scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Sliding Mode Observer Approach for Attack Detection and Estimation in Autonomous Vehicle Platoons using Event Triggered Communication

01 Dec 2019-pp 5742-5747
TL;DR: Stability of the observer and robustness of the detection threshold in the case of event-triggered communication, following a realistic Vehicle-to-Vehicle network protocol are proved.
Abstract: Platoons of autonomous vehicles are being investigated as a way to increase road capacity and fuel efficiency. Cooperative Adaptive Cruise Control (CACC) is one approach to controlling platoons longitudinal dynamics, which requires wireless communication between vehicles. In the present paper we use a sliding mode observer to detect and estimate cyber-attacks threatening such wireless communication. In particular we prove stability of the observer and robustness of the detection threshold in the case of event-triggered communication, following a realistic Vehicle-to-Vehicle network protocol.

Summary (2 min read)

Introduction

  • The reliance of CACC platoons on inter-vehicle wireless communications, be it periodic or event-triggered [7]–[9], may expose them to the same kind of threats as other networked control systems or Cyber-Physical Systems (CPS), such as Denial of Service (DoS), routing, replay and stealthy data injection attacks (see [10], [11]).
  • While several works considered the case of event-triggered sliding mode control, such as [31]–[34], the present approach would be, to the best of the authors knowledge, the first contribution considering sliding mode observers for fault, or cyber-attack detection and estimation in systems where event–triggered communication is present.

A. Error Dynamics of a Platoon using CACC

  • In the present paper the authors will use the CACC formulation in [6] and its extension to event triggered communication introduced in [8], while the event-triggering condition will follow [22], [23].
  • Ei and the string-stability of the platoon have been analysed in [6] and [8].

B. Attack and communication-induced effects

  • The authors are not interested here in the actual implementation of the attack, for this, one can refer to [12]–[15].
  • (8) Here TL, TH and ∆yL ∈ R2 are user-designed parameters that define, respectively, the minimum and maximum intertriggering times, and the threshold for communication.
  • In summary, communication is triggered on changes in local measurements of car i−1 since the last communication.

III. SLIDING MODE OBSERVER

  • In this section a Sliding Mode Observer (SMO) for the dynamics Ei in eq. (5) is presented.
  • Both are chosen to they verify the hypothesis of Theorem 1, to guarantee the SMO stability.
  • This proof will only consider the upper bound of 1,i(t), the lower bound can be proved in a similar manner.

IV. ATTACK DETECTION THRESHOLDS

  • As a novel contribution, the authors are introducing two pairs of robust attack detection thresholds on νi,fil, which are guaranteed against false alarms, even in the presence of measurement uncertainties and event-triggered communication.
  • Each pair will comprise an upper and a lower bound on the values of νi,fil in non-attacked conditions.
  • The two pairs are termed One-Switch-Ahead (OSA) and Multiple-SwitchesAhead (MSA) thresholds, for reasons that will be apparent in next sections.
  • For brevity, the authors will derive only the upper bound of each threshold, which is of interest in the odd time intervals, as the lower bounds and the behaviour during even time intervals can be obtained via similar reasoning.

A. One-Switch-Ahead (OSA) Threshold

  • Let us consider the behaviour of νi,fil during the odd interval, [t2k t2k+1] .
  • This re-initialisation on the signal the threshold is attempting to bound leads to inconsistent detection.

B. Multiple-Switches-Ahead (MSA) Threshold

  • The MSA threshold is based on the possible behaviour of νfil over more than one switch ahead in time, after a hypothetical occurrence of the worst case behaviour considered for the OSA threshold.
  • Furthermore, ν̄i,fil,OSA(t2k) will only become the threshold if it is lower then the ν̄i,fil,MSA(t2k).

C. Threshold for Event Triggered Communication

  • In case of event triggered communication, ∆ui−1 includes both the attack φi, and the communication-induced effect ∆uC,i−1 as defined in Section II-B.
  • The proposed modification to the threshold will prevent this.
  • Just like the attack, the communication error affects the observer through the dynamics of 2,i, and thus the threshold through ̄2,i .
  • This worst case is when the maximum communication error ∆ūC,i−1 , ũi−1(τl) − ũi−1(τl−1) occurs constantly since the last communication.
  • This scenario is implemented by computing all the terms needed for the threshold, using ̄2,i where ∆ui−1 = ∆ūC,i−1 for every t2k in the period [τl−1 τl].

