Next Article in Journal
FungiLT: A Deep Learning Approach for Species-Level Taxonomic Classification of Fungal ITS Sequences
Previous Article in Journal
Predicting Student Performance and Enhancing Learning Outcomes: A Data-Driven Approach Using Educational Data Mining Techniques
Previous Article in Special Issue
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks

by
Parisa Ansari Bonab
*,† and
Arman Sargolzaei
*,†
Department of Mechanical Engineering, University of South Florida, Tampa, FL 33620, USA
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Computers 2025, 14(3), 84; https://doi.org/10.3390/computers14030084
Submission received: 3 December 2024 / Revised: 1 February 2025 / Accepted: 10 February 2025 / Published: 27 February 2025
(This article belongs to the Special Issue Cyber Security and Privacy in IoT Era)

Abstract

:
The combination of connectivity and automation allows connected and autonomous vehicles (CAVs) to operate autonomously using advanced on-board sensors while communicating with each other via vehicle-to-vehicle (V2V) technology to enhance safety, efficiency, and mobility. One of the most promising features of CAVs is cooperative adaptive cruise control (CACC). This system extends the capabilities of conventional adaptive cruise control (ACC) by facilitating the exchange of critical parameters among vehicles to enhance safety, traffic flow, and efficiency. However, increased connectivity introduces new vulnerabilities, making CACC susceptible to cyber-attacks, including false data injection (FDI) attacks, which can compromise vehicle safety. To address this challenge, we propose a secure observer-based control design leveraging Lyapunov stability analysis, which is capable of mitigating the adverse impact of FDI attacks and ensuring system safety. This approach uniquely addresses system security without relying on a known lead vehicle model. The developed approach is validated through simulation results, demonstrating its effectiveness.

1. Introduction

The continuous growth of the automobile industry, coupled with rapid urbanization, has resulted in a substantial increase in the number of vehicles. Consequently, modern transportation systems are facing different challenges, including a rise in traffic accidents, severe traffic congestion, increased energy consumption, and heightened levels of pollution [1]. Early applications developed to address these challenges relied on local sensors, such as radar and cameras, to enable vehicle autonomy. While these technologies allowed vehicles to detect and respond to their immediate environment and support real-time decision-making, they offer only a limited level of safety because of the constrained sensing ranges and the complexities of data processing [2,3].
To overcome these limitations, additional sources of data were essential to expand surrounding perception across a wider area. Vehicle-to-vehicle (V2V) communication has been introduced as a solution to address these limitations. By enabling vehicles to share critical information on acceleration, speed, position, and trajectory, V2V communication offers a more comprehensive understanding of the surrounding environment [4]. Therefore, the integration of automated vehicles (AVs) and connected vehicles (CVs) as connected and autonomous vehicles (CAVs) has the potential to address all above-mentioned challenges, resulting in improvements in safety and efficiency and reducing traffic congestion [5,6,7].
Cooperative adaptive cruise control (CACC) as a key feature of CAVs, has enhanced the capabilities of adaptive cruise control (ACC) to improve safety, traffic flow, and energy efficiency through cooperative maneuvers [8,9]. In CACC systems, vehicles exchange information with one another within the network via V2V communications, which results in several key benefits including improved reaction times in vehicles, enhanced safety, increased traffic flow efficiency, fuel efficiency and reduced emissions, and string stability in vehicles’ platoons [9,10,11,12].
Although CAVs and CACC offer numerous benefits, their heavy reliance on V2V communications makes vehicles susceptible to cyber-attacks such as false data injection (FDI) attacks. These threats can compromise the reliability of observations used in decision-making process [13,14,15]. Therefore, it is necessary to develop a secure CACC algorithm to address and mitigate these attacks effectively.
The design of CACC has been widely studied in various studies; each of them has addressed different objectives and operated under different assumptions and conditions. In [16], the research utilized deep reinforcement learning (DRL) to improve the performance of CACC, comparing its effectiveness to traditional model-based approaches. The research aimed to minimize both distance error and energy consumption while ensuring safety. A model predictive control (MPC) approach for CACC was designed in [17]. In this study, by predicting traffic and integrating fuel-efficient control, the system minimized fuel usage and prevented collisions. In [18], a dynamic event-triggered communication mechanism (DECM) approach was introduced for CACC systems. This method was used to conserve constrained V2V communication resources. By implementing DECM, the frequency of measured velocity and acceleration data required for transmission to following vehicles is minimized. In [19], the researchers concentrated on a different aspect of CACC, specifically string stability. The main objective of this study was to tackle the challenge of maintaining string stability as inter-vehicle time gaps decrease. However, none of the mentioned studies addressed the impact of FDI attacks on the communication channel of the CACC system.
The development of CACC under FDI attacks has been considered in a limited number of studies. A recent study analyzed the effects of FDI attacks on CACC [20]. This research examined FDI attacks within the CACC communication channel, including ghost vehicle injections aimed at disrupting system performance. To detect and locate these attacks, the authors developed a partial differential equation (PDE)-based model as the dynamic model for vehicles and designed a PDE observer. By leveraging Lyapunov stability theory, they validated the observer’s convergence, ensuring robust detection of attacks even in the presence of noise. The effects of FDI attacks were also considered in [21]. This research employed a hybrid approach, combining both model-based and learning-based methods to estimate FDI attacks. Additionally, it introduced a Lyapunov-based controller designed to reduce the adverse effects of FDI attacks, measurement noise, and external disturbances in CACC, ensuring the maintenance of a safe distance between vehicles. Further research on CACC under FDI attacks was presented in [22]. This study addressed the effects of FDI attacks, input time-varying delays, external disturbances, and measurement noise by developing a nonlinear controller, observer, and NN-based attack estimators. However, all of the mentioned papers assumed that the dynamic model of the lead vehicle is known, while accessing the dynamic model of the lead vehicle presents a significant challenge, which is a key focus of this paper.
The contributions of our paper are as follows: (i) A novel observer-based control for CACC was developed that is resilient against injected FDI attacks into both transmitted velocity and control signals. (ii) The proposed approach operates effectively without relying on the dynamic model of the lead vehicle. (iii) The proposed nonlinear observer was designed to estimate FDI attacks in real time. (iv) Additionally, we provided a comprehensive Lyapunov stability analysis for both the proposed nonlinear controller and the observer. (v) Finally, we validated the developed method through simulations to demonstrate its effectiveness.
The structure of the paper is organized as follows: Section 2 presents a dynamic model of the lead and following vehicles. The problem statement is detailed in Section 3. Section 4 presents an overview of the proposed solution, including observer design, control design, and estimation of FDI attacks. The stability analysis of the proposed observer and controller is discussed in Section 5. Section 6 demonstrates the results, and the paper concludes with a summary in Section 7.

