Security of Vehicle Platooning: A Game-Theoretic Approach

被引:29
作者
Basiri, Mohammad Hossein [1 ]
Pirani, Mohammad [2 ]
Azad, Nasser L. [3 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Waterloo, Dept Syst Design Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Game theory; graph theory; Nash equilibrium; security; sensor placement; ADAPTIVE CRUISE CONTROL; CONTROL-SYSTEMS; IMPLEMENTATION; PERFORMANCE; ATTACKS; IMPACT; SAFETY;
D O I
10.1109/ACCESS.2019.2961002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The edge weights specify the quality of the communication links between the vehicles in both the unidirectional/bidirectional data transfer environments. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attackers objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as it can. The existence of Nash Equilibrium (NE) strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication weights between vehicles on the game value. The simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses.
引用
收藏
页码:185565 / 185579
页数:15
相关论文
共 79 条
[41]  
Lei C., 2011, 2011 11th International Conference on ITS Telecommunications (ITST), P381, DOI 10.1109/ITST.2011.6060086
[42]   Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach [J].
Li, Yuzhe ;
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2831-2836
[43]   A Modular CACC System Integration and Design [J].
Lidstrom, Kristoffer ;
Sjoberg, Katrin ;
Holmberg, Ulf ;
Andersson, Johan ;
Bergh, Fredrik ;
Bjade, Mattias ;
Mak, Spencer .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2012, 13 (03) :1050-1061
[44]  
LOBATO W, 2017, P IEEE GLOB COMM C G, P1
[45]   Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks [J].
Lyamin, Nikita ;
Vinel, Alexey ;
Jonsson, Magnus ;
Loo, Jonathan .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (01) :110-113
[46]   Cooperative Control and Potential Games [J].
Marden, Jason R. ;
Arslan, Guerdal ;
Shamma, Jeff S. .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2009, 39 (06) :1393-1407
[47]  
Merco R, 2018, P AMER CONTR CONF, P5582, DOI 10.23919/ACC.2018.8431538
[48]  
Mieghem P.V., 2011, GRAPH SPECTRA COMPLE
[49]   Cooperative Adaptive Cruise Control in Real Traffic Situations [J].
Milanes, Vicente ;
Shladover, Steven E. ;
Spring, John ;
Nowakowski, Christopher ;
Kawazoe, Hiroshi ;
Nakamura, Masahide .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2014, 15 (01) :296-305
[50]   Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter [J].
Milosevic, Jezdimir ;
Tanaka, Takashi ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
IFAC PAPERSONLINE, 2017, 50 (01) :8393-8398