skip to main content
10.1145/2714576.2714619acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Vehicular Platooning in an Adversarial Environment

Published: 14 April 2015 Publication History

Abstract

In this paper, we show that a single, maliciously controlled vehicle can destabilize a vehicular platoon, to catastrophic effect, through local modifications to the prevailing control law. Specifically, by combining changes to the gains of the associated law with the appropriate vehicle movements, the attacker can cause the platoon to oscillate at a resonant frequency, causing accidents that could result in serious injury or death. We determine the range of gains, and their corresponding frequencies, that allow an attacker to violate the string stability and stability criteria at different positions in the platoon. Furthermore, we prove that the attack can be successful at any position in the platoon and at frequencies that can be realized by the other vehicles in the platoon. Our work implies that neither the string stability nor stability conditions, when used singly, ensure proper platoon operation, and that neither can be used to ensure the other. Finally, we show that an attacker is theoretically capable of gaining control over the individual position and velocity (states) of other vehicles in the platoon; two attacks are demonstrated for this vulnerability.

References

[1]
C. Barreto, A. A. Cárdenas, and N. Quijano. Controllability of dynamical systems: Threat models and reactive security. In S. Das, C. Nita-Rotaru, and M. Kantarcioglu, editors, Decision and Game Theory for Security, volume 8252 of Lecture Notes in Computer Science, pages 45--64. Springer International Publishing, 2013.
[2]
L. D. Baskar, B. De Schutter, J. Hellendoorn, and Z. Papp. Traffic control and intelligent vehicle highway systems: a survey. IET Intelligent Transport Systems, 5(1):38--52, 2011.
[3]
C. Bergenhem, S. Shladover, E. Coelingh, C. Englund, and S. Tsugawa. Overview of platooning systems. In Proceedings of the 19th ITS World Congress, Oct 22-26, Vienna, Austria (2012), 2012.
[4]
J. Carbaugh, D. N. Godbole, and R. Sengupta. Safety and capacity analysis of automated and manual highway systems. Transportation Research Part C: Emerging Technologies, 6(1):69--99, 1998.
[5]
A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security, 2009.
[6]
C.-T. Chen. Linear system theory and design. Oxford University Press, Inc., 1995.
[7]
E. Coelingh and S. Solyom. All aboard the robotic road train. IEEE Spectrum, November 2012. {Online; accessed 30-Sept-2013}.
[8]
P. Cook. Conditions for string stability. Systems & Control Letters, 54(10):991--998, 2005.
[9]
S. Dadras, R. M. Gerdes, and R. Sharma. Transfer functions for string instability. Technical report, http://www.eng.usu.edu/ece/faculty/rgerdes/papers/tech/transferSI.pdf, 2015.
[10]
S. Darbha and K. Rajagopal. Intelligent cruise control systems and traffic flow stability. Transportation Research Part C: Emerging Technologies, 7(6):329--352, 1999.
[11]
A. Davila, E. del Pozo, E. Aramburu, and A. Freixas. Environmental benefits of vehicle platooning. Human Factors, 2012:05--17, 2012.
[12]
W. Dunbar and D. Caveney. Distributed receding horizon control of vehicle platoons: Stability and string stability. Automatic Control, IEEE Transactions on, 57(3):620--633, March 2012.
[13]
C. Featherstone and M. Lowson. Viability and benefits of platooning in automated transport systems. http://www.cybercars.org/docs/CTF%20Lowson%20Report.pdf, 2004. {Technical report; online; accessed 04-June-2014}.
[14]
A. Ferrara and C. Vecchio. Sliding mode control for automatic driving of a platoon of vehicles. In Variable Structure Systems, 2006. VSS'06. International Workshop on, pages 262--267, June 2006.
[15]
R. M. Gerdes, C. Winstead, and K. Heaslip. Cps: An efficiency-motivated attack against autonomous vehicular transportation. In Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, pages 99--108, New York, NY, USA, 2013. ACM.
[16]
J. J. Haas. The effects of wireless jamming on vehicle platooning. https://wiki.engr.illinois.edu/download/attachments/19826169/jjhaas2_platoon_jamming.pdf, 2009. {Tech report; online; accessed 04-June-2014}.
[17]
HDT Truckinginfo. Project to test 'platooning' trucks. http://www.truckinginfo.com/channel/fuel-smarts/news/story/2013/10/project-to-test-platooning-trucks.aspx, 2013. {Online; accessed04-June-2014}.
[18]
P. Ioannou. Automated Highway Systems. Springer, 1997.
[19]
A. Isidori. Nonlinear Control Systems. Number v.1 in Communications and Control Engineering. Springer, 1995.
[20]
P. Kavathekar and Y. Chen. Draft: Vehicle platooning: A brief survey and categorization. In Proceedings of The ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, volume 2011, pages 829--845. ASME, 2011.
[21]
A. Khodayari, A. Ghaffari, S. Ameli, and J. Flahatgar. A historical review on lateral and longitudinal control of autonomous vehicle motions. In Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on, pages 421--429, Sept 2010.
[22]
X. Litrico. Robust imc flow control of simo dam-river open-channel systems. Control Systems Technology, IEEE Transactions on, 10(3):432--437, 2002.
[23]
X. Litrico and J. Pomet. Nonlinear modelling and control of a long river stretch. In European Control Conference, Cambridge, UK, 2003.
[24]
X.-Y. Lu, S. E. Shladover, and C. Nowakowski. Partial automation for truck platooning. http://www.automatedvehiclessymposium.org/callforposters/partial-automation, 2014. {Poster presented at TRB Automated Vehicle Symposium 2014; accessed 04-June-2014}.
[25]
Y. Mo and B. Sinopoli. Integrity attacks on cyber-physical systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS '12, pages 47--54, New York, NY, USA, 2012. ACM.
[26]
F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. Automatic Control, IEEE Transactions on, 57(1):90--104, Jan 2012.
[27]
F. Pasqualetti, F. Dorfler, and F. Bullo. Attack detection and identification in cyber-physical systems. Automatic Control, IEEE Transactions on, 58(11):2715--2729, Nov 2013.
[28]
E. Shaw and J. Hedrick. Controller design for string stable heterogeneous vehicle strings. In Decision and Control, 2007 46th IEEE Conference on, pages 2868--2875, Dec 2007.
[29]
E. Shaw and J. Hedrick. String stability analysis for heterogeneous vehicle strings. In American Control Conference, 2007. ACC '07, pages 3118--3125, July 2007.
[30]
S. Shladover. Path at 20 - history and major milestones. Intelligent Transportation Systems, IEEE Transactions on, 8(4):584--592, Dec 2007.
[31]
S. Shladover. Recent international activity in cooperative vehicle-highway automation systems. http://www.fhwa.dot.gov/advancedresearch/pubs/12033/index.cfm, 2012. {U.S. Department of Transportation Federal Highway Administration Report FHWA-HRT-12-033; Online; accessed 04-June-2014}.
[32]
J. Wang and R. Rajamani. Should adaptive cruise-control systems be designed to maintain a constant time gap between vehicles? Vehicular Technology, IEEE Transactions on, 53(5):1480--1490, Sept 2004.
[33]
D. Yanakiev and I. Kanellakopoulos. A simplified framework for string stability analysis in ahs. In In the Proceedings of the 13th IFAC World Congress, pages 177--182, 1996.

