Security of Vehicle Platooning: A Game-Theoretic Approach

被引:29
作者
Basiri, Mohammad Hossein [1 ]
Pirani, Mohammad [2 ]
Azad, Nasser L. [3 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Waterloo, Dept Syst Design Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Game theory; graph theory; Nash equilibrium; security; sensor placement; ADAPTIVE CRUISE CONTROL; CONTROL-SYSTEMS; IMPLEMENTATION; PERFORMANCE; ATTACKS; IMPACT; SAFETY;
D O I
10.1109/ACCESS.2019.2961002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the security of a vehicle platoon exposed to cyber attacks using a game-theoretic approach. The platoon topologies under investigation are directed (called predecessor following) or undirected (bidirectional) weighted graphs. The edge weights specify the quality of the communication links between the vehicles in both the unidirectional/bidirectional data transfer environments. The attacker-detector game is defined as follows. The attacker targets some vehicles in the platoon to attack and the detector deploys monitoring sensors on the vehicles. The attackers objective is to be as stealthy to the sensors as possible while the detector tries to place the monitoring sensors to detect the attack impact as much as it can. The existence of Nash Equilibrium (NE) strategies for this game is investigated based on which the detector can choose specific vehicles to put his sensors on and increase the security level of the system. Moreover, we study the effect of adding (or removing) communication weights between vehicles on the game value. The simulation and experimental results conducted on a vehicle platoon setup using Robotic Operating System (ROS) demonstrate the effectiveness of our analyses.
引用
收藏
页码:185565 / 185579
页数:15
相关论文
共 79 条
[51]   False Data Injection Attacks against State Estimation in Wireless Sensor Networks [J].
Mo, Yilin ;
Garone, Emanuele ;
Casavola, Alessandro ;
Sinopoli, Bruno .
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, :5967-5972
[52]   Secure Control Against Replay Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :911-918
[53]  
Mousavinejad E, 2018, PROC IEEE INT SYMP, P603, DOI 10.1109/ISIE.2018.8433814
[54]  
Nowakowski C., 2015, Tech. Rep. Cooperat. Agreement DTFH61-13-H-00012 Task 1.2
[55]   Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability [J].
Oencue, Sinan ;
Ploeg, Jeroen ;
van de Wouw, Nathan ;
Nijmeijer, Henk .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2014, 15 (04) :1527-1537
[56]   A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems [J].
Pirani, Mohammad ;
Nekouei, Ehsan ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :114-119
[57]   On the Smallest Eigenvalue of Grounded Laplacian Matrices [J].
Pirani, Mohammad ;
Sundaram, Shreyas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (02) :509-514
[58]  
Ploeg J, 2013, IEEE INT C INTELL TR, P1210, DOI 10.1109/ITSC.2013.6728397
[59]  
Press W. H., 1986, NUMERICAL RECIPES C
[60]   Intelligent Transportation Spaces: Vehicles, Traffic, Communications, and Beyond [J].
Qu, Fengzhong ;
Wang, Fei-Yue ;
Yang, Liuqing .
IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (11) :136-142