Secure Cooperative Path Following of Autonomous Surface Vehicles Under Cyber and Physical Attacks

被引:24
|
作者
Liu, Zhao-Qing [1 ]
Ge, Xiaohua [1 ]
Han, Qing-Long [1 ]
Wang, Yu-Long [2 ,3 ]
Zhang, Xian-Ming [1 ]
机构
[1] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Melbourne, Vic 3122, Australia
[2] Shanghai Univ, Sch Mech Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Key Lab Power Stn Automat Technol, Shanghai 200444, Peoples R China
来源
基金
美国国家科学基金会;
关键词
Autonomous surface vehicles; cooperative path following; secure control; physical attacks; cyber attacks; CO-DESIGN; TRACKING; VESSELS;
D O I
10.1109/TIV.2023.3270266
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the networked cooperative path following (CPF) problem for multiple autonomous surface vehicles (ASVs) subject to simultaneous cyber and physical attacks. First, to compensate the adverse effects of the physical-attack-induced bias injections, an extended state observer is designed to provide real-time estimates of the unmeasured velocities and unknown nonlinear terms. Next, to identify and handle various cyber attacks, a novel secure data transmission mechanism, featuring a secure transmitter and a secure receiver, is developed for each ASV. Then, a secure CPF control scheme, consisting of a networked cooperative kinematic control law and a networked kinetic control law, is presented. Furthermore, the observer error dynamics and networked CPF error dynamics are derived to account for the simultaneous network-induced delays, packet dropouts, physical attacks, and cyber attacks. The proposed control scheme is capable to preserve satisfactory secure tracking performance of the resulting CPF control system under a desired reference path even in the presence of external environmental disturbances, delays, packet dropouts, and malicious attacks. Finally, several case studies are provided to substantiate the effectiveness of the secure CPF control scheme.
引用
收藏
页码:3680 / 3691
页数:12
相关论文
共 50 条
  • [1] Secure Pose Estimation for Autonomous Vehicles under Cyber Attacks
    Liu, Qipeng
    Mo, Yilin
    Mo, Xiaoyu
    Lv, Chen
    Mihankhah, Ehsan
    Wang, Danwei
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1583 - 1588
  • [2] Cyber-Physical System-Based Path Tracking Control of Autonomous Vehicles Under Cyber-Attacks
    Guo, Jinghua
    Li, Lubin
    Wang, Jingyao
    Li, Keqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6624 - 6635
  • [3] Secure Event-Triggered Sliding Control for Path Following of Autonomous Vehicles Under Sensor and Actuator Attacks
    Sun, Hong-Tao
    Peng, Chen
    Ge, Xiaohua
    Chen, Zhi
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (01): : 981 - 992
  • [4] LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks
    Yang, Jiachen
    Zhang, Jipeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 87 - 100
  • [5] Secure platooning control of automated vehicles under cyber attacks
    Mousavinejad, Eman
    Vlacic, Ljubo
    ISA TRANSACTIONS, 2022, 127 : 229 - 238
  • [6] Attack parameter dependent resilient H. path-following control design for autonomous vehicles under cyber attacks
    Hu, Songlin
    Yu, Wenxi
    Yang, Jinghui
    Chen, Xiaoli
    Xie, Xiangpeng
    Ma, Yong
    CONTROL ENGINEERING PRACTICE, 2023, 135
  • [7] Secure Path Following Control of Autonomous Vehicles Under Actuator Attacks Using Fuzzy Terminal Sliding Mode Control Approach
    Xu, Lihong
    Wang, Chen
    Sun, Hong-Tao
    Shen, Yitao
    IEEE ACCESS, 2024, 12 : 126652 - 126667
  • [8] Parallel Path Following of Under-Actuated Cyber-Physical Autonomous Surface Vehicles Based on Meta-Learning Extended State Observer
    Xu, Jiaxue
    Xia, Fengbei
    Gu, Nan
    Li, Yongming
    Han, Bing
    Fu, Mingyu
    Peng, Zhouhua
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (11) : 16041 - 16050
  • [9] Cooperative Path Following Ring-Networked Under-Actuated Autonomous Surface Vehicles: Algorithms and Experimental Results
    Liu, Lu
    Wang, Dan
    Peng, Zhouhua
    Li, Tieshan
    Chen, C. L. Philip
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (04) : 1519 - 1529
  • [10] A survey on secure state estimation of cyber-physical systems under cyber attacks
    Yang G.-H.
    Lu A.-Y.
    An L.-W.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (08): : 2093 - 2105