TL;DR: Stability of the observer and robustness of the detection threshold in the case of event-triggered communication, following a realistic Vehicle-to-Vehicle network protocol are proved.
Abstract: Platoons of autonomous vehicles are being investigated as a way to increase road capacity and fuel efficiency. Cooperative Adaptive Cruise Control (CACC) is one approach to controlling platoons longitudinal dynamics, which requires wireless communication between vehicles. In the present paper we use a sliding mode observer to detect and estimate cyber-attacks threatening such wireless communication. In particular we prove stability of the observer and robustness of the detection threshold in the case of event-triggered communication, following a realistic Vehicle-to-Vehicle network protocol.
The reliance of CACC platoons on inter-vehicle wireless communications, be it periodic or event-triggered [7]–[9], may expose them to the same kind of threats as other networked control systems or Cyber-Physical Systems (CPS), such as Denial of Service (DoS), routing, replay and stealthy data injection attacks (see [10], [11]).
While several works considered the case of event-triggered sliding mode control, such as [31]–[34], the present approach would be, to the best of the authors knowledge, the first contribution considering sliding mode observers for fault, or cyber-attack detection and estimation in systems where event–triggered communication is present.
A. Error Dynamics of a Platoon using CACC
In the present paper the authors will use the CACC formulation in [6] and its extension to event triggered communication introduced in [8], while the event-triggering condition will follow [22], [23].
Ei and the string-stability of the platoon have been analysed in [6] and [8].
B. Attack and communication-induced effects
The authors are not interested here in the actual implementation of the attack, for this, one can refer to [12]–[15].
(8) Here TL, TH and ∆yL ∈ R2 are user-designed parameters that define, respectively, the minimum and maximum intertriggering times, and the threshold for communication.
In summary, communication is triggered on changes in local measurements of car i−1 since the last communication.
III. SLIDING MODE OBSERVER
In this section a Sliding Mode Observer (SMO) for the dynamics Ei in eq. (5) is presented.
Both are chosen to they verify the hypothesis of Theorem 1, to guarantee the SMO stability.
This proof will only consider the upper bound of 1,i(t), the lower bound can be proved in a similar manner.
IV. ATTACK DETECTION THRESHOLDS
As a novel contribution, the authors are introducing two pairs of robust attack detection thresholds on νi,fil, which are guaranteed against false alarms, even in the presence of measurement uncertainties and event-triggered communication.
Each pair will comprise an upper and a lower bound on the values of νi,fil in non-attacked conditions.
The two pairs are termed One-Switch-Ahead (OSA) and Multiple-SwitchesAhead (MSA) thresholds, for reasons that will be apparent in next sections.
For brevity, the authors will derive only the upper bound of each threshold, which is of interest in the odd time intervals, as the lower bounds and the behaviour during even time intervals can be obtained via similar reasoning.
A. One-Switch-Ahead (OSA) Threshold
Let us consider the behaviour of νi,fil during the odd interval, [t2k t2k+1] .
This re-initialisation on the signal the threshold is attempting to bound leads to inconsistent detection.
B. Multiple-Switches-Ahead (MSA) Threshold
The MSA threshold is based on the possible behaviour of νfil over more than one switch ahead in time, after a hypothetical occurrence of the worst case behaviour considered for the OSA threshold.
Furthermore, ν̄i,fil,OSA(t2k) will only become the threshold if it is lower then the ν̄i,fil,MSA(t2k).
C. Threshold for Event Triggered Communication
In case of event triggered communication, ∆ui−1 includes both the attack φi, and the communication-induced effect ∆uC,i−1 as defined in Section II-B.
The proposed modification to the threshold will prevent this.
Just like the attack, the communication error affects the observer through the dynamics of 2,i, and thus the threshold through ̄2,i .
This worst case is when the maximum communication error ∆ūC,i−1 , ũi−1(τl) − ũi−1(τl−1) occurs constantly since the last communication.