2. Models of Dynamics

Figure 1 illustrates a string of vehicles, each equipped with the CACC feature. In this configuration, each vehicle follows its respective leader. Here, we assumed n vehicles in the platoon, where j { 2 , , n } denotes a following vehicle, while j 1 denotes its respective leader. Each follower vehicle j receives data from its leader j 1 including the leader’s control and velocity signals. However, during the transmission process via the wireless communication channel, an adversary may gain access and inject falsified data into the control and velocity signals. As a result, the following vehicle receives corrupted data. Additionally, each following vehicle uses a radar sensor to measure the position of its leader. The vehicles in this string are heterogeneous, meaning they are different models and not uniform in design. The dynamic model of followers is described as
x ˙ j ( t ) = v j ( t ) , v ˙ j ( t ) = b j v j ( t ) + c j u j ( t ) ,
where the position, velocity, and control signals of the follower are indicated as x j ( t ) R , v j ( t ) R , and u j ( t ) R , respectively. In addition, b j and c j are known constants, representing dynamic models of the following vehicle, which are calculated using experimental analysis [21]. In this paper, we considered that the lead vehicle follows a second-order dynamic model such as
x ˙ j 1 ( t ) = v j 1 ( t ) , v ˙ j 1 ( t ) = b j 1 v j 1 ( t ) + c j 1 u j 1 ( t ) ,
where the position, velocity, and control signals of the leader are indicated as x j 1 R , v j 1 R , and u j 1 R , respectively. The parameters b j 1 and c j 1 are unknown.

FDI Attacks in Communication Channel

Each vehicle receives the velocity and control signals of its leader through a wireless communication channel while the transmitted data are experiencing FDI attacks. To show the effect of FDI attacks on the control and velocity signals of the leader, we define the below signals:
u ¯ j 1 ( t ) u j 1 ( t ) + f j 1 ( t ) , v ¯ j 1 ( t ) v j 1 ( t ) + f j 1 ( t ) ,
where u ¯ j 1 ( t ) R and v ¯ j 1 ( t ) R are altered control and velocity signals of the leader which are received by follower, and f j 1 ( t ) R is the unknown, bounded, time-varying, and continuous FDI attacks.
Assumption 1.
An FDI attack is assumed to be bounded and differentiable such that f j 1 ( t ) f ¯ j 1 , where t t 0 and f ¯ j 1 is a positive known constant [22].
Considering (3), the following vehicle receives altered signals. To estimate the control and velocity signals of the lead vehicle, we define the below signals:
u ^ j 1 ( t ) u ¯ j 1 ( t ) f ^ j 1 ( t ) , v ^ j 1 ( t ) v ¯ j 1 ( t ) f ^ j 1 ( t ) ,
where u ^ j 1 ( t ) R , v ^ j 1 ( t ) R , and f ^ j 1 ( t ) R are an estimation of the leader’s control signal, an the estimation of leader’s velocity signal, and an estimation of the FDI attacks, respectively.

3. Problem Statement and Error Signals

The primary focus of this work is to develop a secure controller for CACC to mitigate the effects of FDI attacks, therefore ensuring a safe inter-vehicle distance. The CACC algorithm relies on real-time control and velocity signals from the lead vehicle. However, adversarial manipulations pose a significant challenge to this process, potentially leading to collisions. In addition, the lead vehicle’s model is unknown, which introduces further complexity in secure controller design. Therefore, a secondary purpose of this study is to develop an observer capable of estimating FDI attacks and the unknown parameters of the lead vehicle in real time. To quantify these objectives, we defined error signals as distance error, velocity error, and acceleration error.
The distance error signal e j R is defined as
e x j ( t ) = Δ x j ( t ) x j 1 ( t ) + D j 1 + x d j ( t ) ,
where D j 1 R is the length of lead vehicle which is constant, and x d j R is the desired inter-vehicle distance.
Assumption 2.
The desired distance, as well as its first and second derivatives, is assumed to remain within the limits of predefined positive constants, x d j , x ˙ d j , x ¨ d j L [23].
The velocity error signal e v j R is introduced as
e v j ( t ) = e ˙ x j ( t ) , e v j ( t ) = x ˙ j ( t ) x ˙ j 1 ( t ) + x ˙ d j ( t ) ,
using (1) and (2), (6) changes to
e v j ( t ) = v j ( t ) v j 1 ( t ) + x ˙ d j ( t ) .
In addition, the acceleration error signal e a j R is introduced as
e a j ( t ) = e ˙ v j ( t ) , e a j ( t ) = v ˙ j ( t ) v ˙ j 1 ( t ) + x ¨ d j ( t ) ,
using (1) and (2), (8) changes to
e a j ( t ) = b j v j ( t ) + c j u j ( t ) + b j 1 v j 1 ( t ) c j 1 u j 1 ( t ) + x ¨ d j ( t ) ,
we can write (9) as
e a j ( t ) = b j v j ( t ) + c j u j ( t ) + θ j 1 ( t ) + x ¨ d j ( t ) ,
where θ j 1 ( t ) R is the combination of all unknown terms in (9) and is defined as
θ j 1 ( t ) = Δ b j 1 v j 1 ( t ) c j 1 u j 1 ( t ) ,
where the control and velocity signals of leader are unknown under FDI attacks. In addition, since the dynamic model of the lead vehicle is unknown, b j 1 and c j 1 are unknown.
To streamline the design process and stability analysis of the second-order system, an auxiliary error equation is introduced to derive the control signal as
r j ( t ) = Δ e ^ v j ( t ) + α j e ^ x j ( t ) ,
where α j R > 0 is a known gain specified by the user, e ^ v j ( t ) R shows the estimation of e v j ( t ) , and e ^ x j ( t ) R is the estimation of e x j ( t ) .
To obtain the velocity and acceleration errors and address the unknown terms, we introduced newly defined state variables as
z 1 j ( t ) = Δ e x j ( t ) , z 2 j ( t ) = Δ e v j ( t ) , z 3 j ( t ) = Δ θ j 1 ( t ) .
The defined state variables are estimated using an observer. To quantify the observer accuracy, we need to define estimations errors z ˜ 1 j ( t ) : [ t 0 , ) R , z ˜ 2 j ( t ) : [ t 0 , ) R , and z ˜ 3 j ( t ) : [ t 0 , ) R as
z ˜ 1 j ( t ) = Δ z ^ 1 j ( t ) z 1 j ( t ) , z ˜ 2 j ( t ) = Δ z ^ 2 j ( t ) z 2 j ( t ) , z ˜ 3 j ( t ) = Δ z ^ 3 j ( t ) z 3 j ( t ) ,
where z ^ 1 j ( t ) : [ t 0 , ) R , z ^ 2 j ( t ) : [ t 0 , ) R , and z ^ 3 j ( t ) : [ t 0 , ) R are the estimation of z 1 j ( t ) , z 2 j ( t ) , and z 3 j ( t ) , respectively.
Here, we use (13) and (14) to update (12) as
r j ( t ) = z ^ 2 j ( t ) + α j z ^ 1 j ( t ) .

