Conference PaperPDF Available

String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks

Authors:

Figures

Content may be subject to copyright.
String Stability Analysis of Cooperative Adaptive
Cruise Control Under Jamming Attacks
Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhangand Kai Zeng
Electrical and Computer Engineering Department,
Computer Science Department
George Mason University, Fairfax, Virginia 22030
Email: {aalipour, mdabaghc, hzhang18, kzeng2}@gmu.edu
Abstract—Cooperative Adaptive Cruise Control (CACC) is
considered as a key enabling technology to automatically reg-
ulate the inter-vehicle distances in a vehicle platooning while
maintaining the string stability. Although the cyber and physical
parts in the existing CACC systems are integrated in one control
framework, the research on realistic modeling and security issues
of these systems are still largely open. A good modeling of
cyber characteristics and awareness of cyber attacks impact
on the CACC operation leads to a better understanding of
system design and defense mechanisms. In this paper, we conduct
a comprehensive analysis on the vehicle string stability by
considering a realistic wireless channel under a mobile reactive
jamming attack. We examine the stability of the platoon under
attacks by conducting extensive simulations for a wide range
of realworld lead vehicle’s acceleration profiles. We utilize time-
domain definition of string stability to delineate the impact of
the jamming attacks on the CACC system’s functionality and
string stability. We also examine the attacker’s possible locations
at which it can destabilize the string.
I. INTRODUCTION
Vehicular Cyber-physical systems (CPS) expand the capa-
bilities of the vehicles through the integration of computation,
communication, and control [1]. Vehicle platooning is one of
the important vehicular CPS applications that operates based
on tight coupling of wireless communication and physical pro-
cesses. Cooperative Adaptive Cruise Control (CACC) system
as an extension of Adaptive Cruise Control (ACC) is proposed
to constitute vehicle platooning formation [2], [3].
Based on CACC, each vehicle in the platoon uses two
sources of information, absolute relative distance measured by
the radar and acceleration information of the preceding vehicle
received through the wireless channel established apriori.
Connected vehicles equipped with CACC systems are able
to adjust inter-vehicle distances such that the traffic throughput
is increased by running as close as possible to each other
with safety guarantee. In addition, this technology reduces
fuel consumption and provides more comfort to the users in
comparison to solely human control of vehicles [4].
However, despite tremendous benefits attained by integrat-
ing the cyber (wireless communication) and physical processes
in the CACC systems, there are several critical challenges
remained.
First, considering tight coupling of cyber and control parts,
the practical modeling of these parts play an important role to
evaluate the performance of CACC system before a real imple-
mentation. Second, the CACC systems are highly susceptible
to cyber attacks that can create significant disturbances in safe
and efficient operation of these systems [5].
In a CACC enabled vehicle platoon, the distance between
vehicles may change depending on the lead vehicle’s behavior
and spacing policy [6]. This variation in inter-vehicle distance
affects the wireless channel conditions which further affects
the received-signal-strength (RSS) and packet delivery ratio.
However, in most of the existing literature, this coupling
between the system state (inter-vehicle distance) and wireless
channel conditions is ignored [2], [3], [7], [8].
In this paper, we consider a two-ray ground-reflection model
(Line-of Sight and ground-reflected propagation) between the
transmitters and the receivers and study the path loss impact
on the CACC system’s functionality [9], [10]. Furthermore,
with the assumption of two-ray ground-reflection model for
the wireless channel, we study the string stability of the CACC
system under a mobile reactive jamming attack. The attacker
jams the wireless channel established among the vehicles in
order to prevent the receivers from decoding the transmitted
packet with the purpose of destabilizing the platoon. If the
attacker is successful to jam the packet, the CACC system
will not work on the normal status until the next packet is
received successfully. We evaluate the jamming attack impact
on the string stability by employing the time-domain definition
of string stability.
We compare the string stability of two basic cases: CACC
with memory and memoryless. In the case with memory,
the follower vehicle remembers the last successfully received
acceleration information from the immediate preceding vehicle
and feeds it to the feed-forward controller. In the memoryless
case, whenever the acceleration information is lost due to
jamming or channel fading, the following vehicle just assumes
it is zero (the preceding vehicle maintains the same velocity).
Finally, by employing string stability criteria, we aim to find
the best locations for the attacker to launch jamming attacks.
Along the string, we examine the possible attacking locations
at which the attacker can destabilize the platoon.
We summarize the contributions of this paper as follows:
We study the path loss and ground-reflected signal effects
on the CACC performance by modeling the wireless
channel as a two-ray ground-reflected propagation.
We consider a mobile reactive jamming attack on the
wireless channels and investigate the impact of jamming
attack on the CACC functionality for the two cases of
CACC with and without memory.
We examine the attacker’s possible locations along the
string at which it can destabilize the string.
We conduct extensive simulations to analyze the string
stability by utilizing its time-domain definition.
Our simulation results show that the CACC based platoon
system is highly sensitive to jamming attacks and its perfor-
mance can be compromised by a reactive jammer. In addition,
we identify that the location being close to the second vehicle
following the lead vehicle is the best location for the mobile
jamming attacker to destabilize the platoon.