V. ATTACK ESTIMATE

  • In this section some preliminary results will be introduced toward the goal of estimating the attack term φ.
  • This approach is valid only for the case without measurement uncertainty and with continuous observer dynamics.

VI. SIMULATION RESULT

  • A CACC-controlled platoon of three vehicles using event triggered communication, equipped with the sliding mode observer presented in this paper, is implemented in Matlab/Simulink.
  • The parameters used in the simulation are shown in tables I and II.
  • The detection delays in these scenarios are 0.23 [s] and 0.6 [s], for the Continuous and Event triggered communication respectively.
  • This detection time is scenario specific and depends on many parameters, including the attack and noise magnitudes, and the observer design parameters.

VII. CONCLUDING REMARKS

  • Event-triggered Vehicle to Vehicle communication protocol based on the ETSI ITS G5 standard.
  • This is combined with an adaptive threshold that is robust against false detection.
  • This is done by combining the One-Switch-Ahead and the Multiple-SwitchesAhead thresholds.
  • A second theoretical result was provided regarding the stability of the SMO under measurement uncertainties and event-triggered communication.
  • Simulation results verified the expected behaviour and robustness of the proposed solution, and showed that attack estimation could be attained in practice also under non-ideal conditions.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Delft University of Technology
A sliding mode observer approach for attack detection and estimation in Autonomous
Vehicle Platoons using event triggered communication
Keijzer, Twan; Ferrari, Riccardo M.G.
DOI
10.1109/CDC40024.2019.9029315
Publication date
2019
Document Version
Final published version
Published in
Proceedings 2019 IEEE 58th Conference on Decision and Control (CDC 2019)
Citation (APA)
Keijzer, T., & Ferrari, R. M. G. (2019). A sliding mode observer approach for attack detection and estimation
in Autonomous Vehicle Platoons using event triggered communication. In
Proceedings 2019 IEEE 58th
Conference on Decision and Control (CDC 2019)
(pp. 5742-5747). IEEE .
https://doi.org/10.1109/CDC40024.2019.9029315
Important note
To cite this publication, please use the final published version (if applicable).
Please check the document version above.
Copyright
Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent
of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.
Takedown policy
Please contact us and provide details if you believe this document breaches copyrights.
We will remove access to the work immediately and investigate your claim.
This work is downloaded from Delft University of Technology.
For technical reasons the number of authors shown on this cover page is limited to a maximum of 10.

Green Open Access added to TU Delft Institutional Repository
'You share, we take care!' - Taverne project
https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher
is the copyright holder of this work and the author uses the
Dutch legislation to make this work public.