This scenario is implemented by computing all the terms needed for the threshold, using ̄2,i where ∆ui−1 = ∆ūC,i−1 for every t2k in the period [τl−1 τl].
V. ATTACK ESTIMATE
In this section some preliminary results will be introduced toward the goal of estimating the attack term φ.
This approach is valid only for the case without measurement uncertainty and with continuous observer dynamics.
VI. SIMULATION RESULT
A CACC-controlled platoon of three vehicles using event triggered communication, equipped with the sliding mode observer presented in this paper, is implemented in Matlab/Simulink.
The parameters used in the simulation are shown in tables I and II.
The detection delays in these scenarios are 0.23 [s] and 0.6 [s], for the Continuous and Event triggered communication respectively.
This detection time is scenario specific and depends on many parameters, including the attack and noise magnitudes, and the observer design parameters.
VII. CONCLUDING REMARKS
Event-triggered Vehicle to Vehicle communication protocol based on the ETSI ITS G5 standard.
This is combined with an adaptive threshold that is robust against false detection.
This is done by combining the One-Switch-Ahead and the Multiple-SwitchesAhead thresholds.
A second theoretical result was provided regarding the stability of the SMO under measurement uncertainties and event-triggered communication.
Simulation results verified the expected behaviour and robustness of the proposed solution, and showed that attack estimation could be attained in practice also under non-ideal conditions.
TL;DR: This paper analyzed the attacks that already targeted self-driving cars and extensively present potential cyber-attacks and their impacts on those cars along with their vulnerabilities and the possible mitigation strategies taken by the manufacturers and governments.
Abstract: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle’s operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-attack. We also provide further research directions to improve the security issues associated with self-driving cars.
54 citations
Cites background from "A Sliding Mode Observer Approach fo..."
...Attack detection and resilient platooning operation are further investigated in [30], [31] [32]....
[...]
...Vehicle platooning is a great example of such research focus, where the platoon vehicles can detect a malicious member and take decisions without any input from the node under attack [27], [28] [29], [30] [31], [32]....
TL;DR: In this paper, the authors present the state of the art on event-triggered SMC and familiarize the readers with the design techniques with their pros and cons, since this will be very helpful to the researchers and engineers for implementing SMC using event-based feedback strategies.
Abstract: Event-triggered controllers are well known for guaranteeing the desired stability for a sampled-data system with minimum resource utilization. Over the past decade, the study has revealed that the overall performance improvement for a sampled-data system can be achieved by replacing the time-based sampling with an event-triggered one. The design of sliding mode control (SMC) in the event-triggering framework has also shown similar outcomes, especially for uncertain systems. There are different design strategies for event-triggered SMC available in the literature for networked dynamical systems that are potentially affected by uncertainties and transmission delays. The purpose of this survey article is to present the state of the art on event-triggered SMC and familiarize the readers with the design techniques with their pros and cons, since this will be very helpful to the researchers and engineers for implementing SMC using event-based feedback strategies.
TL;DR: In this paper , a survey summarizes and reviews the existing results on attack/anomaly detection and resilience of connected and automated vehicles in control frameworks, and some potential research directions and challenges are identified.
Abstract: Recent advances in attack/anomaly detection and resilience strategies for connected and automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective. Compared to traditional vehicles, CAVs are featured in the increasing number of perception sensors, advanced intra-vehicle communication technologies, capabilities of driving automation and connectivity between single vehicles. These features bring about safety issues which are not encountered in traditional vehicle systems. One main type of these issues is the attack or anomaly launched onto the perception sensors and the communication channels. With such a consideration, this survey summarizes and reviews the existing results on attack/anomaly detection and resilience of CAVs in control frameworks. This paper reviews the results according to the positions at which the attacks/anomalies occur. These positions are divided into three categories, namely, intra-vehicle communication network, perception sensors and inter-vehicle communication network. From this perspective, the recent attack/anomaly detection and resilience results are reviewed according to different positions attacked. After reviewing existing results, some potential research directions and challenges are identified.