Cited By

View all
  • (2025)Stability analysis and resilient communication in connected vehicle platooning: Addressing input communication delays and disruptions through Lyapunov analysis and event-triggered controlAlexandria Engineering Journal10.1016/j.aej.2024.12.063116(342-350)Online publication date: Mar-2025
  • (2025)SACC: Secure-Cooperative Adaptive Cruise Control for Unmanned VehiclesWeb and Big Data. APWeb-WAIM 2024 International Workshops10.1007/978-981-96-0055-7_13(151-162)Online publication date: 31-Jan-2025
  • (2024)Securing OFDMA-Based Cooperative Vehicular IoT Systems From Untrusted Platooning NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.341647111:19(30899-30911)Online publication date: 1-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
April 2015
698 pages
ISBN:9781450332453
DOI:10.1145/2714576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive cruise control
  2. attack
  3. autonomous and automated vehicles
  4. cooperative adaptive cruise control
  5. vehicle platoon

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation

Conference

ASIA CCS '15
Sponsor:
ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security
April 14 - March 17, 2015
Singapore, Republic of Singapore

Acceptance Rates

ASIA CCS '15 Paper Acceptance Rate 48 of 269 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)58
  • Downloads (Last 6 weeks)17
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Stability analysis and resilient communication in connected vehicle platooning: Addressing input communication delays and disruptions through Lyapunov analysis and event-triggered controlAlexandria Engineering Journal10.1016/j.aej.2024.12.063116(342-350)Online publication date: Mar-2025
  • (2025)SACC: Secure-Cooperative Adaptive Cruise Control for Unmanned VehiclesWeb and Big Data. APWeb-WAIM 2024 International Workshops10.1007/978-981-96-0055-7_13(151-162)Online publication date: 31-Jan-2025
  • (2024)Securing OFDMA-Based Cooperative Vehicular IoT Systems From Untrusted Platooning NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.341647111:19(30899-30911)Online publication date: 1-Oct-2024
  • (2024)Platoon Vulnerability due to Network Topology and Targeted Vehicle2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454750(771-776)Online publication date: 6-Jan-2024
  • (2024)Data poisoning attacks in intelligent transportation systems: A surveyTransportation Research Part C: Emerging Technologies10.1016/j.trc.2024.104750165(104750)Online publication date: Aug-2024
  • (2024)Data poisoning attacks on traffic state estimation and predictionTransportation Research Part C: Emerging Technologies10.1016/j.trc.2024.104577168(104577)Online publication date: Nov-2024
  • (2023)Discovering adversarial driving maneuvers against autonomous vehiclesProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620403(2957-2974)Online publication date: 9-Aug-2023
  • (2023)Self-stabilization control on traffic flow of connected and automated vehicles under cyberattacksThe European Physical Journal Plus10.1140/epjp/s13360-023-04791-8138:12Online publication date: 31-Dec-2023
  • (2023)Learning Based Longitudinal Vehicle Platooning Threat Detection, Identification and MitigationIEEE Transactions on Intelligent Vehicles10.1109/TIV.2021.31221448:1(290-300)Online publication date: Jan-2023
  • (2023)Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous VehiclesIEEE Transactions on Consumer Electronics10.1109/TCE.2023.329796569:4(825-832)Online publication date: Nov-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media