Skip to main content

Secure Dynamic Nonlinear Heterogeneous Vehicle Platooning: Denial-of-Service Cyber-Attack Case

  • Chapter
  • First Online:
Security in Cyber-Physical Systems

Abstract

Connected and Automated Vehicles (CAVs), as a large class of cyber-physical systems, have recently emerged as an effective autonomous driving mechanism in intelligent transportation systems in terms of improvement in safety, fuel economy, road throughput, and driving comfort. This chapter deals with a Secure Distributed Nonlinear Model Predictive Control (Secure–DNMPC) algorithm consisting of (i) detection and (ii) mitigation phases to securely control a string of CAVs, namely vehicle platoons. The approach ensures the desired control performance of a nonlinear heterogeneous platoon equipped by different communication topologies under the premise of the existence of Denial-of-Service (DoS) attacks. The proposed method is also capable of providing safe and secure control of dynamic platoons in which arbitrary vehicles might perform cut-in and/or cut-out maneuvers. Convergence time and stability analysis of the system are also investigated in some cases. Furthermore, to handle DoS attacks modeled by an exceeding time delay in inter-vehicular data transmission, we propose the integration of an Unscented Kalman Filter (UKF) design within the controller resulting in a novel Secure–DNMPC–UKF co-design. This, in essence, estimates the delayed system states and feeds the predicted values to the Secure–DNMPC, which efficiently mitigates the attack effects. Simulation results demonstrate the fruitfulness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It should be noted that the acceptable time delay heavily depends on the application. Here, we focus on the automotive control application.

  2. 2.

    Although, this upper bound might be conservative in some cases (such as in the scenario studied in Sect. 5.2), it provides a safe margin for the convergence time of the controller.

  3. 3.

    Note that the jump in the relative spacing error of the third FV (black curve) is due to the DoS attack.

  4. 4.

    This could also be considered as the environment effects on the transmitted signals. Modeling the environment effect with white Gaussian noise in V2V communications is widely used in literature [70, 71].

References

  1. Wang, X.: Cyber-Physical Systems: A Reference. Springer, Berlin, Heidelberg (2021)

    Google Scholar 

  2. Song, H., Fink, G., Jeschke, S.: Security and Privacy in Cyber-Physical Systems. Wiley Online Library (2017)

    Google Scholar 

  3. Guo, S., Zeng, D.: Cyber-Physical Systems: Architecture, Security and Application. Springer (2019)

    Google Scholar 

  4. Koç, Ç.K.: Cyber-Physical Systems Security. Springer (2018)

    Google Scholar 

  5. Liu, H., Niu, B., Li, Y.: False-data-injection attacks on remote distributed consensus estimation. IEEE Trans. Cybern. (2020)

    Google Scholar 

  6. Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security—a survey. IEEE Int. Things J. 4(6), 1802–1831 (2017)

    Google Scholar 

  7. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Google Scholar 

  8. Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K.: Cyber Security for Cyber Physical Systems, vol. 768. Springer (2018)

    Google Scholar 

  9. Basiri, M.H., Azad, N.L., Fischmeister, S.: Distributed time-varying kalman filter design and estimation over wireless sensor networks using OWA sensor fusion technique. In: 2020 28th Mediterranean Conference on Control and Automation (MED), pp. 325–330. IEEE (2020)

    Google Scholar 

  10. Langner, R.: Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49–51 (2011)

    Google Scholar 

  11. Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)

    Google Scholar 

  12. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)

    Google Scholar 

  13. Shoukry, Y., Martin, P., Tabuada, P., Srivastava, M.: Non-invasive spoofing attacks for anti-lock braking systems. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 55–72. Springer (2013)

    Google Scholar 

  14. Singh, S.: Critical reasons for crashes investigated in the national motor vehicle crash causation survey. Technical report (2015)

    Google Scholar 

  15. Transport Canada: Canadian motor vehicle traffic collision statistics (2014)

    Google Scholar 

  16. Road Safety in Canada (2011). http://www.tc.gc.ca/eng/motorvehiclesafety/tp-tp15145-1201.htm

  17. Godsmark, P., Kirk, B., Gill, V., Flemming, B.: Automated vehicles: the coming of the next disruptive technology (2015)

