Adaptive resilient observer-based control of leader-following smart vehicle platoons subject to compound cyber attacks
In a smart vehicle platoon (SVP), by means of wireless technologies, each smart vehicle (SV) can exchange data and cooperate with other SVs to enhance safety, stability and efficiency of the traffic flow. Besides this, we know that steering and braking mechanisms are the last components of an SV con...
Saved in:
Published in | International journal of dynamics and control Vol. 13; no. 1 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.01.2025
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In a smart vehicle platoon (SVP), by means of wireless technologies, each smart vehicle (SV) can exchange data and cooperate with other SVs to enhance safety, stability and efficiency of the traffic flow. Besides this, we know that steering and braking mechanisms are the last components of an SV control system, which have a significant role in guaranteeing the security of SVPs. However, these and other actuators of an SV cannot provide security guarantees versus hostile attacks. In an SVP, both actuators and communication links may be easily exposed to malicious attacks. In this work, we investigate the resilient consensus protocol of third-order SVPs subjected to both replay and actuator attacks. Replay attack will cause time delay in transferred data, and the actuator attack will inject faulty commands on control input. The replay attacks can be modeled as delayed data. Therefore, the closed-loop dynamics will be as a linear multiple-time delay system. The designed control law has two main parts: a nonlinear compensator which confronts the unknown bounded actuator attacks and a linear distributed observer which estimates the states of the leader. By presenting a Lyapunov–Krasovskii function and employing the Lyapunov theory, we will show that the estimation errors of leader states will vanish as well as the tracking error of each SV. Some simulation scenarios are given to depict the efficiency of that methodology. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 2195-268X 2195-2698 |
DOI: | 10.1007/s40435-024-01552-y |