. Verhoef, “Autonomous cars and dynamic bottleneck congestion: The effects on capacity, value of time and preference heterogeneity,” Transportation Research Part B: Methodological, vol. 94, pp. 43–60, 2016.
  5. R. M. Shukla and S. Sengupta, “Analysis and detection of outliers due to data falsification attacks in vehicular traffic prediction application,” in 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, 2018, pp. 688–694.
  6. X. Sun, F. R. Yu, and P. Zhang, “A survey on cyber-security of connected and autonomous vehicles (cavs),” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6240–6259, 2022.
  7. M. Pham and K. Xiong, “A survey on security attacks and defense techniques for connected and autonomous vehicles,” Computers & Security, vol. 109, p. 102269, 2021.
  8. H. Xu, S. Feng, Y. Zhang, and L. Li, “A grouping-based cooperative driving strategy for cavs merging problems,” IEEE Trans. on Vehicular Technology, vol. 68, no. 6, pp. pp. 6125–6136, 2019.
  9. F. Xu and T. Shen, “Decentralized optimal merging control with optimization of energy consumption for connected hybrid electric vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 6, pp. 5539–5551, 2022.
  10. W. Xiao, C. G. Cassandras, and C. A. Belta, “Bridging the gap between optimal trajectory planning and safety-critical control with applications to autonomous vehicles,” Automatica, vol. 129, p. 109592, 2021.
  11. P. Lu, L. Zhang, B. B. Park, and L. Feng, “Attack-resilient sensor fusion for cooperative adaptive cruise control,” in 2018 21st International Conference on Intelligent Transportation Systems (ITSC), 2018, pp. 3955–3960.
  12. R. A. Biroon, P. Pisu, and Z. Abdollahi, “Real-time false data injection attack detection in connected vehicle systems with pde modeling,” in 2020 American Control Conference (ACC), 2020, pp. 3267–3272.
  13. S. Boddupalli, A. S. Rao, and S. Ray, “Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning,” IEEE Transactions on Intelligent Transportation Systems, pp. 1–18, 2022.
  14. A. Alipour-Fanid, M. Dabaghchian, and K. Zeng, “Impact of jamming attacks on vehicular cooperative adaptive cruise control systems,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 12 679–12 693, 2020.
  15. F. Farivar, M. Sayad Haghighi, A. Jolfaei, and S. Wen, “On the security of networked control systems in smart vehicle and its adaptive cruise control,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3824–3831, 2021.
  16. A. Jarouf, N. Meskin, S. Al-Kuwari, M. Shakerpour, and C. G. Cassanderas, “Security analysis of merging control for connected and automated vehicles,” in 2022 IEEE Intelligent Vehicles Symposium (IV), 2022, pp. 1739–1744.
  17. X. Zhao, A. Abdo, X. Liao, M. Barth, and G. Wu, “Evaluating cybersecurity risks of cooperative ramp merging in mixed traffic environments,” IEEE Intelligent Transportation Systems Magazine, pp. 2–15, 2022.
  18. H. M. Sabbir Ahmad, E. Sabouni, W. Xiao, C. Cassandras, and W. Li, “Evaluations of cyber attacks on cooperative control of connected and autonomous vehicles at bottleneck points,” in 2023 Network and Distributed System Security (NDSS) Symposium (Vehiclesec), 2023.
  19. H. M. S. Ahmad, E. Sabouni, W. Xiao, C. G. Cassandras, and W. Li, “Trust-aware resilient control and coordination of connected and automated vehicles,” in Proc. of 2023 IEEE International Intelligent Transportation Systems Conference, 2023.
  20. Q. A. Chen, Y. Yin, Y. Feng, Z. Mao, and H. Liu, “Exposing congestion attack on emerging connected vehicle based traffic signal control,” in Proceedings 2018 Network and Distributed System Security Symposium, 2018.
  21. M. Cheng, J. Zhang, S. Nazarian, J. Deshmukh, and P. Bogdan, “Trust-aware control for intelligent transportation systems,” in 2021 IEEE Intelligent Vehicles Symposium (IV), 2021, pp. 377–384.
  22. H. Hu, R. Lu, Z. Zhang, and J. Shao, “Replace: a reliable trust-based platoon service recommendation scheme in vanet,” IEEE Transactions on Vehicular Technology, vol. 66, pp. 1–1, 01 2016.
  23. H. Hu, R. Lu, and Z. Zhang, “Tpsq: Trust-based platoon service query via vehicular communications,” Peer-to-Peer Networking and Applications, vol. 10, 01 2017.
  24. H. Parwana, A. Mustafa, and D. Panagou, “Trust-based rate-tunable control barrier functions for non-cooperative multi-agent systems,” in 2022 IEEE 61st Conference on Decision and Control (CDC), 2022, pp. 2222–2229.
  25. K. Garlichs, A. Willecke, M. Wegner, and L. C. Wolf, “Trip: Misbehavior detection for dynamic platoons using trust,” in 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 2019, pp. 455–460.
  26. Y. Shoukry, S. Mishra, Z. Luo, and S. Diggavi, “Sybil attack resilient traffic networks: A physics-based trust propagation approach,” in 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), 2018, pp. 43–54.
  27. H. Xu, C. G. Cassandras, L. Li, and Y. Zhang, “Comparison of cooperative driving strategies for cavs at signal-free intersections,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 7614–7627, 2021.
  28. H. Xu, W. Xiao, C. G. Cassandras, Y. Zhang, and L. Li, “A general framework for decentralized safe optimal control of connected and automated vehicles in multi-lane signal-free intersections,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 10, pp. 17 382–17 396, 2022.
  29. M. Cheng, C. Yin, J. Zhang, S. Nazarian, J. Deshmukh, and P. Bogdan, “A general trust framework for multi-agent systems,” in Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, 2021, p. 332–340.
  30. W. Xiao and C. Belta, “Control barrier functions for systems with high relative degree,” in Proc. of 58th IEEE Conference on Decision and Control, Nice, France, 2019, pp. 474–479.
  31. E. Sabouni, H. S. Ahmad, W. Xiao, C. G. Cassandras, and W. Li, “Optimal control of connected automated vehicles with event-triggered control barrier functions: a test bed for safe optimal merging,” in 2023 IEEE Conference on Control Technology and Applications (CCTA), 2023, pp. 321–326.
  32. W. Xiao, C. Belta, and C. G. Cassandras, “Event-triggered control for safety-critical systems with unknown dynamics,” IEEE Transactions on Automatic Control, pp. 1–16, 2022.
  33. M. Kamal, M. Mukai, J. Murata, and T. Kawabe, “Model predictive control of vehicles on urban roads for improved fuel economy,” Control Systems Technology, IEEE Transactions on, vol. 21, pp. 831–841, 05 2013.
Citations (1)

Summary

We haven't generated a summary for this paper yet.