Return to search

Analysis of False Data Injection in Vehicle Platooning

Automated vehicles promise to be one of the most constructive inventions of late as they promote road safety, fuel efficiency, and reduced time road travel, by decreasing traffic congestion and workload on the driver. In a platoon (which is a method of grouping vehicles, which helps increase the capacity of roads by managing the distance between vehicles by using electrical and mechanical coupling) of such automated vehicles, as in automated highway systems (AHS), tracking of inter-vehicular spacing is one of the significant factors to be considered. Because of the close spacing, computer-controlled platoons with inter-vehicular communication, which is the concept of adaptive cruise control (ACC), become open to cyber security attacks.
Cyber physical and cyber attacks on smart grid systems in the electricity market have been a focus of researchers, and much work has been done on that front. However, cyber physical (CP) attacks on autonomous vehicle platoons have not been examined. Thus this research entails the survey of a number of vehicle models used in different works pertaining to longitudinal vehicle motion and analysis of a special class of cyber physical attacks called false data injection (FDI) attacks on vehicle platoons moving with longitudinal motion. In this kind of attack, an attacker can exploit the configuration of any cyber physical system to launch such attacks to successfully introduce arbitrary errors into certain state variables so as to gain control over the system. So here, an n-vehicle platoon is considered and a linearized vehicle model is used as a testbed to study vehicle dynamics and control, after false information is fed into the system.

Identiferoai:union.ndltd.org:UTAHS/oai:digitalcommons.usu.edu:etd-5047
Date01 May 2014
CreatorsBiswas, Bidisha
PublisherDigitalCommons@USU
Source SetsUtah State University
Detected LanguageEnglish
Typetext
Formatapplication/pdf
SourceAll Graduate Theses and Dissertations
RightsCopyright for this work is held by the author. Transmission or reproduction of materials protected by copyright beyond that allowed by fair use requires the written permission of the copyright owners. Works not in the public domain cannot be commercially exploited without permission of the copyright owner. Responsibility for any use rests exclusively with the user. For more information contact Andrew Wesolek (andrew.wesolek@usu.edu).

Page generated in 0.002 seconds