The combination of connectivity and automation allows connected and autonomous vehicles (CAVs) to operate autonomously using advanced on-board sensors while communicating with each other via vehicle-to-vehicle (V2V) technology to enhance safety, efficiency, and mobility. One of the most promising features of CAVs is cooperative adaptive cruise control (CACC). This system extends the capabilities of conventional adaptive cruise control (ACC) by facilitating the exchange of critical parameters among vehicles to enhance safety, traffic flow, and efficiency. However, increased connectivity introduces new vulnerabilities, making CACC susceptible to cyber-attacks, including false data injection (FDI) attacks, which can compromise vehicle safety. To address this challenge, we propose a secure observer-based control design leveraging Lyapunov stability analysis, which is capable of mitigating the adverse impact of FDI attacks and ensuring system safety. This approach uniquely addresses system security without relying on a known lead vehicle model. The developed approach is validated through simulation results, demonstrating its effectiveness.
more »
« less
RESILIENT CONTROL UNDER CYBER-ATTACKS IN CONNECTED ACC VEHICLES
This paper focuses on the detection of cyber-attack on a communication channel and simultaneous radar health monitoring for a connected vehicle. A semi-autonomous adaptive cruise control (SA-ACC) vehicle is considered which has wireless communication with its immediately preceding vehicle to operate at small time-gap distances without creating string instability. However, the reliability of the wireless connectivity is critical for ensuring safe vehicle operation. The presence of two unknown inputs related to both sensor failure and cyber-attack seemingly poses a difficult estimation challenge. The dynamic system is first represented in descriptor system form. An observer with estimation error dynamics decoupled from the cyber-attack signal is developed. The performance of the observer is extensively evaluated in simulations. The estimation system is able to detect either a fault in the velocity measurement radar channel or a cyber-attack. Also, the proposed observer-based controller achieves resilient SA-ACC system under the cyber-attacks. The fundamental estimation algorithm developed herein can be extended in the future to enable cyber-attack detection in more complex connected vehicle architectures.
more »
« less
- Award ID(s):
- 1631133
- PAR ID:
- 10198608
- Date Published:
- Journal Name:
- Proceedings of the ASME Dynamic Systems and Control Conference
- ISSN:
- 2151-1853
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
With the large-scale deployment of connected and autonomous vehicles, the demand on wireless communication spectrum increases rapidly in vehicular networks. Due to increased demand, the allocated spectrum at the 5.9 GHz band for vehicular communication cannot be used efficiently for larger payloads to improve cooperative sensing, safety, and mobility. To achieve higher data rates, the millimeter-wave (mmWave) automotive radar spectrum at 76-81 GHz band can be exploited for communication. However, instead of employing spectral isolation or interference mitigation schemes between communication and radar, we design a joint system for vehicles to perform both functions using the same waveform. In this paper, we propose radar processing methods that use pilots in the orthogonal frequency-division multiplexing (OFDM) waveform. While the radar receiver exploits pilots for sensing, the communication receiver can leverage pilots to estimate the time-varying channel. The simulation results show that proposed radar processing can be efficiently implemented and meet the automotive radar requirements. We also present joint system design problems to find optimal resource allocation between data and pilot subcarriers based on radar estimation accuracy and effective channel capacity.more » « less
-
Abstract Teleoperation can enable human intervention to help handle instances of failure in autonomy thus allowing for much safer deployment of autonomous vehicle technology. Successful teleoperation requires recreating the environment around the remote vehicle using camera data received over wireless communication channels. This paper develops a new predictive display system to tackle the significant time delays encountered in receiving camera data over wireless networks. First, a new high gain observer is developed for estimating the position and orientation of the ego vehicle. The novel observer is shown to perform accurate state estimation using only GNSS and gyroscope sensor readings. A vector field method which fuses the delayed camera and Lidar data is then presented. This method uses sparse 3D points obtained from Lidar and transforms them using the state estimates from the high gain observer to generate a sparse vector field for the camera image. Polynomial based interpolation is then performed to obtain the vector field for the complete image which is then remapped to synthesize images for accurate predictive display. The method is evaluated on real-world experimental data from the nuScenes and KITTI datasets. The performance of the high gain observer is also evaluated and compared with that of the EKF. The synthesized images using the vector field based predictive display are compared with ground truth images using various image metrics and offer vastly improved performance compared to delayed images.more » « less
-
To address the cyber-physical security in PV farms, a hybrid cyber-attack detection is proposed in this manuscript. To secure PV farms, the proposed method integrates model-based and data-driven methods by fusing the detection score at the device and system levels. First, a model-based cyber-attack detection method is developed for each PV inverter. A residual between the estimation of the Kalman filter and measurement is calculated. By leveraging the calculated residual from all inverters, a squared Mahalanobis distance is developed for device detection score generation. At the system level, a convolutional neural network (CNN) is proposed to detect cyber-attack using the waveform data at the point of common coupling (PCC) in PV farms. To improve the CNN detection accuracy, a set of well-designed features are extracted from the raw waveform data. Finally, a weighted detection score fusion method is proposed to combine device and system detection scores by using their complementary strength. The feasibility and robustness of the proposed method are validated by testing cases and a comparative experiment.more » « less
-
null (Ed.)A high penetration level of smart devices and communication networks increases the threat of cyber-attacks in the distribution system. In this paper, we model a hidden, coordinated, net load redistribution attack (NLRA) in an AC distribution system. Based on local information of an attack region, the attacker’s goal is to create violations in nodal voltage magnitude estimation. Acting as a system operator equipped with global AC state estimation and bad data detection, we validate the stealthiness of the hidden NLRA in multiple attack cases. Simulation results on a modified PG&E 69-node distribution system show the validity of the proposed NLRA. The influence of NLRA on the distribution system is assessed and the impact of attack regions, attack timing, and system observability is also revealed.more » « less
An official website of the United States government

