Exploring Attack Resilience in Distributed Platoon Controllers with
Model Predictive Control
- URL: http://arxiv.org/abs/2401.04736v1
- Date: Mon, 8 Jan 2024 20:27:16 GMT
- Title: Exploring Attack Resilience in Distributed Platoon Controllers with
Model Predictive Control
- Authors: Tashfique Hasnine Choudhury
- Abstract summary: This thesis aims to improve the security of distributed vehicle platoon controllers by investigating attack scenarios and assessing their influence on system performance.
Attack techniques, including man-in-the-middle (MITM) and false data injection (FDI), are simulated using Model Predictive Control (MPC) controller.
Countermeasures are offered and tested, that includes attack analysis and reinforced communication protocols using Machine Learning techniques for detection.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The extensive use of distributed vehicle platoon controllers has resulted in
several benefits for transportation systems, such as increased traffic flow,
fuel efficiency, and decreased pollution. The rising reliance on interconnected
systems and communication networks, on the other hand, exposes these
controllers to potential cyber-attacks, which may compromise their safety and
functionality. This thesis aims to improve the security of distributed vehicle
platoon controllers by investigating attack scenarios and assessing their
influence on system performance. Various attack techniques, including
man-in-the-middle (MITM) and false data injection (FDI), are simulated using
Model Predictive Control (MPC) controller to identify vulnerabilities and
weaknesses of the platoon controller. Countermeasures are offered and tested,
that includes attack analysis and reinforced communication protocols using
Machine Learning techniques for detection. The findings emphasize the
significance of integrating security issues into their design and
implementation, which helps to construct safe and resilient distributed platoon
controllers.
Related papers
- Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS [2.632261166782093]
We propose the first framework of IDS that is robust against joint poisoning and evasion attacks.
We verify the robustness of our method on the IEEE-13 bus feeder model against a diverse set of poisoning and evasion attack scenarios.
arXiv Detail & Related papers (2024-05-05T16:24:30Z) - Optimal Controller Realizations against False Data Injections in Cooperative Driving [2.2134894590368748]
We study a controller-oriented approach to enhance the robustness of cooperative driving to cyberattacks.
By reformulating a given dynamic CACC scheme, we recognize that the base controller can be represented by a class of new but equivalent controllers.
We obtain the optimal combination of sensors that minimizes the effect of FDI attacks.
arXiv Detail & Related papers (2024-04-08T09:53:42Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Convergence of Communications, Control, and Machine Learning for Secure
and Autonomous Vehicle Navigation [78.60496411542549]
Connected and autonomous vehicles (CAVs) can reduce human errors in traffic accidents, increase road efficiency, and execute various tasks. Reaping these benefits requires CAVs to autonomously navigate to target destinations.
This article proposes solutions using the convergence of communication theory, control theory, and machine learning to enable effective and secure CAV navigation.
arXiv Detail & Related papers (2023-07-05T21:38:36Z) - Resilient Output Containment Control of Heterogeneous Multiagent Systems
Against Composite Attacks: A Digital Twin Approach [24.587040108605937]
This paper studies the distributed resilient output containment control of heterogeneous multiagent systems against composite attacks.
Inspired by digital twins, a twin layer with higher security and privacy is used to decouple the problem into two tasks.
arXiv Detail & Related papers (2023-03-22T16:41:05Z) - In-Distribution Barrier Functions: Self-Supervised Policy Filters that
Avoid Out-of-Distribution States [84.24300005271185]
We propose a control filter that wraps any reference policy and effectively encourages the system to stay in-distribution with respect to offline-collected safe demonstrations.
Our method is effective for two different visuomotor control tasks in simulation environments, including both top-down and egocentric view settings.
arXiv Detail & Related papers (2023-01-27T22:28:19Z) - Context-Aware Target Classification with Hybrid Gaussian Process
prediction for Cooperative Vehicle Safety systems [2.862606936691229]
Vehicle-to-Everything (V2X) communication has been proposed as a potential solution to improve the robustness and safety of autonomous vehicles.
Cooperative Vehicle Safety (CVS) applications are tightly dependent on the reliability of the underneath data system.
We propose a Context-Aware Target Classification (CA-TC) module and a hybrid learning-based predictive modeling technique for CVS systems.
arXiv Detail & Related papers (2022-12-24T22:03:08Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - Recursively Feasible Probabilistic Safe Online Learning with Control
Barrier Functions [63.18590014127461]
This paper introduces a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We study the feasibility of the resulting robust safety-critical controller.
We then use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Deep Reinforcement Learning Aided Platoon Control Relying on V2X
Information [78.18186960475974]
The impact of Vehicle-to-Everything (V2X) communications on platoon control performance is investigated.
Our objective is to find the specific set of information that should be shared among the vehicles for the construction of the most appropriate state space.
More meritorious information is given higher priority in transmission, since including it in the state space has a higher probability in offsetting the negative effect of having higher state dimensions.
arXiv Detail & Related papers (2022-03-28T02:11:54Z) - An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems [0.0]
Increased dependence on software based control has escalated the vulnerabilities of Cyber Physical Systems.
We propose a Reinforcement Learning (RL) based framework which adaptively sets the parameters of such detectors based on experience learned from attack scenarios.
arXiv Detail & Related papers (2021-03-04T07:38:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.