II. RE LATE D WOR K
Existing works [2], [3], [11] consider normal operation of
CACC system without any possibility of the packet loss due to
wireless channel condition or outsider attacker. Therefore, the
frequency response of the system is derivable in these cases
and the string stability can be analyzed in a fairly nice format
in the frequency-domain. Necessary and sufficient conditions
for string stability of a heterogeneous platoon are studied
by Naus et al. [2]. Network delay and sampling effects are
introduced in the string stability analysis in [3]. The delay is
assumed identical in all the communication links and string
stability is investigated based on different sampling interval
and headway-time. In [7], the robustness of a CACC system
to communication delays is studied and an upper bound on
the delay is derived such that the string maintains its stability.
However, the impact of distance variation between vehicles on
the channel conditions is not considered in the aforementioned
works.
There are few works focusing on the security of vehicle
platooning in terms of attacking on wireless communication
or control components. In [12], an insider attacker attacks on
controller gains of a vehicle in the platoon. The attacker has the
capability of modifying the gains such that it can destabilize
the platoon. In [13], mass-spring-damper follower dynamics
model is considered for studying the platoon performance
under attack. The new class of the attack proposed in this
paper is based on vehicle misbehavior. This work shows that
the attacker is effective when the attacker is near the rear of
the platoon. However, this work is different from our work in
terms of platoon modeling, attacker’s nature, the purpose of
the attacker and the evaluation method employed to measure
the impact of the attack. In another work [5], various security
vulnerabilities on the CACC system have been identified.
Message falsification and radio jamming attack’s effects are
studied through Vehicular Network Open Simulator. However,
the CACC control structure and jamming attacking strategies
are considered as a black box in the simulation environments.
The coupling between the system state and wireless commu-
nication channel condition is not well modeled.
III. SYS TE M MOD EL
We consider a platoon of multiple vehicles. Each vehicle
has a direct communication with its immediately following
and preceding vehicle using Dedicated Short Range Commu-
nication (DSRC) technology. There is a mobile jammer (e.g.,
a drone), attacking on the wireless communication channel
among the vehicles.
A. Vehicle String
We consider a platoon of vehicles consisting of nho-
mogenous vehicles (identical longitudinal dynamic properties)
shown in Fig 1. Each vehicle is equipped with a CACC system.
In other words, each vehicle is equipped with a radar in front
of the vehicle to measure the absolute relative distance from
the vehicle ahead of it and a DSRC technique to transmit its
acceleration information to its following vehicle.
B. Wireless Channel
Each vehicle in the platoon is equipped with DSRC system
based on which acceleration information of each vehicle is
sent every 100ms to the following vehicle. DSRC operates in
the spectrum frequency of 75MHz in the 5.9 GHz band. For
the wireless channel, we assume it is subject to Additive White
Gaussian Noise (AWGN). We consider a two-ray propagation
channel model, Line-Of-Sight (LOS) and ground-reflected
wave propagation model [10]. By this modeling, we will be
able to consider ground-reflected ray effect in addition to free
space path loss impact on the received-signal-strength (RSS).
C. Attacker
We consider a mobile jamming attacker. The jammer is
mounted on a drone flying over the platoon. Since the power
source of the drone is limited, we assume a reactive jammer
[14]. Reactive jammer has the capability of sensing chan-
nels and launching its jamming signal whenever the vehicles
transmit their acceleration information through the wireless
medium to their immediately following vehicles. All legitimate
established wireless links among each pair of transmitters and
receivers in the platoon are under jamming attack.
IV. PROBLEM FORMULATIO N
A. Longitudinal Vehicle Dynamics
The common linearized third-order state space representa-
tion used for modeling longitudinal vehicle dynamics is as
follows [3]:
˙qi(t) = vi(t),˙vi(t) = ai(t),˙ai(t) = η1
i+η1
iui(t)
(1)
Where qi(t),vi(t)and ai(t)are absolute position, velocity
and acceleration of the ith vehicle, respectively. ηiand ui(t)
represent the internal actuator dynamics and the commanded
acceleration, respectively. The transfer function of the longi-
tudinal vehicle dynamics Gi(s)is derived as follows:
Gi(s) = Qi(s)
Ui(s)=1
s2(ηis+ 1) (2)
Where Qi(s) = L(qi(t)) and Ui(s) = L(ui(t)) represent
the Laplace transformation of the absolute position and the
commanded acceleration for the ith vehicle, respectively.
B. CACC Control Structure and State Space Representation
The structure of a CACC system is shown in Fig. 2. In
this model, Hi(s) = 1 + hdsrepresents the spacing policy
dynamics. Headway-time constant, hd, indicates the time that
it takes vehicle ito arrive at the same position as its preceding
vehicle (i1). Several spacing policies have been studied
Figure 1: Vehicle Platoon Under Mobile Jamming Attacker
in the literature [2]. The spacing policy considered in this
paper is based on the velocity-dependent spacing policy [2].
That is, the distance between the two vehicles increases if the
velocity of the preceding vehicle increases, and vice versa.
The string stability requirement is highly influenced by the
value of headway-time hd; as a result this parameter plays a
crucial role in operating a safe and efficient CACC system.
In this structure, Ki(s) = kpi +kdisis a feedback (PD)
controller where kdi is the bandwidth of the controller and
is chosen such that kdi << 1i[3]. The PD controller
parameters kpi and kdi are set up in such a way that the
internal stability of the vehicle dynamics is satisfied. In [2],
the feed-forward controller Fi(s) = (Hi(s)Gi(s)s2)1has
been designed such that the zero steady state spacing error
(ei(t)=0as t→ ∞) is achievable. ub,i and uf,i also represent
the controllers’ output, respectively. The summation of these
two outputs provide the commanded acceleration uifor the
ith vehicle.