A Sliding Mode Observer Approach for Attack Detection and Estimation in
Autonomous Vehicle Platoons using Event Triggered Communication
Twan Keijzer
Delft Centre for Systems and Control
Delft University of Technology
t.keijzer@tudelft.nl
Riccardo M.G. Ferrari
Delft Centre for Systems and Control
Delft University of Technology
r.ferrari@tudelft.nl
Abstract Platoons of autonomous vehicles are being inves-
tigated as a way to increase road capacity and fuel efficiency.
Cooperative Adaptive Cruise Control (CACC) is one approach
to controlling platoons longitudinal dynamics, which requires
wireless communication between vehicles. In the present paper
we use a sliding mode observer to detect and estimate cyber-
attacks threatening such wireless communication. In particular
we prove stability of the observer and robustness of the de-
tection threshold in the case of event-triggered communication,
following a realistic Vehicle-to-Vehicle network protocol.
I. INTRODUCTION
Autonomous vehicle platoons and Cooperative Adaptive
Cruise Control (CACC) are topics that received significant
attention by researchers in recent years [1]–[6]. CACC
is a longitudinal cooperative control technique that allows
platoons, or strings, of autonomous vehicles to coordinate
themselves. The goal is to have vehicles in the platoon trav-
elling closer together than human drivers, or non-cooperative
control approaches like Adaptive Cruise Control, can. Ben-
efits of this lower inter-vehicle spacing include better fuel
efficiency and road utilization. Vehicles in a CACC platoon
measure relative position and velocity of the preceding
vehicle, and also communicate (see figure 1) in order to attain
string stability, which is an important property resulting in
dampening of velocity changes down the platoon [6].
Wireless communication!
ii+1 i-1
v v v
i
d
i-1 i+1
i+1 i-1
i
d
d
radar!
Fig. 1. CACC equipped string of vehicles. The V2V communication is
implemented wirelessly, and is subjected to a class of cyber attacks.
The reliance of CACC platoons on inter-vehicle wireless
communications, be it periodic or event-triggered [7]–[9],
may expose them to the same kind of threats as other
networked control systems or Cyber-Physical Systems (CPS),
such as Denial of Service (DoS), routing, replay and stealthy
data injection attacks (see [10], [11]). Indeed, vulnerabilities
of Vehicle-to-Vehicle (V2V) networks to cyber attacks have
been investigated in [12]–[15]. While CACC can provide
limited robustness to network induced effects such as random
packet losses (see [16], [17]), the case of a malicious
attacker targeting the (V2V) network should be addressed
by dedicated detection and fault-tolerant control methods.
While the case of faults in autonomous vehicles forma-
tions was addressed in [18] and [19] with an observer-
based approach, few works dealt with cyber-attacks. [20]
considered the problem of designing a model based observer
for detecting DoS attacks, which were characterised as an
equivalent time delay in the communication network.
In this paper we are going to extend some preliminary
results presented by the authors in [21], where a Sliding-
Mode Observer (SMO) was introduced for estimating false
data injection attacks. The contribution of the paper is
twofold: we prove the stability of the SMO under event-
triggered communication and less restrictive assumptions on
measurement uncertainties, and we introduce robust adaptive
attack detection thresholds for such a scenario. In particular,
we will assume the vehicle platoon is using a realistic event-
triggered communication protocol based on the current ETSI-
ITS G5 V2V communication standard [22], [23].
The use of sliding mode observers for fault detection
was pioneered by [24] and developed further by [25], [26],
amongst others. By monitoring the so-called equivalent out-
put injection (EOI), this method allows to estimate actuator
and sensor faults or, as in [21] and the present case, a false
data injection attack. Previous results considered continuous
communication, and did not derive an adaptive detection
threshold guaranteed to be robust against uncertainties or
communication-induced effects. The literature on fault detec-
tion for event-triggered systems, instead, includes works such
as [27]–[29], which are concerned with the simultaneous de-
sign of the triggering condition and the fault detector, while
[30] addressed the case of asynchronous communication and
packet loss for fault detection of networked control systems.
While several works considered the case of event-triggered
sliding mode control, such as [31]–[34], the present approach
would be, to the best of the authors knowledge, the first
contribution considering sliding mode observers for fault,
or cyber-attack detection and estimation in systems where
event–triggered communication is present.
The remainder of the paper is organized as follows.
Section II introduces event-triggered CACC for a vehicle
platoon and describes the attack and its effect on the platoon.
Section III presents the sliding mode observer and character-
izes its stability, and section IV presents the attack detection
threshold and provides theoretical results on its robustness.
Section V provides preliminary results on attack estimation.
In sections VI and VII, respectively, the simulation results,
and conclusion and future work are presented.
A. Notation
Throughout the paper, a notation such as x
i
will denote a
variable x pertaining to the i–th vehicle, while x
i,(j)
will
denote the j–th component of the vector x
i
.
2019 IEEE 58th Conference on Decision and Control (CDC)
Palais des Congrès et des Expositions Nice Acropolis
Nice, France, December 11-13, 2019
978-1-7281-1398-2/19/$31.00 ©2019 IEEE 5742
Authorized licensed use limited to: TU Delft Library. Downloaded on May 26,2021 at 08:25:06 UTC from IEEE Xplore. Restrictions apply.

