Hassan Mokari, Elnaz Firouzmand, Iman Sharifi, Ali Doustmohammadi
{"title":"Resilient and robust control strategy against deception attacks in the platoon of vehicles","authors":"Hassan Mokari, Elnaz Firouzmand, Iman Sharifi, Ali Doustmohammadi","doi":"10.1049/cth2.12757","DOIUrl":null,"url":null,"abstract":"<p>A platoon must ensure the security of conducting missions due to the susceptibility of the vehicles to cyber-attacks. The deception attack is a common type of cyber-attack that might be introduced during data exchange through communication channels. Therefore, it can divert each vehicle by injecting uncertainty into the communication link between the agents in the cyber domain. This paper employs a leader–follower consensus system as a reference model to control the platoon vehicles. Accordingly, each agent in the reference model sends its information as a reference trajectory to its corresponding vehicle within the platoon. The vehicles are equipped with a robust local controller, enabling them to follow their desired trajectory in the presence of external disturbances. Furthermore, each vehicle employs an unknown input observer to detect a deception attack while decoupling it from external disturbances. Moreover, by introducing a switching strategy based on mode-dependent average dwell time to the leader–follower consensus system, a novel resilient control strategy against the deception attack is implemented in the cyber domain. The resultant resilient leader–follower consensus system in the platoon retrieves and restores the attacked vehicle in the platoon to its associated states. The applicability of the proposed method is shown via simulation.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"18 18","pages":"2830-2840"},"PeriodicalIF":2.2000,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12757","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12757","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
A platoon must ensure the security of conducting missions due to the susceptibility of the vehicles to cyber-attacks. The deception attack is a common type of cyber-attack that might be introduced during data exchange through communication channels. Therefore, it can divert each vehicle by injecting uncertainty into the communication link between the agents in the cyber domain. This paper employs a leader–follower consensus system as a reference model to control the platoon vehicles. Accordingly, each agent in the reference model sends its information as a reference trajectory to its corresponding vehicle within the platoon. The vehicles are equipped with a robust local controller, enabling them to follow their desired trajectory in the presence of external disturbances. Furthermore, each vehicle employs an unknown input observer to detect a deception attack while decoupling it from external disturbances. Moreover, by introducing a switching strategy based on mode-dependent average dwell time to the leader–follower consensus system, a novel resilient control strategy against the deception attack is implemented in the cyber domain. The resultant resilient leader–follower consensus system in the platoon retrieves and restores the attacked vehicle in the platoon to its associated states. The applicability of the proposed method is shown via simulation.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.