The combination of connectivity and automation allows connected and autonomous vehicles (CAVs) to operate autonomously using advanced on-board sensors while communicating with each other via vehicle-to-vehicle (V2V) technology to enhance safety, efficiency, and mobility. One of the most promising features of CAVs is cooperative adaptive cruise control (CACC). This system extends the capabilities of conventional adaptive cruise control (ACC) by facilitating the exchange of critical parameters among vehicles to enhance safety, traffic flow, and efficiency. However, increased connectivity introduces new vulnerabilities, making CACC susceptible to cyber-attacks, including false data injection (FDI) attacks, which can compromise vehicle safety. To address this challenge, we propose a secure observer-based control design leveraging Lyapunov stability analysis, which is capable of mitigating the adverse impact of FDI attacks and ensuring system safety. This approach uniquely addresses system security without relying on a known lead vehicle model. The developed approach is validated through simulation results, demonstrating its effectiveness. 
                        more » 
                        « less   
                    
                            
                            Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions
                        
                    
    
            We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to safely navigate through a conflict area (e.g., traffic intersections, merging roadways, roundabouts). Previous studies have shown that such a network can be targeted by adversarial attacks causing traffic jams or safety violations ending in collisions. We focus on attacks targeting the V2X communication network used to share vehicle data and consider as well uncertainties due to noise in sensor measurements and communication channels. To combat these, motivated by recent work on the safe control of CAVs, we propose a trust-aware robust event-triggered decentralized control and coordination framework that can provably guarantee safety. We maintain a trust metric for each vehicle in the network computed based on their behavior and used to balance the tradeoff between conservativeness (when deeming every vehicle as untrustworthy) and guaranteed safety and security. It is important to highlight that our framework is invariant to the specific choice of the trust framework. Based on this framework, we propose an attack detection and mitigation scheme which has twofold benefits: (i) the trust framework is immune to false positives, and (ii) it provably guarantees safety against false positive cases. We use extensive simulations (in SUMO and CARLA) to validate the theoretical guarantees and demonstrate the efficacy of our proposed scheme to detect and mitigate adversarial attacks. 
        more » 
        « less   
        
    
                            - Award ID(s):
- 1932162
- PAR ID:
- 10553380
- Publisher / Repository:
- Symposium on Vehicles Security and Privacy (VehicleSec) 2024
- Date Published:
- ISBN:
- 979-8-9894372-7-6
- Format(s):
- Medium: X
- Location:
- https://www.ndss-symposium.org/wp-content/uploads/vehiclesec2024-37-paper.pdf
- Sponsoring Org:
- National Science Foundation
More Like this
- 
            
- 
            Connected autonomous vehicles (CAVs) have fostered the development of intelligent transportation systems that support critical safety information sharing with minimum latency and making driving decisions autonomously. However, the CAV environment is vulnerable to different external and internal attacks. Authorized but malicious entities which provide wrong information impose challenges in preventing internal attacks. An essential requirement for thwarting internal attacks is to identify the trustworthiness of the vehicles. This paper exploits interaction provenance to propose a trust management framework for CAVs that considers both in-vehicle and vehicular network security incidents, supports flexible security policies and ensures privacy. The framework contains an interaction provenance recording and trust management protocol that extracts events from interaction provenance and calculates trustworthiness using fuzzy policies based on the events. Simulation results show that the framework is effective and can be integrated with the CAV stack with minimal computation and communication overhead.more » « less
- 
            In this paper we analyze the effect of cyberattacks on cooperative control of connected and autonomous vehicles (CAVs) at traffic bottleneck points. We focus on three types of such bottleneck points including merging roadways, intersections and roundabouts. The coordination amongst CAVs in the network is achieved in a decentralized manner whereby each CAV formulates its own optimal control problem and solves it onboard in real time. A roadside unit is introduced to act as the coordinator that communicates and exchanges relevant data with the CAVs through wireless V2X communication. We show that this CAV setup is vulnerable to various cyberattacks such as Sybil attack, jamming attack and false data injection attack. Results from our simulation experiments call attention to the extent to which such attacks may jeopardize the coordination performance and the safety of the CAVs.more » « less
- 
            Abstract Rapid advances in vehicle automation and communication technologies enable connected autonomous vehicles (CAVs) to cross intersections cooperatively, which could significantly improve traffic throughput and safety at intersections. Virtual platooning, designed upon car‐following behavior, is one of the promising control methods to promote cooperative intersection crossing of CAVs. Nevertheless, demand variation raises safety and stability concerns when CAVs adopt a virtual platooning control approach. Along this line, this study proposes an adaptive vehicle control method to facilitate the formation of a virtual platoon and the cooperative crossing of CAVs, factoring demand variations at an isolated intersection. This study derives the stability conditions of virtual CAV platoons depending on the time‐varying traffic demand. Based on the derived stability conditions, an optimization model is proposed to adaptively control CAVs dynamics by balancing approaching traffic mobility and safety to enhance the reliability of cooperative crossing at intersections. The simulation results show that, compared to the nonadaptive control, our proposed method can increase the intersection throughput by 18.2%. Also, time‐to‐collision results highlight the advantages of the proposed adaptive control in securing traffic safety.more » « less
- 
            Connected and automated vehicle (CAV) technology is providing urban transportation managers tremendous opportunities for better operation of urban mobility systems. However, there are significant challenges in real-time implementation as the computational time of the corresponding operations optimization model increases exponentially with increasing vehicle numbers. Following the companion paper (Chen et al. 2021), which proposes a novel automated traffic control scheme for isolated intersections, this study proposes a network-level, real-time traffic control framework for CAVs on grid networks. The proposed framework integrates a rhythmic control method with an online routing algorithm to realize collision-free control of all CAVs on a network and achieve superior performance in average vehicle delay, network traffic throughput, and computational scalability. Specifically, we construct a preset network rhythm that all CAVs can follow to move on the network and avoid collisions at all intersections. Based on the network rhythm, we then formulate online routing for the CAVs as a mixed integer linear program, which optimizes the entry times of CAVs at all entrances of the network and their time–space routings in real time. We provide a sufficient condition that the linear programming relaxation of the online routing model yields an optimal integer solution. Extensive numerical tests are conducted to show the performance of the proposed operations management framework under various scenarios. It is illustrated that the framework is capable of achieving negligible delays and increased network throughput. Furthermore, the computational time results are also promising. The CPU time for solving a collision-free control optimization problem with 2,000 vehicles is only 0.3 second on an ordinary personal computer.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                    