Robust distributed model predictive control of connected vehicle platoon against DoS attacks
Abstract
This paper investigates the robust distributed model predictive control (DMPC) of connected vehicle platoon (CVP) systems subject to denial-of-service (DoS) attacks. The main objective is to design a DMPC algorithm that enables the CVP system to achieve exponential tracking performance. First, a switched system model is proposed for the networked CVP system in the presence of DoS attacks. Then the sufficient conditions for the exponential stability of tracking the performance of the CVP control system under DoS attacks are obtained by constructing a specific Lyapunov function and using the topological matrix decoupling technique. In our paper, the DoS attack phenomenon is handled by introducing the frequency and duration parameters, and a quantitative relationship between the exponential decay rate of the CVP system and the DoS attacks parameters is established based on the conditions proposed in the system design, and the critical value of the DoS attack duration ratio is also derived. Finally, the effectiveness of the proposed algorithm is verified through a simulation of a CVP system consisting of one leading vehicle and three following vehicles.
Keywords
1. INTRODUCTION
In recent decades, the number of traffic congestions and traffic accidents has significantly increased due to the rapid growth in the number of vehicles. It has shown that by controlling the spacing among vehicles in connected vehicle platoons (CVPs), the air resistance of following vehicles during travel could be reduced, effectively reducing fuel consumption [1]. Moreover, by sharing the state information of surrounding vehicles in CVPs, the vehicles can be coordinated to achieve the desired trajectory and thus improve the efficiency and safety of road traffic [2,3]. As a result, the cooperative control of intelligent CVPs has received considerable attention.
Intelligent connected vehicles are typical complex cyber-physical systems (CPS) with deep integration of multiple systems, such as automotive systems, traffic rules, information systems, and communication networks. As intelligent connected vehicles combine various critical infrastructures through heterogeneous networks, cyber-attacks on intelligent connected vehicles are becoming more prominent due to the growing openness of networks [4,5]. Existing cyber-attacks can be broadly classified into denial-of-service (DoS) attacks [6–8], replay attacks [9], and deception attacks [10–12]. Among them, DoS attacks are the most common form of cyber-attacks and, therefore, receive much attention in current research [13]. When DoS attacks occur, many illegal request services are sent within a certain period, which causes the CPU and memory of the server to rise so that the system cannot handle the normal request services sent by legitimate users[14,15]. There have been some research results reported on DoS attacks. In Ref.[16], a scheme that can detect the occurrence of DoS attacks in real time was designed, and the impact of DoS attacks on CVP systems was evaluated. In Ref.[17], the finite-time stability of networked control systems in the presence of DoS attacks was investigated, and the number of data transmissions was reduced by using the event-triggered method. In Ref.[18], a resilient control strategy for CVP systems under DoS attacks was proposed and demonstrated to enable cooperative control of vehicles. In Ref.[19], the DoS attacks were considered as a continuous packet loss, and a resilient controller was proposed for CVPs under DoS attacks, and the effectiveness of the controller was demonstrated. In Ref.[20], a networked interconnection system under DoS attacks was studied, and sufficient conditions of the exponential stability for the system were obtained by using the average dwell time approach. In Ref.[21], a controller was designed for a CVP control system under DoS attacks using a switched system approach, and the feasibility of the results was verified by simulation and experimentation. The occurrence of DoS attacks in CVP control systems can block the data transmission in the communication channel, which can degrade the performance of CVPs and even lead to collisions among vehicles [22,23]. Thus, we will focus on the security control issues caused by DoS attacks in the CVP system in this paper. Although the above results are very effective in solving some typical cyber-attacks, they do not consider the problem of constraints such as the input and state. Thus, the above results cannot be applied to such CVP systems as those parameters of the connected vehicles are generally constrained.