Considering velocity-dependent spacing policy, the desired
distance is defined as hdvi(t). Therefore, spacing error, ei(t),
at each time instant tcan be determined by the difference
between the actual relative distance, qi1(t)qi(t), measured
by the radar, and the desired distance, hdvi(t), as follows:
ei(t) = qi1(t)qi(t)hdvi(t)(3)
State space representation of the CACC control structure in
Fig. 2 of the ith vehicle is given as follows [3]:
˙ei(t) = vi1(t)vi(t)hdai(t)
˙vi(t) = ai(t)
˙ai(t) = η1
iai(t) + η1
iui(t)
˙uf,i (t) = h1
duf,i (t) + h1
d˜ui1(t)
(4)
The acceleration of the (i1)th vehicle, ui1(t), is trans-
mitted through the established wireless channel to the ith
vehicle. The received acceleration information is denoted by
˜ui1(t)at the receiver of the following vehicle, i. From (4)
we see that the output of the feed-forward controller, uf,i(t),
depends on the received acceleration, ˜ui1(t), of the (i1)th
vehicle. For simplicity, we omit the continuous-time domain
representation tin the remained article. By defining the state
vector xT
i= [eiviaiuf,i ], the state space variables are
augmented in one variable and from (4) the continuous-time
CACC vehicle dynamics is represented as follows:
˙xi=Aixi+Ai1xi1+Bsui+Bc˜ui1(5)
Due to limited space we refer the reader to [3] for the values
of Ai,Ai1,Bs,Bcmatrices and vectors.
C. Vehicles String State Space Representation
The state space representation of the CACC control structure
in a vehicle string is as follows [3]:
˙
¯xn=¯
An¯xn+¯
Bc˜un1+¯
Bsul(6)
Where ˙
¯xn= [xT
1xT
2... xT
n]Trepresents the aug-
mented state space variables of the vehicles in the string.
˜un1= [˜u0˜u1... ˜un1]Tis a vector where its elements
denote the received acceleration information of the associated
vehicle in its immediately following vehicle and ulis an
arbitrary commanded acceleration taken by the lead vehicle.
The time-invariant matrices ¯
An,¯
Bcand ¯
Bswith constant
entities can be found in [3]. Now we drive the discrete-
time representation for the continuous-time system in (6) as
follows:
xn[k+ 1] = Anxn[k] + Bc˜un1[k] + Bsul[k]
An=e¯
Anh,Bs=Zh
0
e¯
Anνdν. ¯
Bs,Bc=Zh
0
e¯
Anνdν. ¯
Bc
(7)
Where his the sampling interval.
D. String Stability
The lead vehicle’s acceleration and deceleration will pro-
duce spacing error eibetween each pair of vehicles in the
the platoon. String stability requires spacing error attenuation
along the vehicle string. This can be shown as follows [7]:
kenk<ken1k< ... < ke2k<ke1k(8)
Hence, the time domain definition of the string stability will
be:
maxt|en(t)|<maxt|en1(t)|< ...
... < maxt|e2(t)|<maxt|e1(t)|(9)
When the transfer function of CACC system is drivable, the
string stability is evaluated by the frequency domain definition
and string will be stable if the following condition is satisfied
[2]:
|Γ()|=
Ei()
Ei1()
1ω, i = 1, ..., n (10)
In the next section, we will incorporate jamming attack and
wireless channel condition effects to the equation (7) in order
to analyze the string stability.
V. JAMMING ATTACK O N CAC C
A. Wireless Channel and Attack Impact
Considering two-ray channel modeling, received signal’s
signal-to-noise ratio (SNR) alters as the vehicle’s distance
varies with the preceding vehicle. Moreover, the SNR drops
dramatically at some distances due to the carrier phases
cancellation of the two paths (LOS and ground-reflected)
signal. Consequentially, the SNR level attenuation due to LOS
path loss and signal cancellation due to opposite carrier phases
received from two paths, affect the successful packet delivery
ratio (PDR) in the long run and degrade the performance of
the CACC system.
A reactive jammer mounted on a drone flying over the
platoon emits its jamming signal over the wireless network
whenever it senses that the communication traffic is happening
in the network. Due to the stochastic nature of the noise and
jamming signals’ effect in the channel, the attacker’s success
is probabilistic at time kin each link between a pair of
vehicles in the platoon. We consider a signal to interference
plus noise ratio (SINR) model to derive the probability of
successful packet delivery. In this model, the jamming signal
is considered as the interference signal.
We determine vector pk= [pk
0pk
1... pk
n1]Tsuch that
pk
i1,i= 1, ..., n, denotes the probability of successful packet
delivery of the (i1)th vehicle at the ith vehicle’s receiver
at time k. Thus, the PDR is defined as follows:
pk
i1=P Pt
Lp(dk
i1)(N0+I)SI N R0!i= 1, ..., n
(11)
Where Pdenotes the probability. Ptand N0are the signal
and noise powers, respectively. Idenotes the jamming signal
power and SINR0represents some constant threshold. dk
i1
denotes the actual distance between ith vehicle and its pre-
ceding vehicle (i1)th at discrete time k.Lp(dk
i1)indicates
the path-loss value at a given distance and time.
Now, we define a Bernoulli random variable βk
i1to indicate
the packet successful delivery which is defined as follows.
βk
i1=(1, pk
i1
0,1pk
i1
(12)
For k= 1,2, ... and i= 1,2, ..., n. Vector βk=
[βk
0βk
1... βk
n1]Tshows the random variables of suc-
cessful packet delivery among each pair of vehicles at time
kand the vector pk= [pk
0pk
1...pk
n1]Tindicates the
corresponding probabilities.
