Resilient control strategy under Denial of Service in connected vehicles

Zoliekha Abdollahi Biron, Satadru Dey, Pierluigi Pisu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

63 Scopus citations

Abstract

With the advent of Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication, connected vehicle systems can be a promising tool to realize efficient and intelligent transportation. Essentially, connected vehicles can be viewed as a group of vehicles that can communicate with each other and the infrastructure. However, it also presents some challenges from safety and security point of view. Apart from the malfunction in the communication protocol, wireless communication networks can be subjected to cyber-attacks such as Denial of Service (DoS). Therefore, a vehicular control scheme which is resilient to such cyber-attacks is essential to improve the safety and security. In this paper, we develop a resilient control scheme for a platoon of connected vehicles equipped with Cooperative Adaptive Cruise Control (CACC) to mitigate the DoS attack. We modify the conventional CACC algorithm by adding an estimation algorithm consisting of a set of Luenberger's observer and a delay estimator. The efficacy of the proposes scheme is illustrated via simulation case studies.

Original languageEnglish (US)
Title of host publication2017 American Control Conference, ACC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4971-4976
Number of pages6
ISBN (Electronic)9781509059928
DOIs
StatePublished - Jun 29 2017
Event2017 American Control Conference, ACC 2017 - Seattle, United States
Duration: May 24 2017May 26 2017

Publication series

NameProceedings of the American Control Conference
ISSN (Print)0743-1619

Other

Other2017 American Control Conference, ACC 2017
Country/TerritoryUnited States
CitySeattle
Period5/24/175/26/17

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Resilient control strategy under Denial of Service in connected vehicles'. Together they form a unique fingerprint.

Cite this