Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems

被引:104
作者
Ju, Zhiyang [1 ,2 ]
Zhang, Hui [1 ,3 ]
Tan, Ying [2 ]
机构
[1] Beihang Univ, Sch Transportat Sci & Engn, Dept Automot Engn, Beijing 100191, Peoples R China
[2] Univ Melbourne, Dept Mech Engn, Melbourne, Vic 3010, Australia
[3] Beihang Univ, Ningbo Inst Technol, Ningbo 315323, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack detection and estimation; platoon-based connected vehicles; distributed Kalman filter; modified generalized likelihood ratio algorithm; CYBER-PHYSICAL SYSTEMS; KALMAN-FILTER; DESIGN;
D O I
10.1109/TVT.2020.2980137
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article investigates the distributed sensor deception attack and estimation for a class of platoon-based connected vehicles. In these systems, the information of each vehicle's position and its relative distances with respect to its neighbours plays a crucial role to achieve the desired group performance. When getting deception attacks on such important information, it will result in severe consequences including collision. In order to detect and estimate deception attacks, a longitudinal dynamic model of vehicle platoons with modelling uncertainties, measurement noises and piece-wise constant deception attacks on sensors is first presented. With the consideration of the practical issue that a local vehicle is not able to access to global information, a distributed Kalman filter is proposed to estimate the state information using local output information. Based on the residuals obtained by the distributed Kalman filter, a modified generalized likelihood ratio (GLR) algorithm is proposed to detect and estimate the sensor deception attacks. Finally, simulations with the help of standard Carsim software are provided to verify the effectiveness of the proposed algorithm. Fair comparisons between the proposed method and the standard chi(2) detector are also presented in order to provide insights for engineering practitioners.
引用
收藏
页码:4609 / 4620
页数:12
相关论文
共 49 条
[1]  
Alam A. A., 2010, 2010 13th International IEEE Conference on Intelligent Transportation Systems (ITSC 2010), P306, DOI 10.1109/ITSC.2010.5625054
[2]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[3]  
Anderson B. D., 2012, OPTIMAL FILTERING
[4]   Unknown Input Observers for Simultaneous Estimation of Vehicle Dynamics and Driver Torque: Theoretical Design and Hardware Experiments [J].
Anh-Tu Nguyen ;
Guerra, Thierry-Marie ;
Sentouh, Chouki ;
Zhang, Hui .
IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2019, 24 (06) :2508-2518
[5]  
[Anonymous], 2015, IEEE T VEH TECHNOL, DOI DOI 10.1109/TVT.2015.2501658
[6]  
Basseville M., 1993, DETECTION ABRUPT CHA, V104
[7]  
Bergenhem C., 2012, P 19 ITS WORLD C VIE, P1
[8]   Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems [J].
Biron, Zoleikha Abdollahi ;
Dey, Satadru ;
Pisu, Pierluigi .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (12) :3893-3902
[9]  
Biron Z. A., 2017, THESIS
[10]  
Blanke M., 2006, DIAGNOSIS FAULT TOLE, V2