Resilient path‐following control of autonomous vehicles subject to intermittent denial‐of‐service attacks

An autonomous vehicle (AV) is a cyber‐physical system (CPS) incorporating dynamics, perception sensors (e.g. camera and radar), embedded electronic control units (ECUs) and in‐vehicle networking (e.g. CAN, LIN and FlexRay).Achieving path‐following control of an AV to track a desired path is therefor...

Full description

Saved in:
Bibliographic Details
Published inIET intelligent transport systems Vol. 15; no. 12; pp. 1508 - 1521
Main Authors Wang, Yulei, Bian, Ning, Zhang, Lin, Huang, Yanjun, Chen, Hong
Format Journal Article
LanguageEnglish
Published Wiley 01.12.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An autonomous vehicle (AV) is a cyber‐physical system (CPS) incorporating dynamics, perception sensors (e.g. camera and radar), embedded electronic control units (ECUs) and in‐vehicle networking (e.g. CAN, LIN and FlexRay).Achieving path‐following control of an AV to track a desired path is therefore a highly non‐linear task that is naturally vulnerable to denial‐of‐service (DoS) attacks. Considering that DoS attacks can inhibit the services of a control system by overwhelming the performance capabilities of the ECUs or the bus, this paper investigates the cyber‐physical system problem of path‐following control for AVs under intermittent DoS attacks. To solve this problem, we propose resilient observer‐based non‐linear control based on the triple‐step approach. The core ideas behind this method are the integrated design of the observer and feedback gains incorporating the DoS duration and the convex design of controller parameters by solving a set of linear matrix inequalities. The proposed control scheme guarantees that the closed‐loop system maintains input‐to‐stable stability, while the error signals theoretically converge to a small neighbourhood of the origin. The effectiveness of the proposed approach is confirmed by the simulation results obtained for a high‐fidelity veDYNA full‐vehicle model with different driving tests and DoS attacks.
ISSN:1751-956X
1751-9578
DOI:10.1049/itr2.12114