B. Memory Block
To comply with the DSRC standard protocol, the preced-
ing vehicle’s acceleration information, ui1is sampled with
sampling time tk=kh where k= 1,2, ...and h= 100ms,
Fig 2. These information, ui1[k], for k= 1,2, ... in the form
of packets are sent over a wireless channel to the following
vehicle, i. As the packets are transmitted through the channel,
they are subject to the channel condition and jamming attack
impact. To show this, the vector βk= [βk
0βk
1... βk
n1]T
Figure 2: CACC Control Structure with Memory and ZOH
which has been determined in (12) as a Bernoulli random
variable is multiplied by the transmitted information. Then at
the output of the wireless channel we will have βk
i1ui1[k].
Now before feeding the received information to the feed-
forward controller, we use a memory block in the following
vehicle’s CACC control structure, Fig 2. The low-cost memory
has the capacity for saving only one packet information. Each
time if the memory receives the packet successfully, it updates
the memory, otherwise it keeps the last successful received
information in the memory. The following model shows how
the feed-forward controller uses the stored information in the
memory as its input:
˜ui1[k] = βk
i1ui1[k] + (1 βk
i1ui1[k1] (13)
For i= 1,2, ..., n where ˜ui1[k]is the received acceleration
of the i1th vehicle at the receiver of ith vehicle, subject to the
jamming attack and wireless channel condition impact at time
k. As it can be realized, in case of successful packet reception
(βk
i1= 1), the output of the memory block will be ui1[k].
However, if the packet is jammed successfully or dropped due
to path loss or ground-reflected signal effect (βk
i1= 0), the
output of the memory block will be the last successful received
packet ˜ui1[k1]. Then we use ZOH (Zero Order Holder)
to convert the discrete-time signal ˜ui1[k]to the continuous-
time signal ˜ui1which will be fed into the feed-forward
controller Fi(s)shown in Fig 2. Now we substitute (13) in (7)
to obtain the string state space representation of the platoon
under reactive jamming attack and wireless channel condition
impact. Then we have
xn[k+ 1] = Anxn[k] + Bcβk
n1un1[k]
+Bc(1 βk
n1un1[k1] + Bsul[k](14)
In order to analyze the string stability in the frequency-
domain using Γ()in (10), the string state space equation
needs to be deterministic. However, due to the presence of
stochastic variable βk
i1in (14), the derived string state space
is probabilistic at each given time k. Therefore, we adapt the
time-domain definition of string stability for analyzing the
string state space equation derived in (14), discussed in the
next section.
VI. STRING STAB IL IT Y ANA LYSI S
A. Simulation Setting
We consider a platoon constructed with n= 11 vehicles.
The lead vehicle’s index is zero and the rest of the vehicles
are ordered from one to ten moving down the platoon. We
assume that the vehicles are homogenous and the internal
(a) A sample lead vehicle’s acceleration profile (b) Frequency-domain string stability for ACC
mode
(c) Time-domain string stability for ACC mode
(d) A sample lead vehicle’s velocity profile (e) Frequency-domain string stability for CACC
mode
(f) Time-domain string stability for CACC mode
Figure 3: Simulation results I
actuator dynamics are identical for all vehicles in the platoon
(ηi=η= 0.1for i= 1,2, ..., n). kdi =kd= 0.5<< 1and
kpi =kp=k2
d= 0.25 for i= 1, ..., n are chosen to satisfy the
internal stability of the vehicle dynamics. We generate 1,000
acceleration profiles using the random phase multi-sine signal
generation method [15]. These acceleration profiles model the
lead vehicle’s real-world actions. One sample of lead vehicle’s
acceleration and the corresponding velocity profile up to 100
seconds are shown in Fig. 3(a) and 3(d), respectively. For
each acceleration profile, we compute the maximum spacing
error produced during 500 seconds at each vehicle. Then, we
average over all the maximum errors of each vehicle to find
the average maximum errors of each vehicle. We also assume
that the signal transmission power for all vehicles is fixed and
identical all the time for all scenarios. The mobile jammer’s
vertical distance from the horizontal platoon and its jamming
signal power is also fixed all the time for all scenarios.
B. Validity of Time-Domain String Stability Analysis
Existing string stability analysis are based on frequency-
domain techniques. For our modeling in (14), this method
cannot be applied because of time-varying probabilistic packet
successful delivery at each receiver in the platoon. In order
to tackle this challenge, for the first time, we analyze the
time-domain string stability under a mobile jamming attacker.
We validate our analysis through comparing frequency-domain
and time-domain approaches for the case of perfect channel
condition, no attack and normal operation of the platoon.
Figures 3(b) and 3(c) illustrate the string stability analysis of
ACC (CACC without V2V communication) systems in the
frequency and time domains, respectively. By comparing the
figures, we observe that in both domains for the headway-
time 0.5 seconds and 1.5 seconds string is unstable. However,
string is stable when the headway-time is set to 2.2 seconds
and 3 seconds. Also, for CACC systems, Figures 3(e) and 3(f)
show that in both domains for the headway-time 0.2 seconds
string is unstable. However, for the headway-time 0.5 seconds,
1 second and 2 seconds string is stable. As a result, string
stability analysis of both frequency-domain and time-domain
are highly consistent and endorse each other.
C. Two-ray Channel Modeling Impact and No Attack
We consider a two-ray propagation model for the wireless
channels among the vehicles. We assume if the received
signal’s SNR is below the threshold SN R0= 20dB, the
packet is dropped, otherwise it is decoded successfully being
fed into the feed-forward controller. We investigate chan-
nels’ condition impact by examining string stability with and
without utilizing the memory block. In case of memoryless
(without the memory block), if the packet gets lost, the vehicle
considers its preceding vehicle maintains the same velocity
(zero acceleration). Figure 4(a) illustrates that overall the path
loss degrades the performance of CACC by incrementing the
magnitude of the spacing error. But the CACC controllers can
prevent those errors from getting amplified upstream, thus still
maintain the string stability.
D. Jamming Attack Impact
We consider a jammer above the second vehicle (i= 1)
with a constant vertical distance from it. The jammer emits
its signal over the platoon wireless ad-hoc network when it
senses communication traffic. Fig. 4(b) shows the capability of
(a) Two-ray channel modeling impact on string
stability
(b) Jamming attack impact on string stability with
memory block and different headway-time
(c) Attacker’s location impact on string stability
Figure 4: Simulation results II
the reactive attacker to destabilize the platoon. However, when
the memory block is utilized, the magnitude of the propagated
error is reduced, although the string is still unstable. From
Fig. 4(b), it can also be observed that the error in the presence
of the attacker does not propagate upstream the string, if the
headway-time is increased from 1second to 1.7seconds. Note
that as illustrated in Fig. 3(c), for the ACC mode the minimum
headway-time to have a stable string is 2.2seconds, however
the string under attack is stable for the headway-time 1.7
seconds in the CACC mode with memory block.
E. Attacker’s Location Impact on String Stability
We assume the head-way time is fixed to 1second and the
memory block is used in the control structure. As Fig. 4(c)
shows, when the attacker is above the second vehicle (i= 1),
not only the error propagates upstream the string, but also
the magnitude of errors are high in comparison to the no
attack scenarios Fig. 3(f). Also, in Fig. 4(c), we show that
as the attacker moves toward down in the platoon, its ability
to destabilize the platoon is diminished. This is because as
the attacker goes far away from the lead vehicle, the produced
spacing error magnitude for the front vehicles are decreased
since the packet delivery ratio is increased. As a result, as the
attacker goes away from the lead vehicle the more spacing
error is corrected by the CACC controllers such that when the
attacker is above the sixth vehicle in the platoon the string
becomes stable. As a result the more the attacker is close
to the lead vehicle the more effective it will be in terms of
destabilizing the platoon. Therefore, we conclude that the best
location for the attacker to launch its jamming signal is above
the second vehicle (i= 1).
VII. CONCLUSIONS
In this paper, we studied the string stability of intercon-
nected vehicles equipped with CACC systems under two-
ray propagation model for the channel and mobile jamming
attacker. We incorporated channel condition and jamming
attack impact on the string state space representation and
analyzed string stability through extensive simulations. We
show that signal’s power attenuation due to two-ray path loss
model degrades the performance of the CACC system. Also,
the analysis indicates that jamming attack can adversely desta-
bilize the string. However, by increasing the headway-time and
using the memory block, the stability can be improved. Finally,
we discovered that the best possible location for the attacker
to destabilize the string is above the second vehicle and as
the attacker moves down in the string, its impact in terms of
destabilizing the platoon is diminished.
REFERENCES
[1] D. B. Rawat, C. Bajracharya, and G. Yan. Towards intelligent transporta-
tion cyber-physical systems: Real-time computing and communications
perspectives. In SoutheastCon 2015, pages 1–6, April 2015.
[2] G. J. L. Naus, R. P. A. Vugts, J. Ploeg, M. J. G. van de Molengraft,
and M. Steinbuch. String-stable cacc design and experimental valida-
tion: A frequency-domain approach. IEEE Transactions on Vehicular
Technology, 59(9):4268–4279, Nov 2010.
[3] S. ¨
Onc¨
u, J. Ploeg, N. van de Wouw, and H. Nijmeijer. Cooperative
adaptive cruise control: Network-aware analysis of string stability. IEEE
Transactions on ITS, 15(4):1527–1537, 2014.
[4] J. Ma, F. Zhou, and M. J. Demetsky. Evaluating mobility and sustain-
ability benefits of cooperative adaptive cruise control using agent-based
modeling approach. In Systems and Information Design Symposium
(SIEDS), 2012 IEEE, pages 74–78, April 2012.
[5] M. Amoozadeh, A. Raghuramu, C. n. Chuah, D. Ghosal, H. M. Zhang,
J. Rowe, and K. Levitt. Security vulnerabilities of connected vehicle
streams and their impact on cooperative driving. IEEE Communications
Magazine, 53(6):126–132, June 2015.
[6] V. Milan´
es, S. E. Shladover, J. Spring, C. Nowakowski, H. Kawazoe,
and M. Nakamura. Cooperative adaptive cruise control in real traffic
situations. IEEE Transactions on ITS, 15(1):296–305, Feb 2014.
[7] Xiangheng Liu, A. Goldsmith, S. S. Mahal, and J. K. Hedrick. Effects
of communication delay on string stability in vehicle platoons. In
Intelligent Transportation Systems, IEEE, pages 625–630, 2001.
[8] J. Ploeg, D. P. Shukla, N. van de Wouw, and H. Nijmeijer. Controller
synthesis for string stability of vehicle platoons. IEEE Transactions on
Intelligent Transportation Systems, 15(2):854–865, April 2014.
