Secure Event-Triggered Sliding Control for Path Following of Autonomous Vehicles Under Sensor and Actuator Attacks

被引:20
作者
Sun, Hong-Tao [1 ,2 ]
Peng, Chen [3 ]
Ge, Xiaohua [4 ]
Chen, Zhi [3 ]
机构
[1] Qufu Normal Univ, Coll Engn, Rizhao 276826, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Dept Automat, Shanghai 200444, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
来源
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES | 2024年 / 9卷 / 01期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Actuators; Security; Vehicle dynamics; Robustness; Control design; Autonomous vehicles; Uncertainty; event-triggered scheme; security control; sliding control; sensor and actuator attacks; CYBER-PHYSICAL SYSTEMS; DELAY; COMMUNICATION; STABILIZATION;
D O I
10.1109/TIV.2023.3278697
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sensor and actuator attacks, which propagate the injected false data through CAN bus, make real threats to the security of the control of autonomous vehicles. This article attempts to solve the secure event-triggered path following control problem of autonomous vehicles subject to both sensor and actuator attacks. Firstly, a more general physical security model is established to characterize the impacts of sensor and actuator attacks on measurements and control actions. Then, feedback linearization method based on Lie derivative is exploited to linearize the established nonlinear attacked model. Thus, the nonlinear path following control is transformed into a linear case which will facilitate to the following networked-based analysis and design. Based on the established secure model, the event-triggered control scheme is utilized to alleviate communication burden under sampled-data control framework. Furthermore, the sliding control design is augmented to mitigate the malicious impacts caused by such false data injection attacks due to its inherent robustness to abnormal attack signal. Remarkably, the proposed secure sliding control can be plugged into the original control scheme rather than changing its existing control structure. Criteria for formal stability analysis and controller design are also provided and expressed in terms of some numerically tractable linear matrix inequalities. Finally, both simulation and experimental verification cases are shown to verify the composite control scheme.
引用
收藏
页码:981 / 992
页数:12
相关论文
共 37 条
[1]   Communication-Constrained Active Suspension Control for Networked In-Wheel Motor-Driven Electric Vehicles With Dynamic Dampers [J].
Ahmad, Iftikhar ;
Ge, Xiaohua ;
Han, Qing-Long .
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 7 (03) :590-602
[2]   Coordinated Path-Following Control for Multiple Autonomous Vehicles With Communication Time Delays [J].
Chen, Dong-Liang ;
Liu, Guo-Ping .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (05) :2005-2012
[3]   A review on safety failures, security attacks, and available countermeasures for autonomous vehicles [J].
Cui, Jin ;
Liew, Lin Shen ;
Sabaliauskaite, Giedre ;
Zhou, Fengjun .
AD HOC NETWORKS, 2019, 90
[4]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[5]   Security-Based Resilient Triggered Output Feedback Lane Keeping Control for HumanMachine Cooperative Steering Intelligent Heavy Truck Under Denial-of-Service Attacks [J].
Ding, Fei ;
Shan, Hongyang ;
Han, Xu ;
Jiang, Chao ;
Peng, Chen ;
Liu, Jie .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (07) :2264-2276
[6]  
Faisal A., 2010, J. Transport Land Use, V12, P45
[7]   A Plug-and-Play, Scalable Control Method for AC Island Microgrid [J].
Feng Yiwei ;
Wang Xin .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (03) :2771-2783
[8]   Sampled-data vehicular platoon control with communication delay [J].
Gong, Jian ;
Zhao, Yuan ;
Lu, Zibao .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART I-JOURNAL OF SYSTEMS AND CONTROL ENGINEERING, 2018, 232 (01) :39-49
[9]   Path Tracking Control of Autonomous Vehicles Subject to Deception Attacks via a Learning-Based Event-Triggered Mechanism [J].
Gu, Zhou ;
Yin, Tingting ;
Ding, Zhengtao .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 32 (12) :5644-5653
[10]   Absolute stability of time-delay systems with sector-bounded nonlinearity [J].
Han, QL .
AUTOMATICA, 2005, 41 (12) :2171-2176