Detection of Cyber-Attacks in Collaborative Intersection Control

Twan Keijzer, Fabian Jarmolowitz, Riccardo M.G. Ferrari

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)
5 Downloads (Pure)

Abstract

Road intersections are widely recognized as a lead cause for accidents and traffic delays. In a future scenario with a significant adoption of Cooperative Autonomous Vehicles, solutions based on fully automatic, signage-less Intersection Control would become viable. Such a solution, however, requires communication between vehicles and, possibly, the infrastructure over wireless networks. This increases the attack surface available to a malicious actor, which could lead to dangerous situations. In this paper, we address the safety of Intersection Control algorithms, and design a Sliding-Mode-Observer based solution capable of detecting and estimating false data injection attacks affecting vehicles’ communication. With respect to previous literature, a novel detection logic with improved detection performances is presented. Simulation results are provided to show the effectiveness of the proposed approach.
Original languageEnglish
Title of host publicationProceedings of the European Control Conference (ECC 2021)
PublisherIEEE
Pages62-67
ISBN (Electronic)978-9-4638-4236-5
ISBN (Print)978-1-6654-7945-5
DOIs
Publication statusPublished - 2021
Event2021 European Control Conference (ECC) - Virtual , Netherlands
Duration: 29 Jun 20212 Jul 2021

Conference

Conference2021 European Control Conference (ECC)
Country/TerritoryNetherlands
CityVirtual
Period29/06/212/07/21

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Fingerprint

Dive into the research topics of 'Detection of Cyber-Attacks in Collaborative Intersection Control'. Together they form a unique fingerprint.

Cite this