Secure Cooperative Path Following of Autonomous Surface Vehicles Under Cyber and Physical Attacks

被引:24
|
作者
Liu, Zhao-Qing [1 ]
Ge, Xiaohua [1 ]
Han, Qing-Long [1 ]
Wang, Yu-Long [2 ,3 ]
Zhang, Xian-Ming [1 ]
机构
[1] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Melbourne, Vic 3122, Australia
[2] Shanghai Univ, Sch Mech Engn & Automat, Shanghai 200444, Peoples R China
[3] Shanghai Key Lab Power Stn Automat Technol, Shanghai 200444, Peoples R China
来源
基金
美国国家科学基金会;
关键词
Autonomous surface vehicles; cooperative path following; secure control; physical attacks; cyber attacks; CO-DESIGN; TRACKING; VESSELS;
D O I
10.1109/TIV.2023.3270266
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is concerned with the networked cooperative path following (CPF) problem for multiple autonomous surface vehicles (ASVs) subject to simultaneous cyber and physical attacks. First, to compensate the adverse effects of the physical-attack-induced bias injections, an extended state observer is designed to provide real-time estimates of the unmeasured velocities and unknown nonlinear terms. Next, to identify and handle various cyber attacks, a novel secure data transmission mechanism, featuring a secure transmitter and a secure receiver, is developed for each ASV. Then, a secure CPF control scheme, consisting of a networked cooperative kinematic control law and a networked kinetic control law, is presented. Furthermore, the observer error dynamics and networked CPF error dynamics are derived to account for the simultaneous network-induced delays, packet dropouts, physical attacks, and cyber attacks. The proposed control scheme is capable to preserve satisfactory secure tracking performance of the resulting CPF control system under a desired reference path even in the presence of external environmental disturbances, delays, packet dropouts, and malicious attacks. Finally, several case studies are provided to substantiate the effectiveness of the secure CPF control scheme.
引用
收藏
页码:3680 / 3691
页数:12
相关论文
共 50 条
  • [21] Attack Parameter Dependent H∞ Path Following Control Design for Autonomous Vehicles under Periodic DoS Attacks
    Yu, Wenxi
    Hu, Songlin
    Chen, Xiaoli
    Ma, Yong
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 5475 - 5480
  • [22] Adaptive fixed-time path following cooperative control for autonomous surface vehicles based on path-dependent constraints
    Guo, Qiang
    Zhang, Xianku
    Ma, Daocheng
    APPLIED OCEAN RESEARCH, 2024, 142
  • [23] Event-triggered Cooperative Path Following of Multiple Autonomous Underwater Vehicles
    Wang H.-L.
    Chai Y.-X.
    Wang D.
    Liu L.
    Wang A.-Q.
    Peng Z.-H.
    Zidonghua Xuebao/Acta Automatica Sinica, 2024, 50 (05): : 1024 - 1034
  • [24] Secure Correct Control for Cyber-Physical Systems under Multiple Stochastic Physical Attacks
    Dong, Lewei
    Xu, Huiling
    PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 3824 - 3829
  • [25] Event-Triggered Cooperative Path Following of Autonomous Surface Vehicles Over Wireless Network With Experiment Results
    Lv, Mingao
    Peng, Zhouhua
    Wang, Dan
    Han, Qing-Long
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022, 69 (11) : 11479 - 11489
  • [26] Event-Triggered Cooperative Path Following of Autonomous Surface Vehicles Over Wireless Network With Experiment Results
    Lv, Mingao
    Peng, Zhouhua
    Wang, Dan
    Han, Qing-Long
    AMERICAN JOURNAL OF CLINICAL NUTRITION, 2021, : 11479 - 11489
  • [27] Globally Stable Adaptive Dynamic Surface Control for Cooperative Path Following of Multiple Underactuated Autonomous Underwater Vehicles
    Wang, Hao
    Li, Yiping
    Liu, Kaizhou
    ASIAN JOURNAL OF CONTROL, 2018, 20 (03) : 1204 - 1220
  • [28] Path following controller for autonomous vehicles
    Domina, Adam
    Tihanyi, Viktor
    2019 8TH IEEE INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (IIEEE CCVE), 2019,
  • [29] Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles
    Panda, Sakshyam
    Panaousis, Emmanouil
    Loukas, George
    Kentrotis, Konstantinos
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [30] Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles
    Malik, Shahida
    Sun, Weiqing
    2020 INTERNATIONAL CONFERENCE ON CONNECTED AND AUTONOMOUS DRIVING (METROCAD 2020), 2020, : 62 - 70