II. PROBLEM FORMULATION
A. Error Dynamics of a Platoon using CACC
In the present paper we will use the CACC formulation
in [6] and its extension to event triggered communication
introduced in [8], while the event-triggering condition will
follow [22], [23]. We will consider a string of m N
homogeneous vehicles (see Figure 1), each modeled as
"
˙p
i
(t)
˙v
i
(t)
˙a
i
(t)
#
=
"
v
i
(t)
a
i
(t)
1
τ
(u
i
(t) a
i
(t))
#
, (1)
where p
i
(t), v
i
(t), a
i
(t) and u
i
(t) R are the position,
velocity, acceleration and the input of the i-th vehicle, re-
spectively; furthermore, τ represents the engine’s dynamics.
Each vehicle is assumed to measure its own local output y
i
,
[p
i
v
i
a
i
]
>
+ ξ
i
and, with its front radar, the relative output
y
i,i1
, [d
i
v
i
]
>
+ η
i
, where d
i
(t) , (p
i1
(t)p
i
(t)L)
is the inter-vehicle distance, L is the length of each vehicle,
v
i
, v
i1
v
i
is the relative velocity and ξ
i
and η
i
are
the measurement uncertainties affecting the vehicle sensors.
Assumption 1: For each i–th vehicle, the measurement
uncertainties ξ
i
and η
i
are unknown but they are upper
bounded by known quantities
¯
ξ
i
and ¯η
i
, i.e. |ξ
i,(j)
(t)|
¯
ξ
i,(j)
(t) and |η
i,(j)
(t)| ¯η
i,(j)
(t) for all j, and all t.
The objective of the i–th vehicle is to keep a desired inter-
vehicle distance d
r,i
using a constant time headway policy
d
r,i
(t) = r
i
+ hv
i
(t) , (2)
while making the relative velocity v
i
tend to zero in steady
state. in eq. (2) r
i
and h are the desired distance at stand still,
and the time headway between the vehicles respectively. [6]
Let us introduce the position error e
i
(t) , d
i
(t) d
r,i
(t)
and its time derivative ˙e
i
(t) = v
i
ha
i
(t). In [6], a CACC
control law is initially proposed in ideal conditions, as the
solution to the following equation
˙u
i
(t) =
1
h
[u
i
(t) + (k
p
e
i
(t) + k
d
˙e
i
(t)) + u
i1
(t)] . (3)
As can be seen from Eq. (3), the local control law depends
on measured quantities, such as the relative position and
velocity, which will be corrupted by noise. Furthermore,
the control law depends on the intended acceleration of the
preceding vehicle, u
i1
(t), which shall be received through
a wireless V2V communication network.
In this paper the presence of measurement uncertainties
and non-ideal communication are explicitly incorporated in
the control law giving
˙u
i
(t) =
1
h
h
u
i
(t) +
k
p
ˆe
i
(t) + k
d
ˆ
˙e
i
(t)
+ ˜u
i1
(t)
i
, (4)
where ˆe
i
, e
i
+η
i,(1)
i,(2)
,
ˆ
˙e
i
, ˙e
i
+η
i,(2)
i,(3)
, and
˜u
i1
(t) = u
i1
(t) + u
i1
(t) is the last received value of
u
i1
(t). u
i1
will be further defined in subsection II-B.
By following similar steps as in [6] and [21], we can write
the i–th vehicle error dynamics, under control law (4), as
E
i
:
˙x
e
i
(t) = A
e
x
e
i
(t) + B
e
ζ
i
(t)
y
e
i
(t) = C
e
x
e
i
(t) + D
e
ζ
i
(t)
, (5)
where C
e
= D
e
and the following quantities were introduced
A
e
,
"
0 1 0
0 0 1
k
p
τ
k
d
τ
1
τ
#
, B
e
,
"
0 0 0
0 0 0
k
p
τ
k
d
τ
1
τ
#
C
e
,
1 0
0 1
0 0
>
, x
e
i
,
"
e
i
(t)
˙e
i
(t)
¨e
i
(t)
#
, ζ
i
,
"
η
i,(1)
i,(2)
η
i,(2)
i,(3)
u
i1
(t)
#
(6)
The stability and performance of the error dynamics E
i
and
the string-stability of the platoon have been analysed in [6]
and [8]. As the present paper is concerned with the design
of a cyber-attack detection and estimation scheme, and not
the event-triggered CACC control scheme itself, for well-
posedness we will require the following
Assumption 2: Control law u
i
(Eq. (4)) and triggering
condition σ (Eq. (8)) are chosen such that, without cyber-
attacks and when Assumption 1 holds, E
i
is stable for each
vehicle i and string stability of the platoon is guaranteed.
B. Attack and communication-induced effects
In this paper, following [8], [22], [23], the transmission of
u
i1
is assumed to be event triggered. Furthermore a man-in-
the-middle attack on the transmitted u
i1
is considered. We
are not interested here in the actual implementation of the
attack, for this, one can refer to [12]–[15]. For the observer,
the effects of communication, u
i1,C
(t), and the attack,
φ
i
(t), will be combined in u
i1
(t) = u
i1,C
(t) + φ
i
(t).
The event-triggered communication causes a variable de-
lay in the signal received by car i, defined as
τ
0
= 0, τ
l+1
, inf {t τ
l
: σ = 1} , (7)
where τ
l
is the last transmission time, and σ is a triggering
condition based on the local measurements, y
i1
, in car i1:
σ , (t τ
l
T
H
(t τ
l
> T
L
j = {1, 2} : |y
i1,(j)
(τ
l
) y
i1,(j)
(t)| y
L,(j)
)).
(8)
Here T
L
, T
H
and y
L
R
2
are user-designed parameters
that define, respectively, the minimum and maximum inter-
triggering times, and the threshold for communication.
In summary, communication is triggered on changes in
local measurements of car i1 since the last communication.
This is combined with a minimum and maximum inter-
triggering time. The error introduced by the event-triggered
communication is denoted by u
i1,C
(t).
III. SLIDING MODE OBSERVER
In this section a Sliding Mode Observer (SMO) for the
dynamics E
i
in eq. (5) is presented. To this end, first the
change of variables z
1,i
=
h
x
e
i
,(1)
x
e
i
,(2)
i
, ζ
1,i
=
ζ
i,(1)
ζ
i,(2)
, z
2,i
=
x
e
i
,(3)
, b =
1
τ
is performed in order to separate the
measured and unknown states, giving:
h
˙z
1,i
˙z
2,i
i
=
h
A
11
A
12
A
21
A
22
ih
z
1,i
z
2,i
i
+
h
0
A
21
ζ
1,i
+ bu
i1
i
, (9)
y
e
i
= z
1,i
+ ζ
1,i
. (10)
An observer design is presented, in eqs. (11) and (12), to
make the states slide along
y,i
(t) = 0 even in the presence
of noise-, communication- and attack-induced effects.
ˆ
˙z
1,i
ˆ
˙z
2,i
=
h
A
11
A
12
A
21
A
22
ih
ˆz
1,i
ˆz
2,i
i
h
ν
i
0
i
(11)
5743
Authorized licensed use limited to: TU Delft Library. Downloaded on May 26,2021 at 08:25:06 UTC from IEEE Xplore. Restrictions apply.

ν
i
(t) = (A
11
+ P )
y,i
(t) + M
i
sgn(
y,i
(t)) (12)
Here M
i
is a positive constant, and P R
2×2
is a positive
definite matrix. Both are chosen to they verify the hypothesis
of Theorem 1, to guarantee the SMO stability. The observer
error dynamics can be written as in eqs. (13), (14).
1,i
(t) = ˆz
1,i
(t) z
1,i
(t)
2,i
(t) = ˆz
2,i
(t) z
2,i
(t)
y,i
(t) = ˆz
1,i
(t) (z
1,i
(t) + ζ
1,i
) =
1,i
(t) ζ
1,i
(13)
˙
i
(t) =
h
A
11
A
12
A
21
A
22
i
i
(t)
ν
i
(t)
A
21
ζ
1,i
(t) + bu
i1
(t)
(14)
Theorem 1:
1,i
(t), under the observer dynamics in (14),
can be bounded by ¯
1
=
¯
ζ if M
i
> |A
12
¯
2,i
| +
A
11
¯
ζ
.
Proof: This proof will only consider the upper bound of
1,i
(t), the lower bound can be proved in a similar manner. It
will be proven that if
1,i
>
¯
ζ, then ˙
1,i
< 0. This is sufficient
to prove
¯
ζ
1,i
t. First note that
1,i
>
¯
ζ implies
y,i
> 0,
so the first row of eq. (14) can be rewritten to
˙
1,i
= P (ζ
1,i
1,i
) + A
11
ζ
1,i
+ A
12
2,i
M
i
(15)
Substituting the condition on M
i
gives
˙
1,i
<P (ζ
1,i
1,i
) + (A
11
ζ
1,i
|A
11
¯
ζ|)
+ (A
12
2,i
|A
12
¯
2,i
|) 0
(16)
¯
ζ, ¯
2,i
and other bounds are proven in the appendix.
In this paper, as in [24] and subsequent works on SMO-
based fault estimation, the EOI, derived from ν
i
, will be
used for estimating attacks [24]. The EOI used here will be
obtained from the filter in eq. (17) [35].
ν
i,fil
=
K
s + K
ν
i
, (17)
where K > 0 is a design constant and s is the Laplace
domain complex variable.
IV. ATTACK DETECTION THRESHOLDS
As a novel contribution, we are introducing two pairs of
robust attack detection thresholds on ν
i,fil
, which are guar-
anteed against false alarms, even in the presence of mea-
surement uncertainties and event-triggered communication.
Each pair will comprise an upper and a lower bound on the
values of ν
i,fil
in non-attacked conditions. The two pairs
are termed One-Switch-Ahead (OSA) and Multiple-Switches-
Ahead (MSA) thresholds, for reasons that will be apparent
in next sections. For the sake of clarity, in Subsections IV-A
and IV-B we will assume there is no event-triggered com-
munication, i.e. u
i1,C
(t) = 0. The effects of its presence
on the thresholds will be illustrated in Subsection IV-C.
For the sake of notation, we will assume that the SMO is
initialized at time t
0
, and that sgn(
y,i
(t
0
)) = 1. This means
that between t
0
and the next switch at t
1
, and all following
odd intervals [t
2k
t
2k+1
], with k N, the discontinuous
term ν
i
and
y,i
(t) are positive, ν
i,fil
will be increasing, and
1,i
(t) will be decreasing. This is also shown in Figure 2.
Furthermore ν
i,fil
will be initialised at ν
i,fil
(t
0
) = 0 and we
will denote a threshold value calculated at t
k
by ¯ν
i,fil
(t
k
).
For brevity, we will derive only the upper bound of each
threshold, which is of interest in the odd time intervals, as the
lower bounds and the behaviour during even time intervals
can be obtained via similar reasoning.
A. One-Switch-Ahead (OSA) Threshold
Let us consider the behaviour of ν
i,fil
during the odd
interval, [t
2k
t
2k+1
] (see Figure 2a). By introducing, in eq.
(18), the upper bound ¯ν on ν
i
, the time domain solution to
(17) can be upper bounded during the interval as in eq. (19).
¯ν =
(A
11
+ P )(¯
1
+
¯
ζ)
+ M
i
(18)
ν
i,fil
(t) e
K(tt
2k
)
ν
i,fil
(t
2k
) + (1 e
K(tt
2k
)
)¯ν (19)
Remark 1: The right-hand side of eq. (19) is an upper
bound for ν
i,fil
(t). However, it can be easily proved that
the inequality in eq. (19) will also hold in case of an attack.
Therefore, it is not a valid threshold for attack detection.
Next, in eq. (19), the hypothetical maximum time between
switches
¯
t = max(t
2k+1
t
2k
) can be defined as an upper
bound for t. It will be shown in the following that this bound
can be exceeded in case of an attack, and therefore eq. 20
is a valid threshold for attack detection.
¯ν
i,fil,OSA
(t
2k
) = e
K
¯
t
ν
i,fil
(t
2k
) + (1 e
K
¯
t
)¯ν , (20)
¯
t corresponds to the longest time for which
y,i
=
1,i
ζ
1,i
can stay positive. This is the case when
1,i
decreases
from its maximum value, ¯
1
, to its minimum value, ¯
1
,
with a minimum rate ˙
1
= min(|˙
1,i
|). Note that, for this to
happen, ζ
1,i
<
1,i
during the whole time. This is visualised
in Figure 2b and results in the following expression for
¯
t
¯
t =
1
˙
1
(21)
The bounds, ¯
1
, ˙
1
, and
¯
ζ are derived in theorem 1, Appen-
dices A and C respectively, and shown in eqs. (22)-(24).
¯
1
=
¯
ζ =
¯η
i,(1)
+ h
¯
ξ
i,(2)
¯η
i,(2)
+ h
¯
ξ
i,(3)
(22)
˙
1
= |A
12
¯
2,i
| + M
i
(23)
¯
2,i
=
2,i,0
e
A
22
t
2A
21
¯
ζ bu
i1
A
22
(24)
One can see in eq. 24 that ¯
2,i
depends on the attack. The
threshold is designed assuming no attack, so u
i1
= 0.
Therefore, it is easy to check that if there is an attack,
2,i
can become bigger than ¯
2,i
(with u
i1
= 0). Therefore
eq. 20 is a valid threshold for attack detection.
At t
2(k+1)
this threshold needs to be recalculated using a
new initial value of ν
i,fil
(t
2(k+1)
), as illustrated in Figure 2.
This re-initialisation on the signal the threshold is attempting
to bound leads to inconsistent detection. Even though an
attack can cause detection between recalculations, it is also
dependent on the noise behaviour. As before, ζ
1,i
<
1,i
needs to hold during
¯
t for the threshold to be reached, and
even though this chance is non-zero in case of an attack, in
every period [t
2k
t
2k+1
] there is a large chance an attack
is not detected. Therefore in the next section a threshold is
designed that is not dependent on ν
i,fil
.
B. Multiple-Switches-Ahead (MSA) Threshold
The MSA threshold is based on the possible behaviour of ν
fil
over more than one switch ahead in time, after a hypothetical
occurrence of the worst case behaviour considered for the
OSA threshold.
5744
Authorized licensed use limited to: TU Delft Library. Downloaded on May 26,2021 at 08:25:06 UTC from IEEE Xplore. Restrictions apply.

Citations
More filters
Journal ArticleDOI
TL;DR: This paper analyzed the attacks that already targeted self-driving cars and extensively present potential cyber-attacks and their impacts on those cars along with their vulnerabilities and the possible mitigation strategies taken by the manufacturers and governments.
Abstract: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle’s operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-attack. We also provide further research directions to improve the security issues associated with self-driving cars.

54 citations


Cites background from "A Sliding Mode Observer Approach fo..."

  • ...Attack detection and resilient platooning operation are further investigated in [30], [31] [32]....

    [...]

  • ...Vehicle platooning is a great example of such research focus, where the platoon vehicles can detect a malicious member and take decisions without any input from the node under attack [27], [28] [29], [30] [31], [32]....

    [...]

Journal ArticleDOI
09 Jun 2021
TL;DR: In this paper, the authors present the state of the art on event-triggered SMC and familiarize the readers with the design techniques with their pros and cons, since this will be very helpful to the researchers and engineers for implementing SMC using event-based feedback strategies.
Abstract: Event-triggered controllers are well known for guaranteeing the desired stability for a sampled-data system with minimum resource utilization. Over the past decade, the study has revealed that the overall performance improvement for a sampled-data system can be achieved by replacing the time-based sampling with an event-triggered one. The design of sliding mode control (SMC) in the event-triggering framework has also shown similar outcomes, especially for uncertain systems. There are different design strategies for event-triggered SMC available in the literature for networked dynamical systems that are potentially affected by uncertainties and transmission delays. The purpose of this survey article is to present the state of the art on event-triggered SMC and familiarize the readers with the design techniques with their pros and cons, since this will be very helpful to the researchers and engineers for implementing SMC using event-based feedback strategies.

29 citations

Journal ArticleDOI
TL;DR: In this paper , a survey summarizes and reviews the existing results on attack/anomaly detection and resilience of connected and automated vehicles in control frameworks, and some potential research directions and challenges are identified.
Abstract: Recent advances in attack/anomaly detection and resilience strategies for connected and automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective. Compared to traditional vehicles, CAVs are featured in the increasing number of perception sensors, advanced intra-vehicle communication technologies, capabilities of driving automation and connectivity between single vehicles. These features bring about safety issues which are not encountered in traditional vehicle systems. One main type of these issues is the attack or anomaly launched onto the perception sensors and the communication channels. With such a consideration, this survey summarizes and reviews the existing results on attack/anomaly detection and resilience of CAVs in control frameworks. This paper reviews the results according to the positions at which the attacks/anomalies occur. These positions are divided into three categories, namely, intra-vehicle communication network, perception sensors and inter-vehicle communication network. From this perspective, the recent attack/anomaly detection and resilience results are reviewed according to different positions attacked. After reviewing existing results, some potential research directions and challenges are identified.

19 citations

Proceedings ArticleDOI
24 Oct 2020
TL;DR: In this article, the authors proposed a transmissibility-based health monitoring approach for fault detection in an autonomous vehicle platoon, where a sliding mode controller is used to mitigate the failure of either a physical component of a vehicle or a communication link between two vehicles.
Abstract: An autonomous vehicle platoon is a network of autonomous vehicles that communicate together to move in a desired way. One of the greatest threats to the operation of an autonomous vehicle platoon is the failure of either a physical component of a vehicle or a communication link between two vehicles. This failure affects the safety and stability of the autonomous vehicle platoon. Transmissibility-based health monitoring uses available sensor measurements for fault detection under unknown excitation and unknown dynamics of the network. After a fault is detected, a sliding mode controller is used to mitigate the fault. Different fault scenarios are considered including vehicle internal disturbances, cyber attacks, and communication delays. We apply the proposed approach to a bond graph model of the platoon and an experimental setup consisting of three autonomous robots.

13 citations

Proceedings ArticleDOI
25 May 2021
TL;DR: In this article, the authors investigated fault detection and mitigation of connected autonomous vehicle platoons with a human-driven vehicle using transmissibility operators, which does not require knowledge of the excitation signal or the dynamics of the platoon.
Abstract: This study investigates fault detection and mitigation of connected autonomous vehicle platoons with a human-driven vehicle using transmissibility operators. Transmissibility-based health monitoring uses available sensor measurements only and does not require knowledge of the excitation signal or the dynamics of the platoon. The human-driver behaviour can be considered as an independent excitation that acts on the platoon along with the desired velocity of the platoon. Therefore, transmissibility-based health monitoring is independent of the desired velocity of the platoon, the human-driver behaviour, and the underlying dynamics of the platoon. The perception sensors in the vehicle that follows the human-driven vehicle play a crucial role in the safety of the platoon. Thus, we consider failure in these sensors in addition to failures in the communication links such as a cyber-attacks and communication time delay. Next, we use a transmissibility-based sliding-mode control to mitigate the proposed faults. The proposed approach is validated numerically using simulation models.

11 citations

References
More filters
Proceedings ArticleDOI
01 Dec 2018
TL;DR: The unknown effect of environment is modeled by an additive exogenous stochastic disturbance and it is explained that the combination of noise and delay puts a limit on the ability to leverage connectivity in order to decrease risk.
Abstract: A platoon is a suitable model to study self-operating (e.g., driving or flying) vehicles, where a team of vehicles is lined up in a chain and travel in close proximity of each other. These vehicles form a dynamical network where the objective is to match their speed and traverse safely without inter-vehicle collisions. In this paper, the unknown effect of environment is modeled by an additive exogenous stochastic disturbance. We impose the realistic constraint that vehicles communicate with some certain time delay. We use a second order model for the platoon and define a risk measure that quantifies possibility of an inter-vehicle collision. A closed form expression is derived for the risk measure that uncovers an inherent interplay among communication topology, statistics of the exogenous disturbance, and time delay. We explain that the combination of noise and delay puts a limit on our ability to leverage connectivity in order to decrease risk. In some cases we show that more connectivity, increases the risk of collision.

10 citations

Proceedings ArticleDOI
05 Apr 2017
TL;DR: A layered architecture for this type of automation applications, consisting of an operational, a tactical, and a strategic layer, is presented, which builds upon the decomposition of traffic scenarios into maneuver primitives, which are initiated by a so-called interaction protocol.
Abstract: Automated vehicles are designed to take over all or part of the driver's task, in order to safely and comfortably navigate through road traffic. Automated vehicles, however, are limited by the line-ofsight characteristics of the on-board sensors, e.g., radar, lidar, and camera. To overcome this limitation, wireless inter-vehicle communication can be employed, which not only provides information of vehicles beyond the line-of-sight, but also provides information that cannot be retrieved otherwise. This allows for implementation of collaborative behavior, which can significantly increase traffic throughput and decrease fuel consumption. The resulting vehicles are often referred to as "cooperative automated vehicles", whereas non-communicating automated vehicles are usually (but not necessarily correctly) termed "autonomous vehicles". To classify the various types of vehicle automation, the Society of Automotive Engineers has defined six automation levels, according to increasing functionality of the automation system and, correspondingly, a decreasing role of the diver [1]. In this classification scheme, level 1 automation, characterized by automation of either the longitudinal or the lateral vehicle motion, still requires the driver to be alert and to be able to take over the driving task at any time, thus implying only moderate requirements regarding reliability of the automation hard- and software. By means of an example of cooperative automation, in particular short-distance vehicle following by means of cooperative adaptive cruise control (CACC)[2], it is however shown that even for level 1 systems, stringent reliability requirements may apply, since the driver is unable to serve as a fallback option in case of system failures. CACC, which is also the basis for truck platooning, is only concerned with automation of the longitudinal vehicle motion. As a next step, cooperative automation can be extended to also involve lateral motion, thus yielding cooperative automated maneuvering, involving, e.g., automated gap making and subsequent merging into a platoon. A layered architecture for this type of automation applications, consisting of an operational, a tactical, and a strategic layer, is presented. This architecture builds upon the decomposition of traffic scenarios into maneuver primitives, which are initiated by a so-called interaction protocol. The practical application of this approach is illustrated by a brief overview of the Grand Cooperative Driving Challenge (GCDC), which was held in 2016 in The Netherlands [3]. As such, a first step is made towards a common automation framework, which is considered essential to establish true cooperation among different types and brands of vehicles.

4 citations


"A Sliding Mode Observer Approach fo..." refers background in this paper

  • ...We are not interested here in the actual implementation of the attack, for this, one can refer to [12]–[15]....

    [...]

  • ...Indeed, vulnerabilities of Vehicle-to-Vehicle (V2V) networks to cyber attacks have been investigated in [12]–[15]....

    [...]