    Google Scholar 

  18. Gao, F., Hu, X., Li, S.E., Li, K., Sun, Q.: Distributed adaptive sliding mode control of vehicular platoon with uncertain interaction topology. IEEE Trans. Ind. Electron. 65(8), 6352–6361 (2018)

    Google Scholar 

  19. Li, Y., Tang, C., Peeta, S., Wang, Y.: Nonlinear consensus-based connected vehicle platoon control incorporating car-following interactions and heterogeneous time delays. IEEE Transactions on Intelligent Transportation Systems (2018)

    Google Scholar 

  20. Liu, P., Kurt, A., Ozguner, U.: Distributed model predictive control for cooperative and flexible vehicle platooning. IEEE Trans. Control Syst. Technol. (99), 1–14 (2018)

    Google Scholar 

  21. Zheng, Y., Li, S.E., Wang, J., Cao, D., Li, K.: Stability and scalability of homogeneous vehicular platoon: Study on the influence of information flow topologies. IEEE Trans. Intell. Transp. Syst. 17(1), 14–26 (2016)

    Google Scholar 

  22. Pirani, M., Hashemi, E., Simpson-Porco, J.W., Fidan, B., Khajepour, A.: Graph theoretic approach to the robustness of \(k\)-nearest neighbor vehicle platoons. IEEE Trans. Intell. Transp. Syst. 18(11), 3218–3224 (2017)

    Google Scholar 

  23. Van Arem, B., Van Driel, C.J., Visser, R.: The impact of cooperative adaptive cruise control on traffic-flow characteristics. IEEE Trans. Intell. Transp. Syst. 7(4), 429–436 (2006)

    Google Scholar 

  24. Rawat, D.B., Bajracharya, C.: Vehicular Cyber Physical Systems. Springer, Technical report (2017)

    Google Scholar 

  25. Kargl, F., Papadimitratos, P., Buttyan, L., Müter, M., Schoch, E., Wiedersheim, B., Thong, T.V., Calandriello, G., Held, A., Kung, A., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 46(11), 110–118 (2008)

    Google Scholar 

  26. Koopman, P., Wagner, M.: Autonomous vehicle safety: an interdisciplinary challenge. IEEE Intell. Transp. Syst. Mag. 9(1), 90–96 (2017)

    Google Scholar 

  27. Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: International Workshop on Hybrid Systems: Computation and Control, pp. 31–45. Springer (2009)

    Google Scholar 

  28. Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, 2009. Allerton 2009, pp. 911–918. IEEE (2009)

    Google Scholar 

  29. Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 5967–5972. IEEE (2010)

    Google Scholar 

  30. Chabukswar, R., Sinopoli, B., Karsai, G., Giani, A., Neema, H., Davis, A.: Simulation of network attacks on SCADA systems. In: First Workshop on Secure Control Systems, pp. 587–592 (2010)

    Google Scholar 

  31. Basiri, M.H., Thistle, J.G., Simpson-Porco, J.W., Fischmeister, S.: Kalman filter based secure state estimation and individual attacked sensor detection in cyber-physical systems. In: American Control Conference (ACC), vol. 2019, pp. 3841–3848. IEEE (2019)

    Google Scholar 

  32. Siegel, J.E., Erb, D.C., Sarma, S.E.: A survey of the connected vehicle landscape-architectures, enabling technologies, applications, and development areas. IEEE Trans. Intell. Transp. Syst. 19(8), 2391–2406 (2018)

    Google Scholar 

  33. Zhu, Q., Basar, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35, 45–65 (2015)

    Google Scholar 

  34. Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831–2836 (2015)

    Google Scholar 

  35. Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S., et al.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-Physical Systems Security, vol. 5 (2009)

    Google Scholar 

  36. Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)

    Google Scholar 

  37. Cardenas, A.A., Amin, S., Sastry, S.: Secure control: Towards survivable cyber-physical systems. In: 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp. 495–500. IEEE (2008)