TL;DR: In this article, the authors proposed a transmissibility-based health monitoring approach for fault detection in an autonomous vehicle platoon, where a sliding mode controller is used to mitigate the failure of either a physical component of a vehicle or a communication link between two vehicles.
Abstract: An autonomous vehicle platoon is a network of autonomous vehicles that communicate together to move in a desired way. One of the greatest threats to the operation of an autonomous vehicle platoon is the failure of either a physical component of a vehicle or a communication link between two vehicles. This failure affects the safety and stability of the autonomous vehicle platoon. Transmissibility-based health monitoring uses available sensor measurements for fault detection under unknown excitation and unknown dynamics of the network. After a fault is detected, a sliding mode controller is used to mitigate the fault. Different fault scenarios are considered including vehicle internal disturbances, cyber attacks, and communication delays. We apply the proposed approach to a bond graph model of the platoon and an experimental setup consisting of three autonomous robots.
TL;DR: In this article, the authors investigated fault detection and mitigation of connected autonomous vehicle platoons with a human-driven vehicle using transmissibility operators, which does not require knowledge of the excitation signal or the dynamics of the platoon.
Abstract: This study investigates fault detection and mitigation of connected autonomous vehicle platoons with a human-driven vehicle using transmissibility operators. Transmissibility-based health monitoring uses available sensor measurements only and does not require knowledge of the excitation signal or the dynamics of the platoon. The human-driver behaviour can be considered as an independent excitation that acts on the platoon along with the desired velocity of the platoon. Therefore, transmissibility-based health monitoring is independent of the desired velocity of the platoon, the human-driver behaviour, and the underlying dynamics of the platoon. The perception sensors in the vehicle that follows the human-driven vehicle play a crucial role in the safety of the platoon. Thus, we consider failure in these sensors in addition to failures in the communication links such as a cyber-attacks and communication time delay. Next, we use a transmissibility-based sliding-mode control to mitigate the proposed faults. The proposed approach is validated numerically using simulation models.
TL;DR: The theory and practical application of Lyapunov's Theorem, a method for the Study of Non-linear High-Gain Systems, are studied.
Abstract: I. Mathematical Tools.- 1 Scope of the Theory of Sliding Modes.- 1 Shaping the Problem.- 2 Formalization of Sliding Mode Description.- 3 Sliding Modes in Control Systems.- 2 Mathematical Description of Motions on Discontinuity Boundaries.- 1 Regularization Problem.- 2 Equivalent Control Method.- 3 Regularization of Systems Linear with Respect to Control.- 4 Physical Meaning of the Equivalent Control.- 5 Stochastic Regularization.- 3 The Uniqueness Problems.- 1 Examples of Discontinuous Systems with Ambiguous Sliding Equations.- 1.1 Systems with Scalar Control.- 1.2 Systems Nonlinear with Respect to Vector-Valued Control.- 1.3 Example of Ambiguity in a System Linear with Respect to Control ..- 2 Minimal Convex Sets.- 3 Ambiguity in Systems Linear with Respect to Control.- 4 Stability of Sliding Modes.- 1 Problem Statement, Definitions, Necessary Conditions for Stability ..- 2 An Analog of Lyapunov's Theorem to Determine the Sliding Mode Domain.- 3 Piecewise Smooth Lyapunov Functions.- 4 Quadratic Forms Method.- 5 Systems with a Vector-Valued Control Hierarchy.- 6 The Finiteness of Lyapunov Functions in Discontinuous Dynamic Systems.- 5 Singularly Perturbed Discontinuous Systems.- 1 Separation of Motions in Singularly Perturbed Systems.- 2 Problem Statement for Systems with Discontinuous control.- 3 Sliding Modes in Singularly Perturbed Discontinuous Control Systems.- II. Design.- 6 Decoupling in Systems with Discontinuous Controls.- 1 Problem Statement.- 2 Invariant Transformations.- 3 Design Procedure.