Advanced sensing technologies and communication capabilities of Connected and Autonomous Vehicles (CAVs) empower them to capture the dynamics of surrounding vehicles, including speeds and positions of those behind, enabling judicious responsive maneuvers. The acquired dynamics information of vehicles spurred the development of various cooperative platoon controls, particularly designed to enhance platoon stability with reduced spacing for reliable roadway capacity increase. These controls leverage abundant information transmitted through various communication topologies. Despite these advancements, the impact of different vehicle dynamics information on platoon safety remains underexplored, as current research predominantly focuses on stability analysis. This knowledge gap highlights the critical need for further investigation into how diverse vehicle dynamics information influences platoon safety. To address this gap, this research introduces a novel framework based on the concept of phase shift, aiming to scrutinize the tradeoffs between the safety and stability of CAV platoons formed upon bidirectional information flow topology. Our investigation focuses on platoon controls built upon bidirectional information flow topologies using diverse dynamics information of vehicles. Our research findings emphasize that the integration of various types of information into CAV platoon controls does not universally yield benefits. Specifically, incorporating spacing information can enhance both platoon safety and string stability. In contrast, velocity difference information can improve either safety or string stability, but not both simultaneously. These findings offer valuable insights into the formulation of CAV platoon control principles built upon diverse communication topologies. This research contributes a nuanced understanding of the intricate interplay between safety and stability in CAV platoons, emphasizing the importance of information dynamics in shaping effective control strategies.
EFFICIENT BLOCKCHAIN AUTHENTICATION SCHEME FOR VANETS
As the use of autonomous vehicles increase, the transportation infrastructure
as a whole becomes more susceptible to cyber-attacks due to
the increase of components that can communicate with one another and
the Internet. It has been shown that autonomous vehicles benefit greatly
from cooperating to perform many cost and life-saving applications such
as tailgating, advanced collision warning, and even traffic routing. To
secure the transportation infrastructure against this increasing risk, this
paper presents an efficient blockchain scheme for vehicular ad-hoc networks
of autonomous vehicles. In the proposed scheme, every vehicle
maintains blocks generated by its platoon which contain transactions
that evaluate the actions of every vehicle. Thus, vehicles will possess
different blocks and thus different blockchains as they join and leave platoons.
No central blockchain is maintained. These blocks are used as
a token by the vehicle to gain access to future platoons. The proposed
scheme uses the Schnorr digital signature scheme to create a secure signature
and reach consensus within the platoon. It is proven to be secure
under the given assumptions.
more »
« less
- Award ID(s):
- 1837472
- NSF-PAR ID:
- 10190266
- Date Published:
- Journal Name:
- Critical Infrastructure Protection XIV.
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The Intelligent Transportation System has become one of the most globally researched topics, with Connected and Autonomous Vehicles(CAV) at its core. The CAV applications can be improved by the study of vehicle platooning immune to realtime traffic and vehicular network losses. In this work, we explore the need to integrate the Network model and Platooning system model for highway environments. The proposed platoon model is designed to be adaptive in length, providing the node vehicles to merge and exit. This overcomes the assumption that all the platoon nodes should have a common source and destination. The challenges of the existing platoon model, such as relay selection, acceleration threshold, are addressed for highly modular platoon design. The presented algorithm for merge and exit events optimizes the trade-off between network parameters such as communication range and vehicle dynamic parameters such as velocity and acceleration threshold. It considers the network bounds like SINR and link stability and vehicle trajectory parameters like the duration of the vehicle in the platoon. This optimizes the traffic throughput while maintaining stability using the PID controller. The work tries to increase the vehicle inclusion time in the platoon while preserving the overall traffic throughput.more » « less
-
null (Ed.)Connected Autonomous Vehicular (CAV) platoon refers to a group of vehicles that coordinate their movements and operate as a single unit. The vehicle at the head acts as the leader of the platoon and determines the course of the vehicles following it. The follower vehicles utilize Vehicle-to-Vehicle (V2V) communication and automated driving support systems to automatically maintain a small fixed distance between each other. Reliance on V2V communication exposes platoons to several possible malicious attacks which can compromise the safety, stability, and efficiency of the vehicles. We present a novel distributed resiliency architecture, RePLACe for CAV platoon vehicles to defend against adversaries corrupting V2V communication reporting preceding vehicle position. RePLACe is unique in that it can provide real-time defense against a spectrum of communication attacks. RePLACe provides systematic augmentation of a platoon controller architecture with real-time detection and mitigation functionality using machine learning. Unlike computationally intensive cryptographic solutions RePLACe accounts for the limited computation capabilities provided by automotive platforms as well as the real-time requirements of the application. Furthermore, unlike control-theoretic approaches, the same framework works against the broad spectrum of attacks. We also develop a systematic approach for evaluation of resiliency of CAV applications against V2V attacks. We perform extensive experimental evaluation to demonstrate the efficacy of RePLACe.more » « less
-
This research explores the inherent vulnerability of nonlinear vehicle platoons characterized by the oscillatory behavior triggered by external perturbations. The perturbation exerted on the vehicle platoon is regarded as an external force on an object. Following the mechanical vibration analysis in mechanics, this research proposes a vibration-theoretic approach that advances our understanding of platoon vulnerability from two aspects. First, the proposed approach introduces damping intensity to characterize vehicular platoon vulnerability, which divides platoon oscillations into two types, i.e., underdamped and overdamped. The damping intensity measures the platoon’s recovery strength in responding to perturbations. Second, the proposed approach can obtain the resonance frequency of a nonlinear vehicle platoon, where resonance amplifies platoon oscillation magnitude when the external perturbation frequency equals the platoon’s damping oscillation frequency. The main contribution of this research lies in the analytical derivation of the closed-form formulas of damping intensity and resonance frequency. In particular, the proposed approach formulates platoon dynamics under perturbation as a second-order non-homogeneous ordinary differential equation, enabling rigorous derivations and analyses for platoons with complicated nonlinear car-following behaviors. Through simulations built on real-world data, this paper demonstrates that an overdamped vehicle platoon is more robust against perturbations, and an underdamped platoon can be destabilized easily by exerting a perturbation at the platoon’s resonance frequency. The theoretical derivations and simulation results shed light on the design of reliable platooning control, either for human-driven or automated vehicles, to suppress the adverse effects of oscillations.more » « less
-
null (Ed.)Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers' destination, intent or vehicles' movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructure (RSI). It is vital to authenticate data in IoV to make sure that legitimate data is being propagated in IoV. Thus, security stands as a vital factor in IoV. The existing literature contains some limitations for robust security in IoV such as high delay introduced by security algorithms, security without privacy, unreliable security and reduced overall communication efficiency. To address these issues, this paper proposes the Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol which avoids suspicious vehicles during message dissemination in IoV. Specifically, our proposed protocol comprises three components: i) certificate authority (CA) which maps vehicle's publicly available info such as number plates with cryptographic keys using ECC; ii) malicious vehicle (MV) detection algorithm which works based on trust level calculated using status message interactions; and iii) secure optimal path selection in an adaptive manner based on the intent of communications using ACO-AODV that avoids malicious vehicles. Experimental results illustrate that the proposed approach provides better results than the existing approaches.more » « less