    Google Scholar 

  38. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)

    Google Scholar 

  39. Liu, Y.C., Bianchin, G., Pasqualetti, F.: Secure trajectory planning against undetectable spoofing attacks. Automatica 112, 108655 (2020)

    Google Scholar 

  40. Weerakkody, S., Liu, X., Son, S.H., Sinopoli, B.: A graph-theoretic characterization of perfect attackability for secure design of distributed control systems. IEEE Trans. Control of Netw. Syst. 4(1), 60–70 (2016)

    Google Scholar 

  41. Zhang, T., Zou, Y., Zhang, X., Guo, N., Wang, W.: Data-driven based cruise control of connected and automated vehicles under cyber-physical system framework. IEEE Trans. Intell. Trans. Syst. (2020)

    Google Scholar 

  42. Basiri, M.H., Pirani, M., Azad, N.L., Fischmeister, S.: Security of vehicle platooning: a game-theoretic approach. IEEE Access 7(1), 185565–185579 (2019)

    Google Scholar 

  43. Parkinson, S., Ward, P., Wilson, K., Miller, J.: Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans. Intell. Transp. Syst. 18(11), 2898–2915 (2017)

    Google Scholar 

  44. Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2014)

    Google Scholar 

  45. Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: Challenges and a solution framework. IEEE Int. Things J. 1(1), 10–21 (2014)

    Google Scholar 

  46. Biron, Z.A., Dey, S., Pisu, P.: Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Trans. Intell. Transp. Syst. 19(12), 3893–3902 (2018)

    Google Scholar 

  47. Lei, C., Van Eenennaam, E., Wolterink, W.K., Karagiannis, G., Heijenk, G., Ploeg, J.: Impact of packet loss on cacc string stability performance. In: 2011 11th International Conference on ITS Telecommunications, pp. 381–386. IEEE (2011)

    Google Scholar 

  48. Ploeg, J., Semsar-Kazerooni, E., Lijster, G., van de Wouw, N., Nijmeijer, H.: Graceful degradation of CACC performance subject to unreliable wireless communication. In: 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013), pp. 1210–1216. IEEE (2013)

    Google Scholar 

  49. Azees, M., Vijayakumar, P., Deborah, L.J.: Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell. Transp. Syst. 10(6), 379–388 (2016)

    Google Scholar 

  50. Dadras, S., Gerdes, R.M., Sharma, R.: Vehicular platooning in an adversarial environment. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 167–178. ACM (2015)

    Google Scholar 

  51. Öncü, S., Ploeg, J., Van de Wouw, N., Nijmeijer, H.: Cooperative adaptive cruise control: Network-aware analysis of string stability. IEEE Trans. Intell. Transp. Syst. 15(4), 1527–1537 (2014)

    Google Scholar 

  52. Qin, W.B., Orosz, G.: Experimental validation of string stability for connected vehicles subject to information delay. IEEE Trans. Control Syst. Technol. (2019)

    Google Scholar 

  53. Qin, W.B., Gomez, M.M., Orosz, G.: Stability analysis of connected cruise control with stochastic delays. In: American Control Conference, vol. 2014, pp. 4624–4629. IEEE (2014)

    Google Scholar 

  54. Laurendeau, C., Barbeau, M.: Threats to security in DSRC/WAVE. In: International Conference on Ad-Hoc Networks and Wireless, pp. 266–279. Springer (2006)

    Google Scholar 

  55. Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)

    Google Scholar 

  56. Harfouch, Y.A., Yuan, S., Baldi, S.: An adaptive switched control approach to heterogeneous platooning with intervehicle communication losses. IEEE Trans. Control of Netw. Syst. 5(3), 1434–1444 (2017)

    Google Scholar 

  57. Dolk, V.S., Ploeg, J., Heemels, W.M.H.: Event-triggered control for string-stable vehicle platooning. IEEE Trans. Intell. Transp. Syst. 18(12), 3486–3500 (2017)