The design of Model Predictive Control (MPC) algorithms has been extensively investigated in order to better solve the constraint problem in control[24]. Nowadays, the research on MPC can be mainly classified into centralized model predictive control [25] and distributed model predictive control (DMPC) [26,27]. Centralized model predictive control has good optimization capabilities but is usually computationally burdensome if it is used for large-scale systems. In recent years, the DMPC has received increasing attention as it is suitable to solve the large-scale system control problem due to its excellent control performance, ability to handle constraints, and flexible structure. In large-scale systems, such as CVPs, it is difficult to use centralized model predictive control because vehicles cannot receive global information from each other. Therefore, DMPC has been extensively investigated in the field of CVP control systems. In Ref.[26], a DMPC algorithm was proposed for an intelligent CVP system with nonlinear dynamics and unidirectional communication topology, which considers the constraint problem of the system while ensuring the asymptotic stability of the CVP system. In Ref.[27], a DMPC approach was used to solve the input and state constraint problem and finally to achieve the desired tracking problem for a multi-intelligent system. In Ref.[28], a dual-mode DMPC algorithm was proposed and demonstrated through simulation to significantly reduce the computational burden. Also, there are some studies on the DMPC of CVP systems under DoS attacks [29–31]. In Ref.[29], a secure DMPC control algorithm was proposed in order to make the CVP system eventually stable under DoS attacks, and the effectiveness of the algorithm was demonstrated by simulation. In Ref.[31], a DMPC algorithm based on a dynamic event-triggered method was proposed for CVP systems under DoS attacks, which reduces the amount of data computation by using the dynamic event-triggered method on the basis of ensuring the stability of the CVP system in the end. Although the above results can well solve the stabilization problem of the CVP system in the presence of DoS attacks, the issue of how the DoS attacks affect system performance has not been well investigated yet. Therefore, the motivation of this work is to study the security control problem of the CVP system under DoS attacks, and our attention is focused on the derivation of the quantitative relationship between system performance and DoS attacks.
Based on the above discussion, this work is concerned with the DMPC of CVP systems under DoS attacks. The main objective is to investigate how the DoS attacks affect the performance of the CVP system and obtain sufficient conditions to guarantee the exponential stability of the tracking error of the CVP system under DoS attacks. It is assumed that all communication channels of the CVP system are jammed when DoS attacks occur and then models the closed-loop CVP system under DoS attacks as a switched system. A robust DMPC algorithm is proposed to enable the CVP system to handle optimization problems with input constraints well while ensuring the exponential stability of the tracking error. In the part of the simulation, the effectiveness of our proposed algorithm is demonstrated through numerical simulations. The main contributions of this paper are summarized as follows.
(1) A robust DMPC algorithm is proposed to achieve resilient cooperative control of CVP systems under DoS attacks.
(2) Sufficient conditions for the exponential stability of the tracking error of the CVP system under DoS attacks are derived based on the switched system approach. A quantitative relationship between the exponential decay rate and the frequency and duration of DoS attacks is established. The critical value of the DoS attack duration ratio (DADR) is also derived.
Notations: In this paper,
2. PRELIMINARIES AND PROBLEM FORMULATION
This section includes four main parts: communication graph, vehicle model, DoS attacks, and problem description. The structure of a CVP control system is shown in Figure 1. The position, velocity, and acceleration of the vehicles are sampled at each sampling moment and are transmitted according to the pre-designed communication topology. The communication channel is blocked when DoS attacks occur.
2.1. Communication graph
Considering that there is one leading vehicle and
2.2. Vehicle model
The longitudinal dynamics model of a vehicle is nonlinear in practice. The vehicle model has been linearized in many articles by using feedback linearization techniques to simplify the analysis[33,34]. In this paper, it is assumed that the longitudinal dynamics of the
where
with
By discretizing systems Equations (1) and (2), we can obtain the following discrete-time systems[33]
where
2.3. DoS attacks
In this paper, it is assumed that all communication channels are blocked, and all following vehicles cannot receive any real-time data when DoS attacks occur. Define
Define
Then, two assumptions about the frequency and duration of DoS attacks are given.
Assumption 1 (DoS attacks frequency): There exist positive constants
for all
Assumption 2: For the duration of DoS attacks, there exist positive constants
for all
Remark 1: The behavior of DoS attacks has been studied in many articles [37–39]. However, in practical applications, it is difficult to determine the accurate statistical parameters of DoS attacks for controller design. Considering that the energy of attackers is limited, we model DoS attacks by the frequency and duration parameters under Assumption 1 and Assumption 2. Such a modeling approach can also be found in Ref.[37,40], which can capture a wide range of different types of DoS attacks. Therefore, Assumption 1 and Assumption 2 are physically meaningful.
Remark 2: There are two methods to control the system when DoS attacks occur. One sets the system control input to zero, and the other keeps the system input of the last value. When DoS attacks occur, the hold input method can be used to update the control input with past data in the buffer, but it can also cause the time delay phenomenon. It is worth noting that both of the above methods are applicable[41]. In our work, the zero-input method is used.
