Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 37 tok/s
Gemini 2.5 Pro 44 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 14 tok/s Pro
GPT-4o 90 tok/s Pro
Kimi K2 179 tok/s Pro
GPT OSS 120B 462 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

A Cyberattack Detection-Isolation Scheme For CAV Under Changing Driving Environment (2305.11328v2)

Published 18 May 2023 in eess.SY and cs.SY

Abstract: Under a changing driving environment, a Connected Autonomous Vehicle (CAV) platoon relies strongly on the acquisition of accurate traffic information from neighboring vehicles as well as reliable commands from a centralized supervisory controller through the communication network. Even though such modalities are imperative to ensure the safe and efficient driving performance of CAVs, they led to multiple security challenges. Thus, a cyberattack on this network can corrupt vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, which can lead to unsafe or undesired driving scenarios. Hence, in this paper, we propose a cyberattack detection-isolation algorithm comprised of a unified V2V and V2I cyberattack detection scheme along with a V2I isolation scheme for CAVs under changing driving conditions. The proposed algorithm is constructed using a bank of residual generators with Lyapunov function-based performance guarantees, such as disturbance-to-state stability, robustness, and sensitivity. Finally, we showcase the efficacy of our proposed algorithm through extensive Monte-Carlo simulations using real-world highway and urban driving data. The results show that the proposed algorithm can enhance the cybersecurity of CAVs by detecting cyberattacks on CAV platoons and isolating infrastructure-level traffic manipulation.

Citations (1)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.