    Google Scholar 

  58. Zheng, Y., Li, S.E., Li, K., Borrelli, F., Hedrick, J.K.: Distributed model predictive control for heterogeneous vehicle platoons under unidirectional topologies. IEEE Trans. Control Syst. Technol. 25(3), 899–910 (2017)

    Google Scholar 

  59. Yuan, Y., Zhu, Q., Sun, F., Wang, Q., Başar, T.: Resilient control of cyber-physical systems against denial-of-service attacks. In: 6th International Symposium on Resilient Control Systems (ISRCS), vol. 2013, pp. 54–59. IEEE (2013)

    Google Scholar 

  60. Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans. Autom. Control 60(11), 3023–3028 (2015)

    Google Scholar 

  61. Sun, Q., Zhang, K., Shi, Y.: Resilient model predictive control of cyber-physical systems under dos attacks. IEEE Trans. Ind. Inform. (2019)

    Google Scholar 

  62. Wan, E.A., Van Der Merwe, R.: The unscented kalman filter for nonlinear estimation. In: Proceedings of the IEEE 2000 Adaptive Systems for Signal Processing, Communications, and Control Symposium (Cat. No. 00EX373), pp. 153–158. IEEE (2000)

    Google Scholar 

  63. Simon, D.: Optimal State Estimation: Kalman, H Infinity, and Nonlinear Approaches. Wiley (2006)

    Google Scholar 

  64. Basiri, M.H., Azad, N.L., Fischmeister, S.: Attack resilient heterogeneous vehicle platooning using secure distributed nonlinear model predictive control. In: 2020 28th Mediterranean Conference on Control and Automation (MED), pp. 307–312. IEEE (2020)

    Google Scholar 

  65. Wang, J.Q., Li, S.E., Zheng, Y., Lu, X.Y.: Longitudinal collision mitigation via coordinated braking of multiple vehicles using model predictive control. Integr. Comput.-Aided Eng. 22(2), 171–185 (2015)

    Google Scholar 

  66. Zheng, Y.: DMPC for platoons (2019). https://github.com/zhengy09/DMPC_for_platoons

  67. Yao, Y., Rao, L., Liu, X., Zhou, X.: Delay analysis and study of IEEE 802.11-p based DSRC safety communication in a highway environment. In: Proceedings IEEE INFOCOM, vol. 2013, pp. 1591–1599. IEEE (2013)

    Google Scholar 

  68. Wang, Y., Duan, X., Tian, D., Lu, G., Yu, H.: Throughput and delay limits of 802.11-p and its influence on highway capacity. Procedia-Soc. Behav. Sci. 96, 2096–2104 (2013)

    Google Scholar 

  69. Ma, X., Chen, X., Refai, H.H.: Performance and reliability of DSRC vehicular safety communication: a formal analysis. EURASIP J. Wirel. Commun. Netw. 2009, 1–13 (2009)

    Google Scholar 

  70. Kukshya, V., Krishnan, H.: Experimental measurements and modeling for vehicle-to-vehicle dedicated short range communication (DSRC) wireless channels. In: IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2006)

    Google Scholar 

  71. Sabouni, R., Hafez, R.M.: Performance of DSRC for V2V communications in urban and highway environments. In: 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–5. IEEE (2012)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank Dr. Yang Zheng (SEAS and CGBC at Harvard University, Cambridge, MA, USA) for the fruitful discussions during this work. Also, the authors would like to thank the support from Natural Sciences and Engineering Research Council (NSERC) of Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Hossein Basiri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Basiri, M.H., Azad, N.L., Fischmeister, S. (2021). Secure Dynamic Nonlinear Heterogeneous Vehicle Platooning: Denial-of-Service Cyber-Attack Case. In: Awad, A.I., Furnell, S., Paprzycki, M., Sharma, S.K. (eds) Security in Cyber-Physical Systems. Studies in Systems, Decision and Control, vol 339. Springer, Cham. https://doi.org/10.1007/978-3-030-67361-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67361-1_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67360-4

  • Online ISBN: 978-3-030-67361-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics