Cooperative Adaptive Cruise Control (CACC) is a promising technology that allows groups of vehicles to form in automated tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange kinematic information among adjacent vehicles. However, the use of communication networks brings security concerns as cyberattacks could access the vehicles' internal networks and computers to disrupt their operation and even cause crashes. In this manuscript, we present a sensitivity analysis of standard CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks entering the dynamics at different points and study how two key system parameters (sampling and headway constant) change these metrics. We carry out the latter sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different implementations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate our ideas.
翻译:合作自适应巡航控制(CACC)是一种有前途的技术,允许车辆组成自动化的緊密耦合车队。 CACC方案利用车辆间的无线通信(V2V)交换相邻车辆之间的运动信息。 然而,使用通信网络会带来安全问题,因为网络攻击可能访问车辆的内部网络和计算机以破坏它们的操作并甚至导致事故。 在本文中,我们针对一类资源受限的攻击对标准CACC方案进行灵敏度分析。 我们提出了一个建模框架,使我们能够系统地计算由攻击引起的可达集的外椭球近似。 我们使用这些集合的大小作为安全度量来量化攻击的潜在损害,并研究两个关键系统参数(采样和车头间距常数)如何改变这些指标。 我们针对两种不同的控制器实现进行后一灵敏度分析(由于可用传感器的给定,相同的控制器有无限的实现方式),并展示不同的实现方式如何显着影响攻击的影响。 我们进行了广泛的仿真实验以说明我们的想法。