skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Evaluations of Cyberattacks on Cooperative Control of Connected and Autonomous Vehicles at Bottleneck Points
In this paper we analyze the effect of cyberattacks on cooperative control of connected and autonomous vehicles (CAVs) at traffic bottleneck points. We focus on three types of such bottleneck points including merging roadways, intersections and roundabouts. The coordination amongst CAVs in the network is achieved in a decentralized manner whereby each CAV formulates its own optimal control problem and solves it onboard in real time. A roadside unit is introduced to act as the coordinator that communicates and exchanges relevant data with the CAVs through wireless V2X communication. We show that this CAV setup is vulnerable to various cyberattacks such as Sybil attack, jamming attack and false data injection attack. Results from our simulation experiments call attention to the extent to which such attacks may jeopardize the coordination performance and the safety of the CAVs.  more » « less
Award ID(s):
1932162
PAR ID:
10553381
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
Symposium on Vehicles Security and Privacy (VehicleSec) 2023
Date Published:
ISBN:
1-891562-88-6
Format(s):
Medium: X
Location:
https://dx.doi.org/10.14722/vehiclesec.2024.23037
Sponsoring Org:
National Science Foundation
More Like this
  1. Connected and autonomous vehicles (CAVs) rely on communication channels to improve safety and efficiency. However, this connectivity leaves them vulnerable to potential cyberattacks, such as false data injection (FDI) attacks. We can mitigate the effect of FDI attacks by designing secure control techniques. However, tuning control parameters is essential for the safety and security of such techniques, and there is no systematic approach to achieving that. In this article, our primary focus is on cooperative adaptive cruise control (CACC), a key component of CAVs. We develop a secure CACC by integrating model-based and learning-based approaches to detect and mitigate FDI attacks in real-time. We analyze the stability of the proposed resilient controller through Lyapunov stability analysis, identifying sufficient conditions for its effectiveness. We use these sufficient conditions and develop a reinforcement learning (RL)-based tuning algorithm to adjust the parameter gains of the controller, observer, and FDI attack estimator, ensuring the safety and security of the developed CACC under varying conditions. We evaluated the performance of the developed controller before and after optimizing parameters, and the results show about a 50% improvement in accuracy of the FDI attack estimation and a 76% enhancement in safe following distance with the optimized controller in each scenario. 
    more » « less
  2. In this paper, we propose a re-routing strategy for connected and automated vehicles (CAVs), considering coordination and control of all the CAVs in the network. The objective for each CAV is to find the route that minimizes the total travel time of all CAVs. We coordinate CAVs at signal-free intersections to accurately predict the travel time for the routing problem. While it is possible to find a system-optimal solution by comparing all the possible combinations of the routes, this may impose a computational burden. Thus, we instead find a person-by-person optimal solution to reduce computational time while still deriving a better solution than selfish routing. We validate our framework through simulations in a grid network. 
    more » « less
  3. Connected automated vehicles (CAVs), built upon advanced vehicle control and communication technology, can improve traffic throughput, safety, and energy efficiency. Previous studies on CAVs control focus on instability and stability properties of CAV platoons; however, these analyses cannot reveal the damping platoon oscillation characteristics, which are important for enhancing CAV platoon reliability against variant continuous perturbations. To this end, this research seeks to characterize the damping oscillations of CAVs through exploiting the platoon's unforced oscillatory, i.e., damping behavior. Inspired by the mechanical vibration theory, the proposed approach is applied to a CAV platoon with linear car-following control formulated as Helly's model and the predecessor-following communication topology. The proposed approach is applied to a CAV platoon with the linear car-following control formulated as Helly's model and the predecessor-following communication topology. Numerical analysis results show that a periodic perturbation with the resonance frequency of the CAV platoon will amplify the oscillation and lead to the severest oscillatory traffic. Our analysis highlights the importance of preventing platoon oscillations from resonance in ensuring CAV platooning reliability. 
    more » « less
  4. Vehicle platooning using connected and automated vehicles (CAVs) has attracted considerable attention. In this paper, we address the problem of optimal coordination of CAV platoons at a highway on-ramp merging scenario. We present a single-level constrained optimal control framework that optimizes the fuel economy and travel time of the platoons while satisfying the state, control, and safety constraints. We also explore the effect of delayed communication among the CAV platoons and propose a robust coordination framework to enforce lateral and rear-end collision avoidance constraints in the presence of bounded delays. We provide a closed-form analytical solution to the optimal control problem with safety guarantees that can be implemented in real time. Finally, we validate the effectiveness of the proposed control framework using a high-fidelity commercial simulation environment. 
    more » « less
  5. All vehicles must follow the rules that govern traffic behavior, regardless of whether the vehicles are human-driven or Connected, Autonomous Vehicles (CAVs). Road signs indicate locally active rules, such as speed limits and requirements to yield or stop. Recent research has demonstrated attacks, such as adding stickers or dark patches to signs, that cause CAV sign misinterpretation, resulting in potential safety issues. Humans can see and potentially defend against these attacks. But humans can not detect what they can not observe. We have developed the first physical-world attack against CAV traffic sign recognition systems that is invisible to humans. Utilizing Infrared Laser Reflection (ILR), we implement an attack that affects CAV cameras, but humans can not perceive. In this work, we formulate the threat model and requirements for an ILR-based sign perception attack. Next, we evaluate attack effectiveness against popular, CNNbased traffic sign recognition systems. We demonstrate a 100% success rate against stop and speed limit signs in our laboratory evaluation. Finally, we discuss the next steps in our research. 
    more » « less