Distributed control under compromised measurements: Resilient estimation, attack detection, and vehicle platooning

نویسندگان

چکیده

We study how to design a secure observer-based distributed controller such that group of vehicles can achieve accurate state estimates and formation control even if the measurements subset vehicle sensors are compromised by malicious attacker. propose an architecture consisting resilient observer, attack detector, controller. The detector is able update three sets sensors: ones surely under attack, attack-free, suspected be attack. adaptive observer saturates measurement innovation through preset static or time-varying threshold, potentially have limited influence on estimation. Essential properties proposed include: (1) fault-free, attacked attack-free identified in finite time; (2) guarantees both real-time error bounds asymptotic bounds, with tighter when more detector; (3) ensures closed-loop stability. effectiveness methods evaluated simulations application platooning.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Attack-Resilient Distributed Formation Control in Operator-Vehicle Networks

This paper tackles a distributed formation control problem where a group of vehicles is remotely controlled by a network of operators. Each operator-vehicle pair is attacked by an adversary, who corrupts the commands sent from the operator to the vehicle. From the point of view of operators, each adversary follows an attacking strategy linearly parameterized by some (potentially time-varying) m...

متن کامل

Distributed Estimation and Detection under Local Information

This work considers the problem of obtaining optimal estimates via distributed computation in a large scale system. The electric power system, the transportation system, and generally any computer or network system, are examples of large scale systems: a decentralized estimation of signals based on observations acquired by spatially distributed sensors is the basis for a wide range of important...

متن کامل

Attack Resilient State Estimation for Vehicular Systems

DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation's University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents...

متن کامل

Vehicle-to-vehicle communication for AVCS platooning

Vehicle-to-vehicle radio links suffer from power variations, multipath fading and associated Doppler spreading in frequency, as well as interference form other vehicles. These effects are investigated in the context of an Automated Vehicle Control Systems (AVCS) employing vehicle platoons. A statistical model for the channel is considered and the performance of the network involving many links ...

متن کامل

Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

ABSTRACT In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Automatica

سال: 2021

ISSN: ['1873-2836', '0005-1098']

DOI: https://doi.org/10.1016/j.automatica.2021.109953