Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security 2017
DOI: 10.1145/3055186.3055193
|View full text |Cite
|
Sign up to set email alerts
|

A Functional Co-Design towards Safe and Secure Vehicle Platooning

Abstract: Cooperative adaptive cruise control (CACC) or platooning recently becomes promising as vehicles can learn of nearby vehicles' intentions and dynamics through wireless vehicle to vehicle (V2V) communication and advanced on-board sensing technologies. The complexity of automated vehicle platoon system opens doors to various malicious cyber attacks. Violation of cybersecurity often results in serious safety issues as been demonstrated in recent studies. However, safety and security in a vehicle platoon so far hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(29 citation statements)
references
References 20 publications
(25 reference statements)
0
29
0
Order By: Relevance
“…A dangerous circumstance can occur. For example, crashing accidents from the rear end can occur if, for instance, recent studies [140], [141] prove that in a CACC setting, feeding false data to a wireless conduit can cause a malevolent car to increase or reduce the speed of other vehicles incorrectly.…”
Section: ) Attack On Warning Messagesmentioning
confidence: 99%
“…A dangerous circumstance can occur. For example, crashing accidents from the rear end can occur if, for instance, recent studies [140], [141] prove that in a CACC setting, feeding false data to a wireless conduit can cause a malevolent car to increase or reduce the speed of other vehicles incorrectly.…”
Section: ) Attack On Warning Messagesmentioning
confidence: 99%
“…There are many kinds of cyber-attack such as denial of service (DoS), interference attack, false data injection attack and so on [21][22][23]. In this section we consider the false data injection attack.…”
Section: False Data Injection Attack Modelsmentioning
confidence: 99%
“…We can obtain the estimation Ê by computing Equation (24). Clearly, this approximation greatly reduces the computing burden of solving the estimation of the attack vector E. Moreover, substituting Ê into (21) and simplifying the equation, we derive the initial state x(0) by:…”
Section: Secure State Estimationmentioning
confidence: 99%
See 2 more Smart Citations