4. Proposed Solution

To address the problem statement and achieve the objective of maintaining the desired inter-vehicle distance, it is necessary to ensure that the distance error, e x j ( t ) , and velocity error, r j ( t ) , converge to zero. To achieve this, a Lyapunov function is formulated based on the distance and velocity errors, and the corresponding control signal is derived accordingly. However, the control signal contains certain unknown parameters that must be estimated and compensated for effective implementation. To address this, an observer is introduced to estimate these unknown parameters. The observer is derived using a second Lyapunov function based on estimation errors. The details of the nonlinear Lyapunov-based controller and observer are discussed in the subsequent subsections.

4.1. Observer Design

The observer employed for estimating velocity and acceleration errors is an extended state observer (ESO) which is derived from the stability analysis in Section 5.
Using (6), (8), (10), and (13), the time derivative of (13) is obtained as
z ˙ 1 j ( t ) = z 2 j ( t ) , z ˙ 2 j ( t ) = b j v j ( t ) + c j u j ( t ) + z 3 j ( t ) + x ¨ d j ( t ) , z ˙ 3 j ( t ) = Ψ j 1 ( t ) ,
where Ψ j 1 ( t ) R is the unknown bounded function.
Assumption 3.
Ψ j 1 ( t ) is presumed to be restricted within a known constant bound such that Ψ j 1 ( t ) < Ψ ¯ 1 j , and Ψ ¯ 1 j R > 0 .
Here, we use the Lyapunov-based observer to estimate the z 1 j ( t ) , z 2 j ( t ) , and z 3 j ( t ) as
z ^ ˙ 1 j ( t ) = z ^ 2 j ( t ) γ 1 j z ˜ 1 j , z ^ ˙ 2 j ( t ) = b j v j ( t ) + c j u j ( t ) + z ^ 3 j ( t ) + x ¨ d j ( t ) γ 2 j z ˜ 1 j , z ^ ˙ 3 j ( t ) = γ 3 j z ˜ 1 j ,
where γ 1 j , γ 2 j , γ 3 j R > 0 are observer gains. Using the observer, time derivatives of estimation errors are obtained as
z ˜ ˙ 1 j ( t ) = z ^ ˙ 1 j ( t ) z ˙ 1 j ( t ) , z ˜ ˙ 2 j ( t ) = z ^ ˙ 2 j ( t ) z ˙ 2 j ( t ) , z ˜ ˙ 3 j ( t ) = z ^ ˙ 3 j ( t ) z ˙ 3 j ( t ) ,
using (16) and (17), (18) changes to
z ˜ ˙ 1 j ( t ) = z ˜ 2 j ( t ) γ 1 j z ˜ 1 j ( t ) , z ˜ ˙ 2 j ( t ) = z ˜ 3 j ( t ) γ 2 j z ˜ 1 j ( t ) , z ˜ ˙ 3 j ( t ) = γ 3 j z ˜ 1 j ( t ) Ψ j 1 ( t ) .

4.2. Controller Design

Based on the Lyapunov stability analysis in Section 5, the control signal is obtained as
u j ( t ) = Δ 1 c j [ b j v j ( t ) z ^ 3 j ( t ) x ¨ d j ( t ) + ( γ 2 j + α j γ 1 j ) z ˜ 1 j ( t ) α j r j ( t ) z ^ 1 j ( t ) K 1 j r j ( t ) + α j 2 z ^ 1 j ( t ) ] ,
where K 1 j R > 0 is a gain specified by the user.
Time derivatives of the error signals should be obtained to be used in the stability analysis section. The time derivative of (15) is obtained as
r ˙ j ( t ) = z ^ ˙ 2 j ( t ) + α j z ^ ˙ 1 j ( t ) ,
substituting content from (17) yields
r ˙ j ( t ) = b j v j ( t ) + c j u j ( t ) + z ^ 3 j ( t ) + x ¨ d j ( t ) γ 2 j z ˜ 1 j + α j ( z ^ 2 j ( t ) γ 1 j z ˜ 1 j ) ,
simplifying (22) and substituting z ^ 2 j ( t ) from (15) results in
r ˙ j ( t ) = b j v j ( t ) + c j u j ( t ) + z ^ 3 j ( t ) + x ¨ d j ( t ) γ 2 j z ˜ 1 j ( t ) + α j r j ( t ) α j 2 z ^ 1 j ( t ) α j γ 1 j z ˜ 1 j ( t ) ,
combining similar terms results in
r ˙ j ( t ) = b j v j ( t ) + c j u j ( t ) + z ^ 3 j ( t ) + x ¨ d j ( t ) ( γ 2 j + α j γ 1 j ) z ˜ 1 j ( t ) + α j r j ( t ) α j 2 z ^ 1 j ( t ) ,
substituting the control signal from (20) in (24) results in
r ˙ j ( t ) = b j v j ( t ) + c j [ 1 c j ( b j v j ( t ) z ^ 3 j ( t ) x ¨ d j ( t ) + ( γ 2 j + α j γ 1 j ) z ˜ 1 j ( t ) α j r j ( t ) z ^ 1 j ( t ) K 1 j r j ( t ) + α j 2 z ^ 1 j ( t ) ) ] + z ^ 3 j ( t ) + x ¨ d j ( t ) ( γ 2 j + α j γ 1 j ) z ˜ 1 j ( t ) + α j r j ( t ) α j 2 z ^ 1 j ( t ) ,
and finally, simplification of (25) results in
r ˙ j ( t ) = z ^ 1 j ( t ) K 1 j r j ( t ) .