2.4. Problem description
To control the CVP system, the following control protocol is introduced [21]:
where
Define the tracking error as
where
Then the protocol Equation (5) can be written as
where
The main goal of this paper is to maintain the ideal spacing, speed, and acceleration between the following vehicle and the leading vehicle. So, the desired state equation of the
where
The actual state equation of the
Through Equation (7) and Equation (8), the tracking error of the
Let
Due to the fact that no data can be received by those vehicles when the DoS attack occurs, we now introduce a signal
Let
Define
Lemma 1[42]: Since the matrix
where
Definition 1[43]: If there exist constant
is true, then the system Equation (12) is said to be exponentially stable, and
3. MAIN RESULTS
In this section, we will analyze the exponential stability of the system Equation (12) with the designed controller Equation (5), and then the main results of the controller design based on the DMPC will be given. Before this, we construct the Lyapunov function for Equation (12) as
where
3.1. Stability analysis
The main theorems in this section are given as follows to demonstrate that system Equation (12) can be exponentially stable with the designed controller Equation (5). Define the total number of switches in the time interval
Theorem 1: Considering the parameters of DoS attacks as in Assumption 1 and Assumption 2. For the given positive scalars
hold, then the system (12) can be ensured to be exponentially stable with an exponential decay rate of
Proof: When
Then we have
Let
Thus, it is obtained that
Now left- and right-multiplying Equation (25) by
Considering the Lyapunov function Equation (15), Equation (26) can be written as
When
Obviously, Equation (28) can guarantee that
Similar to the derivation of Equation (27), Equation (29) can be written as
Thus, the conditions Equation (18) and Equation (19) can guarantee that
Considering the conditions Equation (20) and Equation (21), one has
According to Equation (31) and Equation (32) and by applying the iterative method to the time interval
The conditions Equation (16) and Equation (17) guarantee that
Let
where
Then it yields
From Equation (36) and Definition 1, the system (12) is exponentially stable with an exponential decay rate of
It follows from Theorem 1 that for given
With the help of Definition 1, the exponential decay rate
Remark 3: In the previous section, a quantitative relationship between DoS attack parameters and the exponential decay rate has been established. It can be seen that both the frequency and duration of DoS attacks have an impact on the exponential decay rate, which affects the performance of the system. For example, as the duration of DoS attacks increases, the exponential decay rate becomes larger.
3.2. Upper bound of DADR
As it is well known, if the total duration of a DoS attack is infinite, the system cannot be stable. Therefore, it is necessary to derive the upper bound of DARA for the system (12). To achieve this, we present the stability theorem as follows based on the DARA:
Theorem 2: For the given positive scalars
Proof: Similarly to the analysis in Theorem 1, we can obtain
Similarly to Equation (35), we can obtain
By substituting
3.3. Controller design
Based on Theorem 1, we now present the robust model predictive control algorithm. The state feedback control gain will be obtained by solving an optimization problem in the form of linear matrix inequalities (LMIs) at each sampling moment. The following theorem gives the design of the controller.
Theorem 3: Considering a CVP system consists of the plant Equation (12) and the controller Equation (5). Let
subject to
where
and the system (12) can be ensured to be exponentially stable with an exponential decay rate of
Proof: We aim to design a state feedback control law at each sampling time that minimizes an infinite horizon global objective function. First, we define the infinite horizon local objective function for the
where
Adding up the infinite horizon local objective function of all following vehicles as the global objective function, so the global objective function is
Left- and right-multiplying Equation (43) by
Left- and right-multiplying Equation (52) by
Then, it can be derived
where
where
Left- and right-multiplying Equation (56) by
which leads to
where
Let Equation (59) be an iterative summation from
In order to make the robust performance objective function finite, we define
By Schur complement, Equation (61) can be rewritten as
By substituting
The control input of any following vehicles in CVP control is constrained. For the
where
By using Schur complement, the condition Equation (44) can guarantee that Equation (63) holds.
Left- and right-multiplying Equation (45) by
By substituting
Left- and right-multiplying Equation (46) by
By substituting
Left- and right-multiplying Equation (47) by
By substituting
Left- and right-multiplying Equation (48) by
By substituting
With the help of Theorem 1, one can see that the hold of conditions Equation (45), Equation (46), Equation (47), Equation (48), Equation (16), and Equation (17) can guarantee that the system (12) is exponentially stable with an exponential decay rate of
SIMULATION
In this section, numerical simulations have been carried out using Matlab to illustrate the main results of this paper. Assuming that the CVP consists of one leading vehicle and three following vehicles and the communication topology is shown in Figure 2. We set the initial state of the leading vehicle to
The state and control weighting matrices
So
So there must exist a constant
The sequence of DoS attacks is shown in Figure 3, where 0 indicates the normal case without DoS attacks and 1 indicates the occurrence of DoS attacks.
The position trajectories and position error trajectories are shown in Figure 4 and Figure 5, respectively, where
From the simulation results, it is evident that an increase in the DADR results in slower convergence of the system state error. Figure 8 shows the control input trajectories for the three following vehicles, and we can see that the control input satisfies the condition of
CONCLUSION
A robust DMPC problem for a CVP system in the presence of DoS attacks has been investigated in this paper. A quantitative relationship has been established between the DoS attack parameters and the exponential decay rate. A distributed state feedback controller was designed by using the DMPC method to enable all following vehicles to track the velocity and acceleration of the leading vehicle exponentially and maintain the desired vehicle spacing. Finally, a CVP system consisting of one leading vehicle and three following vehicles was simulated on Matlab to demonstrate the effectiveness of our proposed control algorithm. However, the current work does not account for the presence of time delays and disturbances in the communication process. In future endeavors, attention will be focused on the distributed control of CVP systems with hybrid attacks and time delays.
DECLARATIONS
Authors' contributions
Made substantial contributions to the research, idea generation, algorithm design, and simulation and wrote and edited the original draft: Zeng H
Performed critical review, commentary, and revision and provided administrative, technical, and material support: Ye Z, Zang D, and Lu Q
Availability of data and materials
Not applicable.
Financial support and sponsorship
None.
Conflicts of interest
All authors declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2023.
REFERENCES
1. Alam AA, Gattami A, Johansson KH. An experimental study on the fuel reduction potential of heavy duty vehicle platooning. In: 13th International IEEE Conference on Intelligent Transportation Systems; 2010. p. 306-11.
2. Vegamoor VK, Darbha S, Rajagopal KR. A review of automatic vehicle following systems. J Indian Inst Sci 2019;99:567-87.
3. Tsugawa S, Jeschke S, Shladover SE. A review of truck platooning projects for energy savings. IEEE Trans Intell Veh 2016;1:68-77.
4. Hodge C, Hauck K, Gupta S, Bennett JC. Vehicle cybersecurity threats and mitigation approaches. tech. rep., National Renewable Energy Lab. (NREL), Golden, CO (United States), 2019.
5. Parkinson S, Ward P, Wilson K, Miller J. Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans Intell Transport Syst 2017;18:2898-915.
6. Chen P, Zhang D, Yu L, Yan H. Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks. IEEE Trans Syst Man Cybern, Syst 2022;52:6246-58.
7. Zhang D, Ye Z, Feng G, Li H. Intelligent event-based fuzzy dynamic positioning control of nonlinear unmanned marine vehicles under dos attack. IEEE Trans Cybern 2022;52:13486-99.
8. Zhao N, Zhao X, Chen M, Zong G, Zhang H. Resilient distributed event-triggered platooning control of connected vehicles under denial-of-service attacks. IEEE Trans Intell Transport Syst 2023;24:6191-202.
9. Merco R, Biron AB, Pisu P. Replay attack detection in a platoon of connected vehicles with cooperative adaptive cruise control. In: 2018 Annual American Control Conference (ACC); 2018. p. 5582-7.
10. Ding D, Han Q, Xiang Y, Ge X, Zhang X. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018;275:1674-83.
11. Ju Z, Zhang H, Tan Y. Distributed deception attack detection in platoon-based connected vehicle systems. IEEE Trans Veh Technol 2020;69:4609-20.
12. Naderi E, Asrari A. Integrated power and transportation systems targeted by false data injection cyberattacks in a smart distribution network. Electric Transportation Systems in Smart Power Grids Boca Raton: CRC Press; 2022. p. 447-72.
13. Deng C, Zhang D, Feng G. Resilient practical cooperative output regulation for mass with unknown switching exosystem dynamics under dos attacks. Automatica 2022;139:110172.
14. Yang H, Ju S, Xia Y, Zhang J. Predictive cloud control for networked multiagent systems with quantized signals under dos attacks. IEEE Trans Syst Man Cybern, Syst 2021;51:1345-53.
