2020
DOI: 10.1109/access.2020.3019274
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Control Design of the Third-Order Discrete-Time Connected Vehicle Systems Against Cyber-Attacks

Abstract: This paper investigates the consensus problems of the third-order discrete-time Connected Vehicle Systems (CVSs) under cyber-attacks. First, the necessary and sufficient conditions for consensus of third-order discrete-time CVSs are derived in the absence of attacks by using algebraic graph and matrix theory. Then the interaction network framework between the original CVSs in the vehicle platoon layer and a virtual system in the hidden layer is established to resist cyber-attacks. Since sufficiently large atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 49 publications
0
2
0
Order By: Relevance
“…Even though self-driving cars will be integrated with complex and effective security mechanisms before hitting the road, they can still be under cyber-attack while operating as the attackers will also explore more complex attacking tools. Considering that, a new wave of research works is emerging, emphasizing on the resilient operation of self-driving cars under cyber-attacks [24]- [32].…”
Section: Ecumentioning
confidence: 99%
See 1 more Smart Citation
“…Even though self-driving cars will be integrated with complex and effective security mechanisms before hitting the road, they can still be under cyber-attack while operating as the attackers will also explore more complex attacking tools. Considering that, a new wave of research works is emerging, emphasizing on the resilient operation of self-driving cars under cyber-attacks [24]- [32].…”
Section: Ecumentioning
confidence: 99%
“…Current research trends are shifting towards achieving this goal of safe operation under cyber-attacks [24], [25] [26]. Vehicle platooning is a great example of such research focus, where the platoon vehicles can detect a malicious member and take decisions without any input from the node under attack [27], [28] [29], [30] [31], [32]. It is important to model the attack parameters or signals, i.e., replay attack, spoofing attack and false data injection attack, within the vehicle operation model so that the attack signals can be isolated and filtered out before using it for decision making.…”
Section: Future Research Challengesmentioning
confidence: 99%