This article provides an overview of the potential attacks that can impact connected vehicles (CV) technologies and highlights how a resilient control scheme can be effective to mitigate the effect of these attacks by allowing the system to safely operate with reduced performance. CVs endure several challenges that can occur due to cyberattacks with purposes of disrupting the performance of the connected vehicles system. To improve safety and security, advanced vehicular control systems must be designed to be resilient to cyberattacks. The attack detection and switching strategy is formulated as an MPC-like optimization problem, where the control variable is constrained to a specific strategy and applied in a receding horizon fashion. The choice of the cost function plays an important role in the performance of the system. The results of the switching strategy show that in comparison with the perfect case—in which the attacks are perfectly identified and the correct strategy selected immediately—there is approximately a 22 percent strategy improvement that could still be achieved by changing the switching strategy.

References

1.
J.
Guo
and
N.
Balon
,
“Vehicular Ad Hoc Networks and Dedicated Short-Range Communication”
,
University of Michigan
,
2006
.
2.
US Department of Transportation, “Dedicated Short Range Communications” http://www.its.dot.gov/DSRC/Retrieved Jan 10,
2015
.
3.
F.
Bai
and
H.
Krishnan
, “Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications’, Proceedings of the IEEE ITSC,
2006
, pp.
355
363
.
4.
J.P.
Singh
,
N.
Bambos
,
B.
Srinivasan
and
D.
Clawin
,
“Wireless LAN Performance under Varied Stress Conditions in Vehicular Traffic Scenarios”
,
IEEE Vehicular Conference, VTC
, vol.
2
,
2002
, pp.
743
737
.
5.
S.
Sivavakeesar
and
G.
Pavlou
,
“Quality of Service Aware MAC Based on IEEE 802.11 for Multihop ad-hoc Networks”
,
IEEE Wireless Communications and Networking Conference
, vol.
3
,
2004
, pp.
1482
1487
.
6.
P
Seiler
,
A.
Pant
and
K.
Hedrick
,
“Disturbance propagation in vehicle strings,”
IEEE Trans. Automotive Control
, vol.
49
, no.
10
, Oct.
2004
, pp.
1835
1842
.
7.
G. J. L.
Naus
,
R.P.A.
Vugts
,
J.
Ploeg
,
M. J. G.
van de Molengraft
and
M.
Steinbuch
,
“String-stable CACC design and experimental validation: A frequency-domain approach,”
IEEE Trans. Vehicle Technology
, vol.
59
, no.
9
, Nov.
2010
, pp.
4268
4279
.
8.
S.
Dadras
,
R. M.
Gerdes
and
R.
Sharma
, “Vehicular platooning in an adversarial environment,” in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ACM,
2015
, pp.
167
178
.
9.
Z. H.
Pang
,
G.
Liu
and
Z.
Dong
, “Secure Networked Control Systems under Denial of Service Attacks”, 18th IFAC world Congress,
2011
, pp.
8908
8915
.
10.
Z. A.
Biron
,
S.
Dey
and
P
Pisu
, “Fault Diagnosis of Connected Vehicles Under Unreliable Networks,” In Proceedings of the ASME 2016 Dynamic Systems Control Conference, Oct 12-14, Minneapolis, MN,
2016
.
11.
A.
Housholder
,
A.
Manion
,
L.
Pesante
,
G.
Weaver
and
R.
Thomas
, “Managing the Threat of Denial of Service Attack”, Carnegie Mellon CERT Coordination Center, Pittsburgh, PA.
12.
S.
Amin
,
A.
Cardenas
and
S.
Sastry
, “Safe and Secure Networked Control Systems under Denial of Service Attacks”, HSCC 2009, LNCS 5469,
2009
, pp.
31
45
.
13.
M.
Long
,
C.
Wu
and
J.
Hung
,
“Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation”
,
IEEE Transaction on Industrial Information
, vol.
1
, no.
2
,
2005
, pp.
85
96
.
14.
Z.
Biron
and
P
Pisu
, “Resilient Control Strategy Under Denial of Service in Connected Vehicles,” American Control Conference 2017, Seattle, WA,
2017
.
15.
L.
Xie
,
Y.
Mo
and
B.
Sinopoli
, “False data injection attacks in electricity markets,” 2010 First IEEE International Conference in Smart Grid Communications (SmartGridComm), pp.
226
231
, IEEE,
2010
.
16.
Y.
Mo
and
B.
Sinopoli
, “False data injection attacks in control systems,” in Preprints of the 1st workshop on Secure Control Systems,
2010
, pp. 1-6.
17.
Y.
Liu
,
P
Ning
and
M. K.
Reiter
,
“False data injection attacks against state estimation in electric power grids,”
ACM Transactions on Information and System Security (TISSEC)
, vol.
14
, no.
1
,
2011
p.
13
.
18.
Z.A.
Biron
, “A Resilient Control Approach to Secure CyberPhysical Systems (CPS) with an Application on Connected Vehicles” (2017). All Dissertations,
1869
.
You do not currently have access to this content.