4.3. FDI Attacks Estimation

Here, (4) is used to obtain the estimation of FDI attack as
f ^ j 1 ( t ) = v ¯ j 1 ( t ) v ^ j 1 ( t ) ,
where v ^ j 1 ( t ) : [ t 0 , ) R is the estimation of the leader’s velocity.
Using the observer (17), we can estimate z ^ 1 j ( t ) , z ^ 2 j ( t ) , and z ^ 3 j ( t ) . Considering (13), we can conclude the following:
z ^ 2 j ( t ) = e ^ v j ( t ) .
In (7), v j ( t ) and x ˙ d j ( t ) are known and estimated values of e v j ( t ) , which is obtained from (28). Therefore, we can calculate the estimation of the leader’s velocity as
e ^ v j ( t ) = v j ( t ) v ^ j 1 ( t ) + x ˙ d j ( t ) ,
from the above equation, v ^ j 1 ( t ) is obtained as
v ^ j 1 ( t ) = v j ( t ) + x ˙ d j ( t ) e ^ v j ( t ) .
Using (30), and given that v ¯ j 1 ( t ) is received by the follower, the FDI attack estimation is calculated according to (27).
To enhance clarity, a diagram is provided in Figure 2 to illustrate the overall process.

5. Stability Analysis

A stability analysis of the developed observer and controller is presented in this section. Given (19), we can write
z ˜ ˙ j ( t ) = A j z ˜ j ( t ) + B j ( Ψ j 1 ( t ) ) ,
where z ˜ j ( t ) [ z ˜ 1 j ( t ) z ˜ 2 j ( t ) z ˜ 3 j ( t ) ] T is the estimation error vector, and z ˜ ˙ j ( t ) is the time derivative of this vector. In addition, the matrix A j is of Hurwitz type and is defined as A j γ 1 j 1 0 γ 2 j 0 1 γ 3 j 0 0 and vector B j is defined as B j [ 0 0 1 ] T .
Theorem 1.
Consider the estimation errors; given Assumption 3, and using the defined observer in (17), the state estimation error vector z ˜ j ( t ) ultimately converges into the following bounded ball
z ˜ j ( t ) 2 Ψ ¯ 1 j λ m a x ( P j ) ϵ j ,
where P j R 3 × 3 is a unique positive matrix that satisfies ( A j T P j + P j A j = ϵ j I ) in which matrix I R 3 × 3 is an identity matrix, and ϵ j is the maximum eigenvalue of ( A j T P j + P j A j ) . Also, λ m a x ( P j ) R > 0 is the maximum eigenvalue of matrix P j .
Proof of Theorem 1.
A positive Lyapunov function is considered to prove the stability of the implemented observer:
V o j = Δ z ˜ j ( t ) T P j z ˜ j ( t ) ,
the time derivative of the Lyapunov function is written as
V ˙ o j = z ˜ ˙ j ( t ) T P j z ˜ j ( t ) + z ˜ j ( t ) T P j z ˜ ˙ j ( t ) ,
substituting (31) into (34) results in
V ˙ o j = ( A j z ˜ j ( t ) + B j ( Ψ j 1 ( t ) ) ) T P j z ˜ j ( t ) + z ˜ j ( t ) T P j ( A j z ˜ j ( t ) + B j ( Ψ j 1 ( t ) ) ) ,
the simplification of (35) results in
V ˙ o j = z ˜ j ( t ) T ( A j T P j + P j A j ) z ˜ j ( t ) + 2 z ˜ j ( t ) T P j B j ( Ψ j 1 ( t ) ) .
Substituting the upper bound of Ψ 1 j ( t ) from Assumption 3, λ m a x ( P j ) as the upper bound of P j , and considering B j = 1 , the below inequality is obtained from (36):
V ˙ o j ϵ j z ˜ j ( t ) 2 + 2 z ˜ j ( t ) λ m a x ( P j ) Ψ ¯ 1 j ,
the above inequality can be written as
V ˙ o j z ˜ j ( t ) ( ϵ j z ˜ j ( t ) 2 λ m a x ( P j ) Ψ ¯ 1 j ) .
Therefore, z ˜ j ( t ) ultimately converges into the z ˜ j ( t ) 2 Ψ ¯ 1 _ j λ m a x ( P j ) ϵ j bounded region. □
Theorem 2.
For the dynamic system described in (1), the controller given in (20) ensures asymptotic tracking for e ^ x j and r j .
Proof of Theorem 2.
Let  V c j R denote a radially unbounded, continuously differentiable, and positive-definite Lyapunov function displayed as
V c j ( t ) = Δ 1 2 e ^ x j ( t ) 2 + 1 2 r j ( t ) 2 .
Now, we can calculate the time derivative of (39) as
V ˙ c j ( t ) = e ^ ˙ x j ( t ) e ^ x j ( t ) + r ˙ j ( t ) r j ( t ) ,
considering (13), we can write (40) as
V ˙ c j ( t ) = z ^ 2 j ( t ) z ^ 1 j ( t ) + r ˙ j ( t ) r j ( t ) ,
substituting z ^ 2 j ( t ) from (15) and r ˙ j ( t ) from (26), we obtain
V ˙ c j ( t ) = ( r j ( t ) α j z ^ 1 j ( t ) ) z ^ 1 j ( t ) + ( z ^ 1 j ( t ) K 1 j r j ( t ) ) r j ( t ) ,
the simplification of (42) results in
V ˙ c j ( t ) = α j z ^ 1 j ( t ) 2 K 1 j r j ( t ) 2 ,
the below inequality can be written from (43) as
V ˙ c j ( t ) α j z ^ 1 j ( t ) 2 K 1 j r j ( t ) 2 ,
considering (13), and knowing that Theorem 1 holds, which implies that z ^ 1 j is an estimate of z 1 j the following inequality is derived:
V ˙ c j ( t ) α j e ^ x j ( t ) 2 K 1 j r j ( t ) 2 ,
considering (45) and satisfying conditions for α j and K 1 j being positive which we have mentioned before, we can ensure that e ^ x j ( t ) and r j ( t ) converge to zero as t , thus achieving asymptotic tracking. □