15. Zhang D, Feng G. A new switched system approach to leader-follower consensus of heterogeneous linear multiagent systems with dos attack. EEE Trans Syst Man Cybern, Syst 2021;51:1258-66.
16. Abdollahi Biron Z, Dey S, Pisu P. Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Trans Intell Transport Syst 2018;19:3893-902.
17. Doostmohammadian M, Meskin N. Finite-time stability under denial of service. IEEE Syst J 2021;15:1048-55.
18. Xiao S, Ge X, Han QL, Cao Z, Zhang Y, Wang H. Resilient distributed event-triggered control of vehicle platooning under dos attacks. IFAC-PapersOnLine 2020;53:1807-12.
19. Merco R, Ferrante F, Pisu P. A hybrid controller for dos-resilient string-stable vehicle platoons. IEEE Trans Intell Transport Syst 2021;22:1697-707.
20. Miao KL, Zhu JW, Zhang WA, Distributed guaranteed cost control of networked interconnected systems under denial-of-service attacks: a switched system approach. In: 2018 33rd Youth Academic Annual Conference of Chinese Association of Automation (YAC); 2018. p. 911-5.
21. Zhang D, Shen Y, Zhou S, Dong X, Yu L. Distributed secure platoon control of connected vehicles subject to dos attack: theory and application. IIEEE Trans Syst Man Cybern, Syst 2021;51:7269-78.
22. Sakiz F, Sen S. A survey of attacks and detection mechanisms on intelligent transportation systems: vanets and iov. Ad Hoc Networks 2017;61:33-50.
23. Ju Z, Zhang H, Li X, Chen X, Han J, Yang M. A survey on attack detection and resilience for connected and automated vehicles: from vehicle dynamics and control perspective. IEEE Trans Intell Veh 2022;7:815-37.
24. Yuan C, Gu Y, Zeng W, Stegagno P. Switching model predictive control of switched linear systems with average dwell time. In: 2020 American Control Conference (ACC); 2020. p. 2888-93.
25. Yu K, Yang H, Tan X, et al. Model predictive control for hybrid electric vehicle platooning using slope information. IEEE Trans Intell Transport Syst 2016;17:1894-909.
26. Zheng Y, Li SE, Li K, Borrelli F, Hedrick JK. Distributed model predictive control for heterogeneous vehicle platoons under unidirectional topologies. IEEE Trans Contr Syst Technol 2017;25:899-910.
27. Ding B, Ge L, Pan H, Wang P. Distributed mpc for tracking and formation of homogeneous multi-agent system with time-varying communication topology. Asian Journal of Control 2016;18:1030-41.
28. Yan M, Ma W, Zuo L, Yang P. Dual-mode distributed model predictive control for platooning of connected vehicles with nonlinear dynamics. Int J Control Autom Syst 2019;17:3091-101.
29. Basiri MH, Azad NL, Fischmeister S. Attack resilient heterogeneous vehicle platooning using secure distributed nonlinear model predictive control. In: 2020 28th Mediterranean Conference on Control and Automation (MED); 2020. p. 307-12.
30. Chen J, Sun Z, Zhang H. Event-triggering in distributed mpc of decoupled nonlinear systems against dos attacks. In: 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS); 2022. p. 1-6.
31. Chen J, Zhang H, Yin G. Distributed dynamic event-triggered secure model predictive control of vehicle platoon against dos attacks. IEEE Trans Veh Technol 2023;72:2863-77.
32. Olfati-saber R, Fax JA, Murray RM. Consensus and cooperation in networked multi-agent systems. Proc IEEE 2007;95:215-33.
33. Feng S, Sun H, Zhang Y, Zheng J, Liu HX, Li L. Tube-based discrete controller design for vehicle platoons subject to disturbances and saturation constraints. IEEE Trans Contr Syst Technol 2020;28:1066-73.
34. Halder K, Montanaro U, Gillam L, Dianati M, Oxtoby D, Mouzakitis A, Fallah S. Distributed controller design for vehicle platooning under packet drop scenario. In: 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC); 2020. p. 1-8.
35. Huang D, Li S, Zhang Z, Liu Y, Mi B. Design and analysis of longitudinal controller for the platoon with time-varying delay. IEEE Trans Intell Transport Syst 2022;23:23628-39.
36. Zheng Y, Eben Li S, Wang J, Cao D, