Modeling and analyzing self-resistance of connected automated vehicular platoons under different cyberattack injection modes

Accid Anal Prev. 2024 Apr:198:107494. doi: 10.1016/j.aap.2024.107494. Epub 2024 Feb 8.

Abstract

The high-level integration and interaction between the information flow at the cyber layer and the physical subjects at the vehicular layer enables the connected automated vehicles (CAVs) to achieve rapid, cooperative and shared travel. However, the cyber layer is challenged by malicious attacks and the shortage of communication resources, which makes the vehicular layer suffer from system nonlinearity, disturbance randomness and behavior uncertainty, thus interfering with the stable operation of the platoon. So far, scholars usually adopt the method of assuming or improving the car-following model to explore the platoon behavior and the defense mechanism in cyberattacks, but they have not considered whether the model itself has disturbance and impact on cyberattack defenses. In other words, it is still being determined whether the car-following model designed can be fully applicable to such cyberattacks. To provide a theoretical basis for vehicular layer modeling, it is necessary to comprehend the self-resistance of different car-following models faced on various cyberattacks. First, we review the car-following models adopted on the vehicular layer in cyberattacks, involving traffic engineering, physical statistics, and platoon dynamics. Based on the review, we divide the malicious attacks faced by the cyber layer into explicit attacks and implicit attacks. Second, we develop a cooperative generalized force model (CGFM), which combines and unifies the r-predecessors following communication topology. The proposed models, labeled the vulnerable cooperative intelligent driver model (VCIDM), the vulnerable cooperative optimal velocity model (VCOVM), and the vulnerable cooperative platoon dynamics model (VCPDM), incorporate the CGFM model and assorted cyberattack injection modes to explain the cyberattack effects on the platoon self-resistance capability. Upon the described models, we provide six indicators in three dimensions from the basic traffic element, including drivers, vehicles, and environment. These indicators illustrate driver tolerance, vehicle adaptability, and environmental resistance when a platoon faces attacks such as bogus information, replay/delay, and communication interruption. We arrange and reorganize the car-following models and the cyberattack injection modes to complete the research on the self-resistance capability of the platoon, which has positive research value and practical significance for enhancing the endogenous security at the vehicular layer and improving the intrusion tolerability at the cyber layer.

Keywords: Car-following model; Connected automated vehicular platoon; Cyberattacks; Self-resistance capability.

Publication types

  • Review

MeSH terms

  • Accidents, Traffic* / prevention & control
  • Autonomous Vehicles*
  • Communication
  • Engineering
  • Head
  • Humans