6. Results

This section provides a comprehensive analysis of the results obtained from testing the proposed secure nonlinear controller and nonlinear observer through MATLAB Simulink R2024b (MathWorks, Natick, MA, USA) and an experimental setup. The evaluation focuses on key performance metrics, including inter-vehicular distance, the velocities of both the leader and follower vehicles, and the estimation of FDI attacks. To quantify performance, we also present the Root Mean Square Error (RMSE) for both distance and FDI attack estimation. To demonstrate the robustness of the proposed method, we analyze seven distinct scenarios. The first three scenarios examine different types of FDI attacks, highlighting the controller’s ability to estimate and mitigate them. The remaining scenarios include a comparative analysis with an alternative method, a platoon scenario, the impact of different FDI attacks on control and velocity signals, and, finally, the experimental validation through real-world testing. In scenarios, we selected x d j = 5 m, which is the desired inter-vehicle distance for simplicity. The model parameters of the follower vehicle were obtained from the experimental setup in [21] as b j = 0.141322 and c j = 6.6870 . In addition, disturbance and noise are added to the system to show robustness of our developed CACC. In the first three scenarios, the term secure controller refers to our proposed nonlinear controller, while the baseline controller refers to the controller described in [6]. The baseline controller lacks compensation for FDI attacks and does not address the unknown dynamic model of the lead vehicle.

6.1. One-Step Function FDI Attack

In Figure 3, the first subplot illustrates the FDI attack, modeled as a step function with a step time of 50 s. The step function begins with an initial value of 0 and increases to a final value of 0.6. Additionally, the subplot includes the corresponding estimation of the attack. As derived from (27), the estimation is obtained from the difference between the estimated velocity of the leader and the faulty leader’s velocity. Minor estimation errors occur during periods when the leader changes its velocity.
The second subplot shows the velocity profiles of both the lead and following vehicles. It is evident that under the proposed secure controller, the follower vehicle closely tracks the leader’s velocity. However, under the baseline controller, the follower fails to follow the leader’s velocity during the period of FDI attack injection. This causes the follower’s velocity to exceed that of the lead vehicle, leading to a dangerously reduced inter-vehicle distance and increasing the likelihood of a collision.
The third subplot demonstrates the distance between the vehicles. Under the secure controller, the adverse effects of the FDI attack are mitigated, maintaining a safe distance between the vehicles. Although small deviations occur, the inter-vehicle distance remains close to the desired 5 m, preventing any issues. In contrast, with the baseline controller, which lacks attack compensation, the follower receives corrupted data during the FDI attacks. This results in an increase in velocity and a dangerously close distance to the leader vehicle, with the distance dropping to 2 m at t = 50 s significantly increasing the risk of a collision.

6.2. Two-Step Function FDI Attack

The second scenario for the FDI attacks involves two step functions: the first is initiated at 30 s, increasing to 0.3, followed by a second increase to 0.6 at 60 s. The results, including the estimation of the FDI attacks, the velocity profiles of both the lead and following vehicles, and the inter-vehicle distance, are presented in Figure 4.
As with the previous scenario, the first subplot shows the estimation of the FDI attack, while the second subplot illustrates the follower vehicle’s ability to track the leader’s velocity. Under the secure controller, the follower closely tracks the leader’s velocity. In contrast, under the baseline controller, the follower fails to maintain accurate tracking during the FDI attack. The final subplot highlights how the baseline controller is unable to mitigate the effects of the attack, resulting in a dangerously reduced distance between the vehicles and a heightened risk of collision. However, the secure controller successfully maintains a safe distance between the vehicles, even under FDI attack injection.

6.3. Step and Sinusoidal FDI Attack

To further validate and demonstrate the effectiveness of the proposed method, we introduce an additional scenario involving sinusoidal FDI attacks. This attack is modeled using a step function with a step time of 30 s, an initial value of 0, and a final value of 0.4, combined with a sinusoidal function applied at 50 s, represented as: 0.1 sin ( t / 8 ) . As demonstrated in Figure 5, similar to the previous scenarios, the observer accurately estimates the FDI attack, while the proposed secure controller effectively mitigates the adverse effects of FDI attacks, disturbances, and noise. This allows the follower vehicle to track the leader’s velocity and maintain a safe inter-vehicle distance.
To quantify the performance, Table 1 presents RMSE values to illustrate the efficacy of the developed secure controller. As illustrated in the table, the RMSE between the desired and actual distances under the secure controller is minimal. In contrast, the baseline controller fails to maintain the desired distance, resulting in significantly higher RMSE values across all FDI attack scenarios when compared to the secure controller.
Additionally, Table 2 demonstrates the performance of the proposed observer and estimation approach in estimating FDI attacks. The low RMSE values across all FDI attack scenarios indicate the method’s effectiveness in accurately estimating these attacks.

