Deception Attack Detection and Resilient Control in Platoon of Smart Vehicles
Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the...
Saved in:
Published in | 2022 30th International Conference on Electrical Engineering (ICEE) pp. 29 - 35 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
17.05.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the platoon. The attacked agents might deviate from the specified route in the group. Furthermore, due to the cooperation between agents, the effect of attack can snowball into other agents and destabilize the whole system. In this paper, a resilient vehicular control strategy is proposed against deception attack to retrieve the attacked agent to rejoin the platoon. Moreover, the detection of a vehicle under deception attack will be done by incorporating a high-gain observer. At the end, the case study demonstrates the capability of the proposed procedure. |
---|---|
AbstractList | Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the platoon. The attacked agents might deviate from the specified route in the group. Furthermore, due to the cooperation between agents, the effect of attack can snowball into other agents and destabilize the whole system. In this paper, a resilient vehicular control strategy is proposed against deception attack to retrieve the attacked agent to rejoin the platoon. Moreover, the detection of a vehicle under deception attack will be done by incorporating a high-gain observer. At the end, the case study demonstrates the capability of the proposed procedure. |
Author | Mokari, Hassan Doustmohammadi, Ali Firouzmand, Elnaz Sharifi, Iman |
Author_xml | – sequence: 1 givenname: Hassan surname: Mokari fullname: Mokari, Hassan email: h.mokari95@aut.ac.ir organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran – sequence: 2 givenname: Elnaz surname: Firouzmand fullname: Firouzmand, Elnaz email: efsh@aut.ac.ir organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran – sequence: 3 givenname: Iman surname: Sharifi fullname: Sharifi, Iman email: imansharifi@aut.ac.ir organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran – sequence: 4 givenname: Ali surname: Doustmohammadi fullname: Doustmohammadi, Ali email: dad@aut.ac.ir organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran |
BookMark | eNotj8tKAzEYhaMoWOs8gSB5gRlzvyzLtNVCRdHitqSZPxgdkzKTjW_voF0dOHx8nHONLlJOgNAdJQ2lxN5v2tVKSiVUwwhjjTVMc63OUGW1oUpJYYjR9BzNmBKstpLpK1SN4ychhFNjjJUz9LQED8cSc8KLUpz_wkso4P8Klzr8CmPsI6SC25zKkHscE37pXckTkAN--3ZDwe_wEX0P4w26DK4foTrlHO3Wq137WG-fHzbtYltHYXQN3nvpHReBCxcYN1oAlVwL6Q-HAJZrZ8UEOgq-E5R1MhDNIASnFQmd4XN0-6-NALA_DnEa8bM__ee_1P5Rsw |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICEE55646.2022.9827376 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9781665480871 1665480874 |
EISSN | 2642-9527 |
EndPage | 35 |
ExternalDocumentID | 9827376 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL AAJGR ADZIZ ALMA_UNASSIGNED_HOLDINGS CBEJK CHZPO IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i487-eccc5ca34f34af23874e153745cbbfe937a94487a1ecd412d5f072effa760fd83 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:25:01 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i487-eccc5ca34f34af23874e153745cbbfe937a94487a1ecd412d5f072effa760fd83 |
PageCount | 7 |
ParticipantIDs | ieee_primary_9827376 |
PublicationCentury | 2000 |
PublicationDate | 2022-May-17 |
PublicationDateYYYYMMDD | 2022-05-17 |
PublicationDate_xml | – month: 05 year: 2022 text: 2022-May-17 day: 17 |
PublicationDecade | 2020 |
PublicationTitle | 2022 30th International Conference on Electrical Engineering (ICEE) |
PublicationTitleAbbrev | ICEE |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003188895 |
Score | 1.8472897 |
Snippet | Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks.... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 29 |
SubjectTerms | Control systems Cyber Physical Systems (CPS) Cyberattack Deception attack Electric potential Electrical engineering Leader-follower Multi-agent systems (MASs) Noise measurement Observers Resilient controllers Switched systems Switching systems |
Title | Deception Attack Detection and Resilient Control in Platoon of Smart Vehicles |
URI | https://ieeexplore.ieee.org/document/9827376 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELXanuDC0iJ2-cCRpEnqxPERdVFBKqqgoN4qL2NRtaQI0gtfzzgJZREHblEUO5HHyptnvzcm5EIIZpBVKI87hStjGjzV0YGXCs0xYQCTFERxdJsMH9jNNJ7WyOXGCwMAhfgMfHdZ7OWblV67pbK2SBFseVIndey59Gpt1lNwbqapiCsTcBiI9nW334_jhDkhQhT5VeMfp6gUIDLYIaPP15fakYW_zpWv339VZvzv9-2S1pddj443QLRHapDtk-1vlQabZNSDSr9Cr_Jc6gXtQV6osDIqM0Pv4G2-dNZI2i2163Se0fESGTk-sLL0_hmnGH2Ep0JF1yKTQX_SHXrVSQreHAmJh2HSsZYdZjtMWgRpzgD_dJzFWikLmKFIgTSNyxC0YWFkYhvwCKyVPAmsSTsHpJGtMjgkFPMzbZVyCk7OjJHKmthoJSLsXYoIjkjTjcvspayVMauG5Pjv2ydky8XG7caH_JQ08tc1nCHI5-q8iO4HBCWnsQ |
link.rule.ids | 310,311,783,787,792,793,799,27939,55090 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELVKOQAXlhax4wNHUtLUieMj6qIW2qqCgnqrvIxF1ZIiSC98PeM0lEUcuEVWYlkeK2-e_d6YkAshmEFWoTzuFK6MafBUTfteLDTHhAFMlBHFXj9qP7CbUTgqkMuVFwYAMvEZVNxjdpZv5nrhtsquRIxgy6M1so55tfCXbq3VjgquzjgWYW4DrvriqlNvNsMwYk6KEASV_PMf96hkMNLaJr3PASzVI9PKIlUV_f6rNuN_R7hDyl-GPTpYQdEuKUCyR7a-1RoskV4DcgULvU5Tqae0AWmmw0qoTAy9g7fJzJkjaX2pXqeThA5myMnxhbml98-4yOgjPGU6ujIZtprDetvL71LwJkhJPAyUDrWsMVtj0iJMcwb4r-Ms1EpZwBxFCiRqXFZBG1YNTGh9HoC1kke-NXFtnxSTeQIHhGKGpq1STsPJmTFSWRMarUSAvUsRwCEpuXkZvyyrZYzzKTn6u_mcbLSHve642-nfHpNNFyd3Nl_lJ6SYvi7gFCE_VWdZpD8A7LSq9w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+30th+International+Conference+on+Electrical+Engineering+%28ICEE%29&rft.atitle=Deception+Attack+Detection+and+Resilient+Control+in+Platoon+of+Smart+Vehicles&rft.au=Mokari%2C+Hassan&rft.au=Firouzmand%2C+Elnaz&rft.au=Sharifi%2C+Iman&rft.au=Doustmohammadi%2C+Ali&rft.date=2022-05-17&rft.pub=IEEE&rft.eissn=2642-9527&rft.spage=29&rft.epage=35&rft_id=info:doi/10.1109%2FICEE55646.2022.9827376&rft.externalDocID=9827376 |