Road-side based Cybersecurity in Connected and Automated Vehicle Systems
dc.contributor.author | Masoud, Neda | |
dc.contributor.author | Wang, Yiyang | |
dc.contributor.author | Zhang, Ruixuan | |
dc.contributor.author | Liu, Henry | |
dc.date.accessioned | 2023-08-08T13:04:58Z | |
dc.date.available | 2023-08-08T13:04:58Z | |
dc.date.issued | 2023-08 | |
dc.identifier.citation | Masoud, N., Wang, Y., Zhang, R., Liu, H. (2023). Road-side based Cybersecurity in Connected and Automated Vehicle Systems. Final Report. | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/177453 | en |
dc.description.abstract | In this study, we develop a comprehensive framework to model the impact of cyberattacks on safety, security, and head-to-tail stability of connected and automated vehicular platoons. First, we propose a general platoon dynamics model with heterogeneous time delays that may originate from the communication channel and/or vehicle onboard sensors. Based on the proposed dynamics model, we develop an augmented state extended Kalman filter (ASEKF) to smooth sensor readings, and use it in conjunction with an anomaly detector to detect sensor anomalies. Specifically, we consider two detectors: a parametric detector, the 𝜒2-detector, and a learning based detector, the one class support vector machine (OCSVM). We investigate the detection power of all combinations of vehicle dynamics models (EKF and ASEKF) and detectors (𝜒2and OCSVM). Furthermore, we introduce a novel concept in string stability, namely, pseudo string stability, to measure a platoon's string stability under cyberattacks and model uncertainties. We demonstrate the relationship between the pseudo string stability of a platoon and its detection rate, which enables us to identify the critical detection sensitivity/recall that the platoon's members should meet for the platoon to remain pseudo string stable. | en_US |
dc.description.sponsorship | U.S. Department of Transportation Office of the Assistant Secretary for Research and Technology | en_US |
dc.language.iso | en_US | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | anomaly detection | en_US |
dc.subject | connected and automated vehicles | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | platoon stability | en_US |
dc.title | Road-side based Cybersecurity in Connected and Automated Vehicle Systems | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Civil and Environmental Engineering | |
dc.subject.hlbtoplevel | Engineering | |
dc.contributor.affiliationum | Civil and Environmental Engineering, Department of | en_US |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/177453/1/Road-side based Cybersecurity in CAV Systems Final Report [Accessible].pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/8007 | |
dc.identifier.orcid | 0000-0002-6526-3317 | en_US |
dc.identifier.orcid | 0000-0002-6478-7282 | en_US |
dc.identifier.orcid | 0000-0002-9638-4883 | en_US |
dc.identifier.orcid | 0000-0002-3685-9920 | en_US |
dc.description.filedescription | Description of Road-side based Cybersecurity in CAV Systems Final Report [Accessible].pdf : Final Report | |
dc.description.depositor | SELF | en_US |
dc.identifier.name-orcid | Masoud, Neda; 0000-0002-6526-3317 | en_US |
dc.identifier.name-orcid | Wang, Yiyang; 0000-0002-6478-7282 | en_US |
dc.identifier.name-orcid | Zhang, Ruixuan; 0000-0002-9638-4883 | en_US |
dc.identifier.name-orcid | Liu, Henry; 0000-0002-3685-9920 | en_US |
dc.working.doi | 10.7302/8007 | en_US |
dc.owningcollname | Civil & Environmental Engineering (CEE) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.