Show simple item record

Cybersecurity in Connected and Automated Transportation Systems

dc.contributor.authorWang, Yiyang
dc.date.accessioned2023-01-30T16:10:25Z
dc.date.available2023-01-30T16:10:25Z
dc.date.issued2022
dc.date.submitted2022
dc.identifier.urihttps://hdl.handle.net/2027.42/175624
dc.description.abstractThe last decade has been a witness to critical advancements in the field of intelligent transportation systems (ITS), with a great volume of research focusing on connected and automated vehicles (CAVs). A CAV leverages connected vehicle (CV) and automated vehicle (AV) technologies to enable automation and cooperation between vehicles and/or infrastructures to improve mobility, safety, efficiency, and sustainability in transportation systems. Despite these benefits, both connectivity and automation increase potential attack surfaces on CAVS, thereby introducing unprecedented cybersecurity challenges. This dissertation addresses these challenges by developing a comprehensive cybersecurity framework, which consists of two major components. The first component of the framework focuses on anomaly detection in CAV sensors. A CAV requires high fidelity data for automated and cooperative driving tasks. However, oftentimes there exist uncertainties in the CAV sensor measurements, including noise and time delay. Therefore, the first part of the dissertation proposes a signal filtering-detection framework to estimate the CAV sensor state in the presence of potential cyberattacks. This dissertation considers sensor anomaly as a result of either malicious attacks or sensor faults, and proposes a series of data-driven detectors in conjunction with extended Kalman filter (EKF)-based algorithms for both signal filtering and anomaly detection. The first part of the dissertation consists of studies under different driving scenarios, including in car following and platooning modes. The study on the platooning mode further analyzes platoon stability under cybersecurity uncertainties, where a new class of string stability measures, namely pseudo string stability, is introduced to analyze the stability of a vehicle string under various types of attacks and imperfect detectors. Despite the necessity of anomaly detection, a well-developed security monitor should also consider the dynamically changing environment faced by a CAV and the strategic behavior of the adversary to ensure both security and energy efficiency of the CAV. Therefore, the second component of the framework focuses on a macroscopic perspective to address security monitoring challenges faced by a CAV. First, the dissertation addresses the attack profile prediction and sensor selection problem under a security resource constraint. Toward this goal, the dissertation considers a sequential two-player game involving an attacker and a defender. This dissertation thereby develops an online learning algorithm for the defender to solve a variant of the multi-armed bandit (MAB) problem, namely, the multi-armed bandit with variable plays (MAB-VP). The dissertation provides a sublinear regret bound of the proposed algorithm, and derives the conditions under which a Nash equilibrium of the strategic game exists. Based on the analysis of the asymptotic expected reward of the two players, the dissertation assesses the effectiveness of the following two defense strategies from a game theoretical perspective: (1) increasing security resources for monitoring, and (2) improving the performance of the detector. Considering the fact that continuously monitoring all sensors aboard a CAV can be increasingly energy-intensive and therefore impractical, this dissertation introduces a dynamic security resource allocation problem to selectively monitor a subset of sensors for potential cyberattacks. This is accomplished by providing a mathematical framework based on a partially observable Markov decision process (POMDP), which prescribes a policy to dynamically assign security resource by balancing the trade-off between detection performance and energy-efficiency. This dynamic resource allocation problem serves as a complementary supplement to the sensor selection study, and together they form the last component of the proposed framework.
dc.language.isoen_US
dc.subjectConnected and automated vehicles
dc.subjectCybersecurity
dc.subjectIntelligent transportation systems
dc.subjectAnomaly detection
dc.subjectMulti-armed bandits
dc.titleCybersecurity in Connected and Automated Transportation Systems
dc.typeThesis
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineCivil Engineering
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.contributor.committeememberMasoud, Neda
dc.contributor.committeememberLiu, Mingyan
dc.contributor.committeememberOrosz, Gabor
dc.contributor.committeememberYin, Yafeng
dc.subject.hlbsecondlevelCivil and Environmental Engineering
dc.subject.hlbsecondlevelComputer Science
dc.subject.hlbsecondlevelTransportation
dc.subject.hlbtoplevelEngineering
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/175624/1/yiyangw_1.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/6838
dc.identifier.orcid0000-0002-6478-7282
dc.identifier.name-orcidWang, Yiyang; 0000-0002-6478-7282en_US
dc.working.doi10.7302/6838en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.