- 4 Reduction of the Control System Equations to a Regular Form.- 4.1 Single-Input Systems.- 4.2 Multiple-Input Systems.- 7 Eigenvalue Allocation.- 1 Controllability of Stationary Linear Systems.- 2 Canonical Controllability Form.- 3 Eigenvalue Allocation in Linear Systems. Stabilizability.- 4 Design of Discontinuity Surfaces.- 5 Stability of Sliding Modes.- 6 Estimation of Convergence to Sliding Manifold.- 8 Systems with Scalar Control.- 1 Design of Locally Stable Sliding Modes.- 2 Conditions of Sliding Mode Stability "in the Large".- 3 Design Procedure: An Example.- 4 Systems in the Canonical Form.- 9 Dynamic Optimization.- 1 Problem Statement.- 2 Observability, Detectability.- 3 Optimal Control in Linear Systems with Quadratic Criterion.- 4 Optimal Sliding Modes.- 5 Parametric Optimization.- 6 Optimization in Time-Varying Systems.- 10 Control of Linear Plants in the Presence of Disturbances.- 1 Problem Statement.- 2 Sliding Mode Invariance Conditions.- 3 Combined Systems.- 4 Invariant Systems Without Disturbance Measurements.- 5 Eigenvalue Allocation in Invariant System with Non-measurable Disturbances.- 11 Systems with High Gains and Discontinuous Controls.- 1 Decoupled Motion Systems.- 2 Linear Time-Invariant Systems.- 3 Equivalent Control Method for the Study of Non-linear High-Gain Systems.- 4 Concluding Remarks.- 12 Control of Distributed-Parameter Plants.- 1 Systems with Mobile Control.- 2 Design Based on the Lyapunov Method.- 3 Modal Control.- 4 Design of Distributed Control of Multi-Variable Heat Processes.- 13 Control Under Uncertainty Conditions.- 1 Design of Adaptive Systems with Reference Model.- 2 Identification with Piecewise-Continuous Dynamic Models.- 3 Method of Self-Optimization.- 14 State Observation and Filtering.- 1 The Luenberger Observer.- 2 Observer with Discontinuous Parameters.- 3 Sliding Modes in Systems with Asymptotic Observers.- 4 Quasi-Optimal Adaptive Filtering.- 15 Sliding Modes in Problems of Mathematical Programming.- 1 Problem Statement.- 2 Motion Equations and Necessary Existence Conditions for Sliding Mode.- 3 Gradient Procedures for Piecewise Smooth Function.- 4 Conditions for Penalty Function Existence. Convergence of Gradient Procedure.- 5 Design of Piecewise Smooth Penalty Function.- 6 Linearly Independent Constraints.- III. Applications.- 16 Manipulator Control System.- 1 Model of Robot Arm.- 2 Problem Statement.- 3 Design of Control.- 4 Design of Control System for a Two-joint Manipulator.- 5 Manipulator Simulation.- 6 Path Control.- 7 Conclusions.- 17 Sliding Modes in Control of Electric Motors.- 1 Problem Statement.- 2 Control of d. c. Motor.- 3 Control of Induction Motor.- 4 Control of Synchronous Motor.- 18 Examples.- 1 Electric Drives for Metal-cutting Machine Tools.- 2 Vehicle Control.- 3 Process Control.- 4 Other Applications.- References.
TL;DR: In this paper, an attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced, and an attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets.
Abstract: Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resources are modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service, replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework. Furthermore, the attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate the attack scenarios, their consequences, and potential counter-measures.
TL;DR: This position paper identifies and defines the problem of secure control, investigates the defenses that information security and control theory can provide, and proposes a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.
Abstract: In this position paper we investigate the security of cyber-physical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that information security and control theory can provide, and (3) propose a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.
820 citations
"A Sliding Mode Observer Approach fo..." refers background in this paper
...The reliance of CACC platoons on inter-vehicle wireless communications, be it periodic or event-triggered [7]–[9], may expose them to the same kind of threats as other networked control systems or Cyber-Physical Systems (CPS), such as Denial of Service (DoS), routing, replay and stealthy data injection attacks (see [10], [11])....
