Deception Attack Detection and Resilient Control in Platoon of Smart Vehicles

Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the...

Full description

Saved in:
Bibliographic Details
Published in2022 30th International Conference on Electrical Engineering (ICEE) pp. 29 - 35
Main Authors Mokari, Hassan, Firouzmand, Elnaz, Sharifi, Iman, Doustmohammadi, Ali
Format Conference Proceeding
LanguageEnglish
Published IEEE 17.05.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the platoon. The attacked agents might deviate from the specified route in the group. Furthermore, due to the cooperation between agents, the effect of attack can snowball into other agents and destabilize the whole system. In this paper, a resilient vehicular control strategy is proposed against deception attack to retrieve the attacked agent to rejoin the platoon. Moreover, the detection of a vehicle under deception attack will be done by incorporating a high-gain observer. At the end, the case study demonstrates the capability of the proposed procedure.
AbstractList Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including deception attacks can inject false data into the information sent through the local feedback links of vehicles in the platoon. The attacked agents might deviate from the specified route in the group. Furthermore, due to the cooperation between agents, the effect of attack can snowball into other agents and destabilize the whole system. In this paper, a resilient vehicular control strategy is proposed against deception attack to retrieve the attacked agent to rejoin the platoon. Moreover, the detection of a vehicle under deception attack will be done by incorporating a high-gain observer. At the end, the case study demonstrates the capability of the proposed procedure.
Author Mokari, Hassan
Doustmohammadi, Ali
Firouzmand, Elnaz
Sharifi, Iman
Author_xml – sequence: 1
  givenname: Hassan
  surname: Mokari
  fullname: Mokari, Hassan
  email: h.mokari95@aut.ac.ir
  organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran
– sequence: 2
  givenname: Elnaz
  surname: Firouzmand
  fullname: Firouzmand, Elnaz
  email: efsh@aut.ac.ir
  organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran
– sequence: 3
  givenname: Iman
  surname: Sharifi
  fullname: Sharifi, Iman
  email: imansharifi@aut.ac.ir
  organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran
– sequence: 4
  givenname: Ali
  surname: Doustmohammadi
  fullname: Doustmohammadi, Ali
  email: dad@aut.ac.ir
  organization: Amirkabir University of Technology (Tehran Polytechnic),Department of Electrical Engineering,Tehran,Iran
BookMark eNotj8tKAzEYhaMoWOs8gSB5gRlzvyzLtNVCRdHitqSZPxgdkzKTjW_voF0dOHx8nHONLlJOgNAdJQ2lxN5v2tVKSiVUwwhjjTVMc63OUGW1oUpJYYjR9BzNmBKstpLpK1SN4ychhFNjjJUz9LQED8cSc8KLUpz_wkso4P8Klzr8CmPsI6SC25zKkHscE37pXckTkAN--3ZDwe_wEX0P4w26DK4foTrlHO3Wq137WG-fHzbtYltHYXQN3nvpHReBCxcYN1oAlVwL6Q-HAJZrZ8UEOgq-E5R1MhDNIASnFQmd4XN0-6-NALA_DnEa8bM__ee_1P5Rsw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICEE55646.2022.9827376
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781665480871
1665480874
EISSN 2642-9527
EndPage 35
ExternalDocumentID 9827376
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
AAJGR
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
CBEJK
CHZPO
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i487-eccc5ca34f34af23874e153745cbbfe937a94487a1ecd412d5f072effa760fd83
IEDL.DBID RIE
IngestDate Wed Jun 26 19:25:01 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i487-eccc5ca34f34af23874e153745cbbfe937a94487a1ecd412d5f072effa760fd83
PageCount 7
ParticipantIDs ieee_primary_9827376
PublicationCentury 2000
PublicationDate 2022-May-17
PublicationDateYYYYMMDD 2022-05-17
PublicationDate_xml – month: 05
  year: 2022
  text: 2022-May-17
  day: 17
PublicationDecade 2020
PublicationTitle 2022 30th International Conference on Electrical Engineering (ICEE)
PublicationTitleAbbrev ICEE
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003188895
Score 1.8472897
Snippet Platooning of smart vehicles would be an important application of multi-agent systems. Each member of a multi-agent system is vulnerable to malicious attacks....
SourceID ieee
SourceType Publisher
StartPage 29
SubjectTerms Control systems
Cyber Physical Systems (CPS)
Cyberattack
Deception attack
Electric potential
Electrical engineering
Leader-follower
Multi-agent systems (MASs)
Noise measurement
Observers
Resilient controllers
Switched systems
Switching systems
Title Deception Attack Detection and Resilient Control in Platoon of Smart Vehicles
URI https://ieeexplore.ieee.org/document/9827376
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELXanuDC0iJ2-cCRpEnqxPERdVFBKqqgoN4qL2NRtaQI0gtfzzgJZREHblEUO5HHyptnvzcm5EIIZpBVKI87hStjGjzV0YGXCs0xYQCTFERxdJsMH9jNNJ7WyOXGCwMAhfgMfHdZ7OWblV67pbK2SBFseVIndey59Gpt1lNwbqapiCsTcBiI9nW334_jhDkhQhT5VeMfp6gUIDLYIaPP15fakYW_zpWv339VZvzv9-2S1pddj443QLRHapDtk-1vlQabZNSDSr9Cr_Jc6gXtQV6osDIqM0Pv4G2-dNZI2i2163Se0fESGTk-sLL0_hmnGH2Ep0JF1yKTQX_SHXrVSQreHAmJh2HSsZYdZjtMWgRpzgD_dJzFWikLmKFIgTSNyxC0YWFkYhvwCKyVPAmsSTsHpJGtMjgkFPMzbZVyCk7OjJHKmthoJSLsXYoIjkjTjcvspayVMauG5Pjv2ydky8XG7caH_JQ08tc1nCHI5-q8iO4HBCWnsQ
link.rule.ids 310,311,783,787,792,793,799,27939,55090
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELVKOQAXlhax4wNHUtLUieMj6qIW2qqCgnqrvIxF1ZIiSC98PeM0lEUcuEVWYlkeK2-e_d6YkAshmEFWoTzuFK6MafBUTfteLDTHhAFMlBHFXj9qP7CbUTgqkMuVFwYAMvEZVNxjdpZv5nrhtsquRIxgy6M1so55tfCXbq3VjgquzjgWYW4DrvriqlNvNsMwYk6KEASV_PMf96hkMNLaJr3PASzVI9PKIlUV_f6rNuN_R7hDyl-GPTpYQdEuKUCyR7a-1RoskV4DcgULvU5Tqae0AWmmw0qoTAy9g7fJzJkjaX2pXqeThA5myMnxhbml98-4yOgjPGU6ujIZtprDetvL71LwJkhJPAyUDrWsMVtj0iJMcwb4r-Ms1EpZwBxFCiRqXFZBG1YNTGh9HoC1kke-NXFtnxSTeQIHhGKGpq1STsPJmTFSWRMarUSAvUsRwCEpuXkZvyyrZYzzKTn6u_mcbLSHve642-nfHpNNFyd3Nl_lJ6SYvi7gFCE_VWdZpD8A7LSq9w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2022+30th+International+Conference+on+Electrical+Engineering+%28ICEE%29&rft.atitle=Deception+Attack+Detection+and+Resilient+Control+in+Platoon+of+Smart+Vehicles&rft.au=Mokari%2C+Hassan&rft.au=Firouzmand%2C+Elnaz&rft.au=Sharifi%2C+Iman&rft.au=Doustmohammadi%2C+Ali&rft.date=2022-05-17&rft.pub=IEEE&rft.eissn=2642-9527&rft.spage=29&rft.epage=35&rft_id=info:doi/10.1109%2FICEE55646.2022.9827376&rft.externalDocID=9827376