[9] C. Sommer, S. Joerer, and F. Dressler. On the applicability of two-
ray path loss models for vehicular network simulation. In Vehicular
Networking Conference (VNC), 2012 IEEE, pages 64–69, Nov 2012.
[10] J.W. Mark and W. Zhuang. Wireless Communications and Networking.
Prentice Hall, 2003.
[11] E. Shaw and J. K. Hedrick. String stability analysis for heterogeneous
vehicle strings. In 2007 American Control Conference (ACC).
[12] Soodeh Dadras, Ryan M. Gerdes, and Rajnikant Sharma. Vehicular
platooning in an adversarial environment. In Proceedings of the
10th ACM Symposium on Information, Computer and Communications
Security, ASIA CCS ’15, pages 167–178, New York, NY, USA, 2015.
[13] Ryan M. Gerdes, Chris Winstead, and Kevin Heaslip. Cps: An
efficiency-motivated attack against autonomous vehicular transportation.
In Proceedings of the 29th, ACSAC ’13, pages 99–108, New York, NY,
USA, 2013. ACM.
[14] Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood.
The feasibility of launching and detecting jamming attacks in wireless
networks. In Proceedings of the 6th ACM International Symposium on
MobiHoc, MobiHoc ’05, pages 46–57, NY, USA, 2005. ACM.
[15] Jarosław Figwer. Multisine transformation — properties and applica-
tions. Nonlinear Dynamics, 35(4):331–346, 2004.
... When we scale from one vehicle to many-or from one vehicle to an entire transportation system-we find that attacks have materialized against the Internet of Vehicles (IoV), intelligent transportation systems (ITSs), and smart cities. Mousavinejad et al. [7], [8] described two attacks against vehicle platooning. In a vehicle platooning arrangement, the lead vehicle determines the pace, and the remaining vehicles position themselves to minimize the inter-vehicle distance while maintaining the safety of the platoon. ...
... They selected ten features as the basis for intrusion detection; if the features exceed the threshold for "normal," then they deemed anomalous. The features are as follows: (1) arbitration identifiers, (2) data length codes (DLCs), (3)(4)(5)(6)(7)(8) the eight bytes of the data field-each byte is regarded as a distinct feature. The authors evaluated the binary and multi-class CNN-based IDSs on four types of attacks-DoS, fuzzing, RPM spoofing, and gear spoofing-as well as three automobiles of different makes-Toyota, Subaru, and Suzuki. ...
Article
Full-text available
The automotive domain has realized amazing advancements in communication, connectivity, and automation— and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic accidents and the refinement of transit efficiency. However, these new developments were not necessarily made with security in mind. Researchers have unearthed a number of security vulnerabilities in paradigms such as in-vehicle networks (IVNs), the Internet of Vehicles (IoV), and intelligent transportation systems (ITSs). As automotive technologies continue to evolve, it would be realistic to expect new vulnerabilities to arise—both vulnerabilities that are identified and vulnerabilities that are not. If—or more pragmatically, when—these vulnerabilities are exploited, intrusion detection will be paramount. Therefore, we find it prudent to review intrusion detection in the automotive domain. We explore a myriad of threats and intrusion detection techniques—from the boundaries of the vehicles own network to the wider Internet of Vehicles (IoV). Intrusion detection, while not a panacea, can be a costeffective solution to many automotive security issues. Generally, such intrusion detection systems (IDSs) do not disrupt existing hardware, infrastructure, or communications; rather, they merely tap into the network and monitor for suspicious traffic. Given the very reasonable price tag, the implementation of intrusion detection systems would be an auspicious step by the automotive industry to assure the security—and safety—of the modern automobile. This paper volunteers a comprehensive review of intrusion detection technologies in the automotive domain.
Article
Control of a platoon of connected vehicles with nonlinear longitudinal dynamics subject to failure in receiving communicated and radio data is addressed in this paper. We consider a scenario when due to malfunction of communication and radio devices, required data for cooperative adaptive cruise control may be stochastically unavailable. We develop a control scheme such that under certain conditions, the regulation of the intervehicle distances in desired values can be guaranteed. Specifically, we rigorously show that if the probability of receiving the required data for each vehicle is not zero, then under the proposed control strategy, the intervehicle distances almost surely converge to the desired values. Accurate performance of radars is a key assumption in the existing results in the literature on cooperative adaptive cruise control. Hence, the main contribution of this paper is that under the proposed control strategy, the robustness of the platoon against stochastic data loss in both communication network and vehicles radars is guaranteed. Simulation results verify the acceptable performance of the proposed control strategy.
Article
5G Cellular Vehicle-to-Everything (5G C-V2X) is emerging as the globally dominant connected vehicle technology. One critical application of 5G C-V2X is the direct exchange of safety-critical messages between vehicles to prevent crashes and correspondingly reduce roadway injuries and fatalities. While current C-V2X security protocols concern only message payloads, we expose vulnerabilities in the physical-layer attributes and decentralized MAC-layer scheduling algorithm of 5G C-V2X by developing two stealthy denial-of-service (DoS) attacks to exploit them. These low-duty-cycle attacks dramatically degrade C-V2X availability, increasing the likelihood of prolonged travel times and even vehicle crashes. We further develop detection and mitigation techniques for each attack, in part by exploiting new C-V2X features of 3GPP Rel-17. We experimentally evaluate our attacks and countermeasures in a hardware testbed composed of USRPs and state-of-the-art C-V2X kits as well as through extensive network and roadway simulations, showing that within seconds of initiation our attacks can reduce a target’s packet delivery ratio by 90% or that of the C-V2X channel to under 25%. We further evaluate our machine-learning detection and low-cost mitigation techniques, showing the latter completely thwart one attack and reduce the impact of the other by 80%, providing insight towards developing a more robust 5G C-V2X.
Article
Full-text available
Transportation sector and its impacts on climate change have received much attention over the last decade. Energy-optimal vehicle control algorithms such as adaptive cruise control can potentially reduce fuel consumption and the consequential environmental impacts. Adaptive cruise control algorithms optimize vehicles’ speed to lower energy consumption considering several constraints, including safety, stability, and comfortability. A wide range of algorithms with different objectives and optimization mechanisms have been reported in the literature. Due to the high diversity of constraints and objectives, a comprehensive study of these algorithms is required. In recent literature reviews, there is no comprehensive summary of the adaptive cruise control algorithms’ features, classes, and objectives. This paper presents a holistic literature review of energy-optimal adaptive cruise control algorithms. We gathered relevant publications from well-eminent journals. Information on diversity and the number of publications will be presented to provide data on used references. For each paper, the objectives, features, and relevant classes of algorithms were extracted. Then a classification based on objectives is suggested, and mathematical formulas of representative studies are summarized to provide the required knowledge regarding mathematical modeling and optimization in this field. The study provides a useful insight into the development of the cruise control systems research field, revealing those scientific actors (i.e., authors, developers, and institutions) that have made the biggest research contribution to its development.
Article
Due to the increasing demand for autonomous driving, cyber‐attacks detection nowadays receives significant attention. Among several different types of attacks, Denial‐of‐Service (DoS) attacks can consume resources and cause the system under attack to stop responding, which can be considered a time delay model affecting the response of the attacked system. To detect the possible DoS attacks in Cooperative Adaptive Cruise Control platoon model, an adaptive observer design is proposed in this paper, where the time delay caused by DoS attacks can be fast and accurately estimated. To highlight the performance of the proposed adaptive observer, numerical simulations are applied and the performance is compared against the sliding mode observer in terms of the DoS attack time delay estimation convergence and accuracy.
Article
This study addresses the problem of distributed robust control resistance to vehicle parametric uncertainty and hybrid attacks in heterogeneous vehicular platoon systems. First, an invaded heterogeneous vehicular platoon system is modeled accompanied by the technique of inverse model compensation to deal with the problem of non-linearities in longitudinal dynamics, a nominal vehicle mass is introduced to tackle the problem of heterogeneity and variability of vehicle masses. Besides, we quantize the effects of false-data injection (FDI) and message-delay (MD) attacks and integrate them into the proposed heterogeneous platoon system. Additionally, to obtain the desired inner-vehicle stability of a heterogeneous platoon, an inner-vehicle ${H}_\infty $ distributed robust stable controller is presented based on Lyapunov-Krasovskii functional. Finally, a ${\mathcal{L}}_2$ -based string stability criterion is put forward to weaken the attacks' effects when they propagate along with the platoon. To explain the superiority of the derived theory more directly, simulations with two different control methods about the heterogeneous platoon under hybrid attacks are provided. The results show that, compared to regular platoon control method, the proposed robust controller performs better in achieving the desired inter-vehicle spacing tracking and can maintain string stability of the platoon.
Article
Full-text available
Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also illustrate how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.
Conference Paper
Full-text available
In this paper, we show that a single, maliciously controlled vehicle can destabilize a vehicular platoon, to catastrophic effect, through local modifications to the prevailing control law. Specifically, by combining changes to the gains of the associated law with the appropriate vehicle movements, the attacker can cause the platoon to oscillate at a resonant frequency, causing accidents that could result in serious injury or death. We determine the range of gains, and their corresponding frequencies, that allow an attacker to violate the string stability and stability criteria at different positions in the platoon. Furthermore, we prove that the attack can be successful at any position in the platoon and at frequencies that can be realized by the other vehicles in the platoon. Our work implies that neither the string stability nor stability conditions, when used singly, ensure proper platoon operation, and that neither can be used to ensure the other. Finally, we show that an attacker is theoretically capable of gaining control over the individual position and velocity (states) of other vehicles in the platoon; two attacks are demonstrated for this vulnerability.
Article
Full-text available
In this paper, we consider a Cooperative Adaptive Cruise Control (CACC) system, which regulates intervehicle distances in a vehicle string, for achieving improved traffic flow stability and throughput. Improved performance can be achieved by utilizing information exchange between vehicles through wireless communication in addition to local sensor measurements. However, wireless communication introduces network-induced imperfections, such as transmission delays, due to the limited bandwidth of the network and the fact that multiple nodes are sharing the same medium. Therefore, we approach the design of a CACC system from a Networked Control System (NCS) perspective and present an NCS modeling framework that incorporates the effect of sampling, hold, and network delays that occur due to wireless communication and sampled-data implementation of the CACC controller over this wireless link. Based on this network-aware modeling approach, we develop a technique to study the so-called string stability property of the string, in which vehicles are interconnected by a vehicle following control law and a constant time headway spacing policy. This analysis technique can be used to investigate tradeoffs between CACC performance (string stability) and network specifications (such as delays), which are essential in the multidisciplinary design of CACC controllers. Finally, we demonstrate the validity of the presented framework in practice by experiments performed with CACC-equipped prototype vehicles.
Article
Full-text available
Intelligent vehicle cooperation based on reliable communication systems contributes not only to reducing traffic accidents but also to improving traffic flow. Adaptive cruise control (ACC) systems can gain enhanced performance by adding vehicle–vehicle wireless communication to provide additional information to augment range sensor data, leading to cooperative ACC (CACC). This paper presents the design, development, implementation, and testing of a CACC system. It consists of two controllers, one to manage the approaching maneuver to the leading vehicle and the other to regulate car-following once the vehicle joins the platoon. The system has been implemented on four production Infiniti M56s vehicles, and this paper details the results of experiments to validate the performance of the controller and its improvements with respect to the commercially available ACC system.
Article
Traffic accidents and congestion problems continue to worsen worldwide. Because of vast number of vehicles manufactured and sold every year transportation sector is significantly stressed, leading to more accidents and fatalities, and adverse environmental and economic impact. Efforts across the world for Smart Transportation Cyber Physical Systems (CPS) are aimed at addressing a range of problems including reducing traffic accidents, decreasing congestion, reducing fuel consumption, reducing time spent on traffic jams, and improve transportation safety. Thus, smart transportation CPS is expected to contribute a main role in the design and development of intelligent transportation systems. The advances in embedded systems, wireless communications and sensor networks provides the opportunities to bridge the physical components and processes with the cyber world that leading to a Cyber Physical Systems (CPS). Feedback for control through wireless communication in transportation CPS is one of the major components for both safety and infotainment applications where vehicles exchange information using vehicle-to-vehicle (V2V) through vehicular ad hoc network (VANET) and/or vehicle-to-roadside (V2R) communications. For wireless communication IEEE has 802.11p standard for Dedicated Short Range Communication (DSRC) for Wireless Access for Vehicular Environment (WAVE). In this paper, we present how different parameters (e.g., sensing time, association time, number for vehicles, relative speed of vehicles, overlap transmission range, etc.) affect communication in smart transportation CPS. Furthermore, we also present driving components, current trends, challenges, and future directions for transportation CPS.
Conference Paper
This work describes a new type of efficiency attack that can be used to degrade the performance of automated vehicular transportation systems. Next-generation transportation technologies will leverage increasing use of vehicle automation. Proposed vehicular automation systems include cooperative adaptive cruise control and vehicle platooning strategies which require cooperation and coordination among vehicles. These strategies are intended to optimize through-put and energy usage in future highway systems, but, as we demonstrate, they also introduce new vulnerabilities. In this work we show that a typical platooning system would allow a maliciously controlled vehicle to exert subtle influence on the motion of surrounding vehicles. This effect can be used to increase the energy expenditure of surrounding vehicles by 20% to 300%.
Article
Cooperative adaptive cruise control (CACC) allows for short-distance automatic vehicle following using intervehicle wireless communication in addition to onboard sensors, thereby potentially improving road throughput. In order to fulfill performance, safety, and comfort requirements, a CACC-equipped vehicle platoon should be string stable, attenuating the effect of disturbances along the vehicle string. Therefore, a controller design method is developed that allows for explicit inclusion of the string stability requirement in the controller synthesis specifications. To this end, the notion of string stability is introduced first, and conditions for L <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> string stability of linear systems are presented that motivate the development of an H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> controller synthesis approach for string stability. The potential of this approach is illustrated by its application to the design of controllers for CACC for one- and two-vehicle look-ahead communication topologies. As a result, L <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> string-stable platooning strategies are obtained in both cases, also revealing that the two-vehicle look-ahead topology is particularly effective at a larger communication delay. Finally, the results are experimentally validated using a platoon of three passenger vehicles, illustrating the practical feasibility of this approach.
Conference Paper
We discuss the applicability of simplified Two-Ray Ground path loss models to simulation-based performance evaluation studies of Inter-Vehicle Communication (IVC) protocols. We contrast this with the applicability of a more exact Two-Ray Interference model. A key result is that, in most cases, the commonly used simplified Two-Ray Ground models add no additional value compared to the most simple Free-space model – in particular in highway and suburban environments. We further argue that replacing a simplified with a fully featured Two-Ray Interference model can not only substantially improve the accuracy of simulation results but also allow capturing one notable artifact that becomes immediately visible in field tests, namely strong signal attenuation at short and medium ranges. We implemented the Two-ray Interference model within the Veins simulation framework and validated it using analytical predictions and field measurements. We show the impact of the more accurate Two-Ray Interference model, which only comes with negligible additional computational cost for simulation experiments.
Article
With the advent of Connected Vehicles technology, a combination of a suite of technologies and applications that use wireless communications between vehicles, Cooperative adaptive cruise control (CACC), as an extension of ACC based on Connected Vehicles technology, becomes a very promising technology to solve traffic congestion. By measuring the distance to and exchange information with the prior and surrounding vehicles, the equipped vehicles will maintain a closer distance with ones ahead and operate with each other in a more coordinated way. This paper focuses not only the impact of CACC on traffic flow characteristics, such as average delay, stop-and-go patterns, average travel time and average speed, but also on the sustainability improvement, such as reduction in the greenhouse gas emissions. The CACC is studied on single lane and then an intersection, simulating both on highways and arterials. Different market penetration of CACC is also simulated. This study shows that CACC can help to annul the stop-and-go happens in both light and heavy traffic; CACC can help to reduce emissions in light traffic; the market penetration of CACC has no big impact on the mobility unless the penetration rate reaches 100%; CACC should operate under the intersection without traffic light and it will help to reduce the number of stopping vehicles and CACC can help the traffic recover more quickly from incidents.