TL;DR: A new method using Linear Matrix Inequalities is presented, which can robustly reconstruct faults in the presence of a class system of uncertainty, minimising the effect of the uncertainty on the fault reconstruction in an £ 2 sense.
Abstract: This thesis describes the use of a class of sliding mode observers for fault detection and iso lation purposes. Existing work has shown that the equivalent output error injection term as sociated with the sliding mode observer, which represents the average value of the nonlinear switched term (which induces and maintains the sliding motion), if properly scaled, yields ac curate reconstructions of actuator faults. Existing observer design methods generate a certain class of observer gains, but do not utilise all degrees of freedom. In this thesis, a new method, exploiting this freedom is presented. The method uses Linear Matrix Inequalities and is easily implementable using standard software packages. New methods for accurately reconstructing sensor faults are also presented where appropriate filtering of certain measurable signals yields a fictitious system in which the original sensor faults are treated as actuator faults. Using the principles of actuator fault reconstruction in the existing work, sliding mode observers can be designed for the fictitious system to accurately reconstruct the sensor faults. This improves on the previous work where effectively only the steady state components of the sensor faults could be reconstructed. A new method using Linear Matrix Inequalities is presented, to syn thesise observers which can robustly reconstruct faults in the presence of a class system of uncertainty, minimising the effect of the uncertainty on the fault reconstruction in an £ 2 sense. The robust fault reconstruction scheme is demonstrated by means of a case study, which is a nonlinear model of an aero-engine. System identification is used to obtain a linear model of the engine. An uncertainty representation is also obtained about which the observer is designed. The results from the case study show that the robust fault reconstruction scheme works and is effective.
660 citations
"A Sliding Mode Observer Approach fo..." refers methods in this paper
...The use of sliding mode observers for fault detection was pioneered by [24] and developed further by [25], [26], amongst others....
[...]
...Furthermore, as νi is a discontinuous switching term, the EOI νi,fil will be used to estimate ∆ui−1 [24]....
[...]
...In this paper, as in [24] and subsequent works on SMObased fault estimation, the EOI, derived from νi, will be used for estimating attacks [24]....
TL;DR: Experiments clearly show that the practical results match the theoretical analysis, thereby indicating the possibilities for short-distance vehicle following, and validate the technical feasibility of the resulting control system.
Abstract: Road throughput can be increased by driving at small inter-vehicle time gaps. The amplification of velocity disturbances in upstream direction, however, poses limitations to the minimum feasible time gap. String-stable behavior is thus considered an essential requirement for the design of automatic distance control systems, which are needed to allow for safe driving at time gaps well below 1 s. Theoretical analysis reveals that this requirement can be met using wireless inter-vehicle communication to provide real-time information of the preceding vehicle, in addition to the information obtained by common Adaptive Cruise Control (ACC) sensors. In order to validate these theoretical results and to demonstrate the technical feasibility, the resulting control system, known as Cooperative ACC (CACC), is implemented on a test fleet consisting of six passenger vehicles. Experiments clearly show that the practical results match the theoretical analysis, thereby indicating the possibilities for short-distance vehicle following.
526 citations
"A Sliding Mode Observer Approach fo..." refers background or methods in this paper
...Vehicles in a CACC platoon measure relative position and velocity of the preceding vehicle, and also communicate (see figure 1) in order to attain string stability, which is an important property resulting in dampening of velocity changes down the platoon [6]....
[...]
...Autonomous vehicle platoons and Cooperative Adaptive Cruise Control (CACC) are topics that received significant attention by researchers in recent years [1]–[6]....
[...]
...In the present paper we will use the CACC formulation in [6] and its extension to event triggered communication introduced in [8], while the event-triggering condition will follow [22], [23]....
[...]
...The stability and performance of the error dynamics Ei and the string-stability of the platoon have been analysed in [6] and [8]....
[...]
...In [6], a CACC control law is initially proposed in ideal conditions, as the solution to the following equation...