Security of Vehicle Platooning: A Game-Theoretic Approach

被引:29
作者
Basiri, Mohammad Hossein [1 ]
Pirani, Mohammad [2 ]
Azad, Nasser L. [3 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Waterloo, Dept Syst Design Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Game theory; graph theory; Nash equilibrium; security; sensor placement; ADAPTIVE CRUISE CONTROL; CONTROL-SYSTEMS; IMPLEMENTATION; PERFORMANCE; ATTACKS; IMPACT; SAFETY;
D O I
10.1109/ACCESS.2019.2961002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The edge weights specify the quality of the communication links between the vehicles in both the unidirectional/bidirectional data transfer environments. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attackers objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as it can. The existence of Nash Equilibrium (NE) strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication weights between vehicles on the game value. The simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses.
引用
收藏
页码:185565 / 185579
页数:15
相关论文
共 79 条
[1]   An Adaptive Switched Control Approach to Heterogeneous Platooning With Intervehicle Communication Losses [J].
Abou Harfouch, Youssef ;
Yuan, Shuai ;
Baldi, Simone .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1434-1444
[2]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[3]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[4]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[5]  
[Anonymous], 2010, P 1 WORKSH SEC CONTR
[6]  
[Anonymous], 2018, ASTME221 ASTM INT
[7]  
[Anonymous], 2017, BRIEF HIST CAR HACKI
[8]   Comprehensive survey on security services in vehicular ad-hoc networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deborah, Lazarus Jegatha .
IET INTELLIGENT TRANSPORT SYSTEMS, 2016, 10 (06) :379-388
[9]  
Bai F, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P329
[10]   Kalman Filter Based Secure State Estimation and Individual Attacked Sensor Detection in Cyber-Physical Systems [J].
Basiri, Mohammad Hossein ;
Thistle, John G. ;
Simpson-Porco, John W. ;
Fischmeister, Sebastian .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :3841-3848