6.4. Comparison Scenario

In this subsection, the effectiveness of the proposed secure controller is further validated by comparing its performance with the baseline 1 controller, as introduced in [22]. The control method presented in this paper incorporates an FDI attack estimator and employs a hybrid approach that integrates model-based and learning-based techniques. In addition, the controller design does not rely on the leader’s model. Figure 6 and Figure 7 illustrate that while the baseline 1 controller successfully maintains the desired distance and estimates the FDI attack, our proposed method demonstrates superior performance. To quantify this improvement, Table 3 presents the RMSE values for distance and FDI attack estimation, providing a clear comparative assessment. Although the baseline 1 controller achieves low RMSE values, indicative of its good performance, our proposed controller exhibits even lower RMSE values, further confirming its enhanced accuracy and effectiveness.

6.5. Platoon Scenario

In this subsection, we present an additional simulation involving a platoon of five vehicles, where the fourth vehicle is designated as the leader ( i 1 ) and the fifth vehicle as the follower (i). In this scenario, an FDI attack is introduced as a step function with a step time of 50 s. The FDI attack function begins at an initial value of 0 and increases to a final value of 0.6, targeting the communication channels of all five vehicles. To further evaluate system robustness, we incorporated external disturbances modeled as ζ sin ( t / 8 ) to the model of vehicles and a time-varying communication delay represented by ( β ( 2 sin ( t / 2 ) + 3 ) ) into the transmitted control and velocity signals of the leader vehicle. Additionally, measurement noise was included in the Simulink model for a realistic evaluation. For the following figures, we used ζ = 0.1 and β = 0.01 . As illustrated in Figure 8, the velocities of all five vehicles are depicted, demonstrating that even under the influence of FDI attack, external disturbances, measurement noise, and time-varying communication delays, the vehicles maintain harmonic movement, with each follower closely tracking its respective leader. Furthermore, Figure 9 shows the distance between the fourth and fifth vehicles. While minor deviations from the desired 5 m spacing are observed, the vehicles consistently maintain a safe inter-vehicle distance, significantly reducing the risk of collisions. To quantify the impact of disturbances and delays, Table 4 presents the RMSE value for inter-vehicle distance. The results clearly indicate that increasing the values of ζ and β leads to higher RMSE values, reflecting the greater effects of larger disturbances and communication delays.

6.6. FDI Attacks on Control and Velocity Signals

In this subsection, we present a new scenario of the attacks on the communication between vehicles. A sophisticated attacker gains access to the communication channel and injects different types of FDI attacks into the transmitted data. Specifically, the velocity signal is disrupted by a uniform random disturbance signal, characterized by a minimum value of 0, a maximum value of 0.5, and a fixed seed of 1 to ensure repeatability. Concurrently, the control signal is subjected to two distinct step-function FDI attacks: the first initiates at 30 s, transitioning from an initial value of 0 to a final value of 0.3, while the second begins at 60 s with a similar transition from 0 to 0.3.
Additionally, the simulation includes a noise and a disturbance defined as 0.1 sin ( t / 8 ) . As shown in Figure 10, the proposed method effectively mitigates the adverse effects of these diverse FDI attacks, disturbances, and measurement noise, ensuring that the desired safe distance between vehicles is maintained. Furthermore, Figure 11 illustrates how the following vehicle successfully tracks the leader vehicle, maintaining the same velocity profile despite the injected attacks and external disturbances. It is important to note that in this scenario, the estimation of FDI attacks is not performed when the injected attacks on the control and velocity signals are different. Our proposed method is designed to estimate FDI attacks effectively when the same attack is applied to both control and velocity signals.

6.7. Experimental Results

The experimental setup was designed to validate the results obtained from MATLAB Simulink by integrating the lead vehicle and controller within the Simulink environment while using the Ford Fusion as the follower vehicle. During testing, the control signal was generated within MATLAB Simulink and subsequently converted into a controller area network (CAN) message using dedicated Simulink blocks. This CAN message was then transmitted to the actual vehicle via CAN communication. The vehicle’s CAN bus interface facilitated both the reception and transmission of these messages. To establish seamless communication between Simulink on the computer and the vehicle’s CAN bus interface, Kvaser USB interfaces were employed. Once the control signal was received by the vehicle, its velocity data were extracted as CAN messages and sent back to MATLAB Simulink.
In this scenario, the FDI attack is modeled as a step function, starting at zero and increasing to 0.6 at 35 s. Additionally, a disturbance, represented as 0.1 sin ( t / 8 ) , and measurement noise were introduced in the Simulink model to better simulate real-world conditions. The lead vehicle, initially positioned 10 m ahead of the follower, begins moving at the start of the test and increases its speed at the 50 s mark. Figure 12 shows the distance between the vehicles in both the Simulink simulation and the experimental setup. In the simulation, the desired inter-vehicle distance is well maintained throughout the test. In the experimental setup, some overshoots and undershoots appear when the lead vehicle changes its velocity. Despite these fluctuations, the minimum observed distance remains above 3.5 m, ensuring a low risk of collision. Figure 13 illustrates the velocity profile of the vehicles. As shown, the follower vehicle initially tries to match the movement of the leader, maintaining the 10 m gap. When the lead vehicle accelerates at 50 s, the follower responds accordingly. These results confirm that the follower successfully tracks the leader while maintaining a safe distance, demonstrating the effectiveness of the control strategy.

7. Conclusions and Future Work

7.1. Conclusions

CACC is a key feature of CAVs, enabling data collection from the leading vehicle and transmission to the following vehicle. To ensure the reliability of CACC, secure controllers should be designed to identify and mitigate FDI attacks. In this study, the leader’s control and velocity signals are subjected to FDI attacks. Additionally, discrepancies between the vehicle models, with the leader vehicle’s model being unknown, pose significant challenges. To counteract the effects of both FDI attacks and unknown leaders, a secure observer-based control system is designed. The proposed system accurately estimates FDI attacks and mitigates their effects, ensuring a safe following distance between vehicles. The effectiveness of the developed method was evaluated using MATLAB Simulink.

7.2. Future Work

While this study provides important insights into secure control for connected and autonomous vehicles, there are several exciting directions for future research. One possibility is exploring vehicle platooning in a multi-layer framework, where multiple platoons operate at different levels under varying traffic conditions. This could improve scalability and adaptability in real-world traffic scenarios. Additionally, instead of focusing only on the longitudinal dynamics of vehicles, future research could incorporate both longitudinal and lateral dynamics. This would offer a more realistic model of vehicle behavior, especially in situations involving lane changes, turns, and curved roads. Another important area for further investigation is the impact of real-world environmental factors on system performance. Conditions such as rain, snow, fog, road surface variations, and sensor noise could be studied to enhance the robustness of the control method.

Author Contributions

Conceptualization, P.A.B.; methodology, P.A.B.; software, P.A.B.; validation, A.S. and P.A.B.; formal analysis, P.A.B.; investigation, P.A.B.; resources, A.S. and P.A.B.; writing—original draft preparation, P.A.B.; writing—review and editing, A.S.; supervision, A.S.; project administration, A.S.; funding acquisition, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by the National Science Foundation under Grant No. ECCS-EPCN-2241718. The opinions, findings, conclusions, and recommendations presented in this material are solely those of the author(s) and do not necessarily represent the views of the funding agency.

Data Availability Statement

The data supporting this study are available from the authors upon request. For further information, please contact the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest. The funding organizations had no involvement in the study’s design; data collection, analysis, or interpretation; the preparation of the manuscript; or the decision to publish the findings.

Abbreviations

The following shows the abbreviations used in this manuscript:
ACCAdaptive Cruise Control
CACCCooperative Adaptive Cruise Control
CAVsConnected and Autonomous Vehicles
AVsAutonomous Vehicles
CVsConnected Vehicles
V2VVehicle to Vehicle

References

  1. Jia, D.; Lu, K.; Wang, J.; Zhang, X.; Shen, X. A survey on platoon-based vehicular cyber-physical systems. IEEE Commun. Surv. Tutor. 2015, 18, 263–284. [Google Scholar] [CrossRef]
  2. Xiao, L.; Gao, F. A comprehensive review of the development of adaptive cruise control systems. Veh. Syst. Dyn. 2010, 48, 1167–1192. [Google Scholar] [CrossRef]
  3. He, Y.; Ciuffo, B.; Zhou, Q.; Makridis, M.; Mattas, K.; Li, J.; Li, Z.; Yan, F.; Xu, H. Adaptive cruise control strategies implemented on experimental vehicles: A review. IFAC-PapersOnLine 2019, 52, 21–27. [Google Scholar] [CrossRef]
  4. Kazemi, H.; Mahjoub, H.N.; Tahmasbi-Sarvestani, A.; Fallah, Y.P. A learning-based stochastic MPC design for cooperative adaptive cruise control to handle interfering vehicles. IEEE Trans. Intell. Veh. 2018, 3, 266–275. [Google Scholar] [CrossRef]
  5. Wang, Z.; Wu, G.; Barth, M.J. A review on cooperative adaptive cruise control (CACC) systems: Architectures, controls, and applications. In Proceedings of the 2018 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 4–7 November 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 2884–2891. [Google Scholar]
  6. Bonab, P.A.; Sargolzaei, A. A Nonlinear Control Design for Cooperative Adaptive Cruise Control with Time-Varying Communication Delay. Electronics 2024, 13, 1875. [Google Scholar] [CrossRef]
  7. Shladover, S.E. Connected and automated vehicle systems: Introduction and overview. J. Intell. Transp. Syst. 2018, 22, 190–200. [Google Scholar] [CrossRef]
  8. Ploeg, J.; Scheepers, B.T.; Van Nunen, E.; Van de Wouw, N.; Nijmeijer, H. Design and experimental evaluation of cooperative adaptive cruise control. In Proceedings of the 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC), Washington, DC, USA, 5–7 October 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 260–265. [Google Scholar]
  9. Bouadi, M.; Jiang, R.; Jia, B.; Zheng, S.T. String Stability Analysis of Cooperative Adaptive Cruise Control Vehicles Considering Multi-Anticipation and Communication Delay. IEEE Trans. Intell. Transp. Syst. 2024, 25, 11359–11369. [Google Scholar] [CrossRef]
  10. Dey, K.C.; Yan, L.; Wang, X.; Wang, Y.; Shen, H.; Chowdhury, M.; Yu, L.; Qiu, C.; Soundararaj, V. A review of communication, driver characteristics, and controls aspects of cooperative adaptive cruise control (CACC). IEEE Trans. Intell. Transp. Syst. 2015, 17, 491–509. [Google Scholar] [CrossRef]
  11. Rezaee, H.; Zhang, K.; Parisini, T.; Polycarpou, M.M. Cooperative adaptive cruise control in the presence of communication and radar stochastic data loss. IEEE Trans. Intell. Transp. Syst. 2024, 25, 4964–4976. [Google Scholar] [CrossRef]
  12. Zhai, C.; Chen, C.; Zheng, X.; Han, Z.; Gao, Y.; Yan, C.; Luo, F.; Xu, J. Ecological cooperative adaptive cruise control for heterogenous vehicle platoons subject to time delays and input saturations. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2862–2873. [Google Scholar] [CrossRef]
  13. Pham, M.; Xiong, K. A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 2021, 109, 102269. [Google Scholar] [CrossRef]
  14. Suo, D.; Moore, J.; Boesch, M.; Post, K.; Sarma, S.E. Location-based schemes for mitigating cyber threats on connected and automated vehicles: A survey and design framework. IEEE Trans. Intell. Transp. Syst. 2020, 23, 2919–2937. [Google Scholar] [CrossRef]
  15. Zhu, P.; Jin, S.; Bu, X.; Hou, Z. Distributed Data-Driven Control for a Connected Autonomous Vehicle Platoon Subjected to False Data Injection Attacks. IEEE Trans. Autom. Sci. Eng. 2023, 21, 7527–7538. [Google Scholar] [CrossRef]
  16. Mirwald, J.; Ultsch, J.; de Castro, R.; Brembeck, J. Learning-Based Cooperative Adaptive Cruise Control. Actuators 2021, 10, 286. [Google Scholar] [CrossRef]
  17. Stanger, T.; del Re, L. A model predictive cooperative adaptive cruise control approach. In Proceedings of the 2013 American Control Conference, Washington, DC, USA, 17–19 June 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1374–1379. [Google Scholar]
  18. Wen, S.; Guo, G.; Chen, B.; Gao, X. Cooperative adaptive cruise control of vehicles using a resource-efficient communication mechanism. IEEE Trans. Intell. Veh. 2018, 4, 127–140. [Google Scholar] [CrossRef]
  19. Kayacan, E. Multiobjective H control for string stability of cooperative adaptive cruise control systems. IEEE Trans. Intell. Veh. 2017, 2, 52–61. [Google Scholar] [CrossRef]
  20. Biroon, R.A.; Biron, Z.A.; Pisu, P. False data injection attack in a platoon of CACC: Real-time detection and isolation with a PDE approach. IEEE Trans. Intell. Transp. Syst. 2021, 23, 8692–8703. [Google Scholar] [CrossRef]
  21. Ansari-Bonab, P.; Holland, J.C.; Cunningham-Rush, J.; Noei, S.; Sargolzaei, A. Secure Control Design for Cooperative Adaptive Cruise Control Under False Data Injection Attack. IEEE Trans. Intell. Transp. Syst. 2024, 25, 9723–9732. [Google Scholar] [CrossRef]
  22. Ansari Bonab, P.; Javidi-Niroumand, F.; Sargolzaei, A. Secure control design for cooperative adaptive cruise control with a time-varying input delays under false data injection attacks. Int. J. Syst. Sci. 2024, 56, 375–393. [Google Scholar] [CrossRef]
  23. Patre, P.M.; MacKunis, W.; Kaiser, K.; Dixon, W.E. Asymptotic tracking for uncertain dynamic systems via a multilayer neural network feedforward and RISE feedback control structure. IEEE Trans. Autom. Control 2008, 53, 2180–2185. [Google Scholar] [CrossRef]
Figure 1. A string of heterogeneous vehicles with the CACC feature, under FDI attacks.
Figure 1. A string of heterogeneous vehicles with the CACC feature, under FDI attacks.
Computers 14 00084 g001
Figure 2. Proposed solution diagram.
Figure 2. Proposed solution diagram.
Computers 14 00084 g002
Figure 3. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 1.
Figure 3. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 1.
Computers 14 00084 g003
Figure 4. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 2.
Figure 4. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 2.
Computers 14 00084 g004
Figure 5. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 3.
Figure 5. FDI attack estimation, velocity profile of vehicles, and distance between vehicles for scenario 3.
Computers 14 00084 g005
Figure 6. Distance between lead and following vehicles for comparison scenario.
Figure 6. Distance between lead and following vehicles for comparison scenario.
Computers 14 00084 g006
Figure 7. FDI attack estimation for comparison scenario.
Figure 7. FDI attack estimation for comparison scenario.
Computers 14 00084 g007
Figure 8. Velocity profile of all vehicles in the platoon.
Figure 8. Velocity profile of all vehicles in the platoon.
Computers 14 00084 g008
Figure 9. Distance between the fourth and fifth vehicles.
Figure 9. Distance between the fourth and fifth vehicles.
Computers 14 00084 g009
Figure 10. Distance between vehicles under two different FDI attacks.
Figure 10. Distance between vehicles under two different FDI attacks.
Computers 14 00084 g010
Figure 11. Velocity profile of the following and lead vehicles under two different FDI attacks.
Figure 11. Velocity profile of the following and lead vehicles under two different FDI attacks.
Computers 14 00084 g011
Figure 12. Distance between lead and following vehicles in experimental setup test.
Figure 12. Distance between lead and following vehicles in experimental setup test.
Computers 14 00084 g012
Figure 13. Velocity profile of lead and following vehicles in experimental setup test.
Figure 13. Velocity profile of lead and following vehicles in experimental setup test.
Computers 14 00084 g013
Table 1. Root Mean Square Error of distance between vehicles.
Table 1. Root Mean Square Error of distance between vehicles.
FDI AttacksSecure ControllerBaseline Controller
One-step function0.01212.0862
Two-step functions0.05152.0622
One-step and one-sinusoidal functions0.01271.7420
Table 2. Root Mean Square Error of FDI attack estimation.
Table 2. Root Mean Square Error of FDI attack estimation.
FDI AttacksRoot Mean Square Error
One-step function0.0056
Two-step functions0.4137
One-step and one-sinusoidal functions0.0098
Table 3. Root Mean Square Error of FDI attack estimation and distance between vehicles.
Table 3. Root Mean Square Error of FDI attack estimation and distance between vehicles.
PaperFDI Attack Estimation RMSEDistance RMSE
Baseline 1 Controller0.00970.0963
Proposed Controller0.00560.0120
Table 4. Root Mean Square Error of distance between fourth and fifth vehicles for different values of disturbance and time delay.
Table 4. Root Mean Square Error of distance between fourth and fifth vehicles for different values of disturbance and time delay.
DisturbanceCommunication Time DelayDistance RMSE Under Secure Controller
0.1 sin ( t / 8 ) 0.01 ( 2 sin ( t / 2 ) + 3 ) 0.0514
0.2 sin ( t / 8 ) 0.02 ( 2 sin ( t / 2 ) + 3 ) 0.0546
0.3 sin ( t / 8 ) 0.03 ( 2 sin ( t / 2 ) + 3 ) 0.0589
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bonab, P.A.; Sargolzaei, A. A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks. Computers 2025, 14, 84. https://doi.org/10.3390/computers14030084

AMA Style

Bonab PA, Sargolzaei A. A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks. Computers. 2025; 14(3):84. https://doi.org/10.3390/computers14030084

Chicago/Turabian Style

Bonab, Parisa Ansari, and Arman Sargolzaei. 2025. "A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks" Computers 14, no. 3: 84. https://doi.org/10.3390/computers14030084

APA Style

Bonab, P. A., & Sargolzaei, A. (2025). A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks. Computers, 14(3), 84. https://doi.org/10.3390/computers14030084

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop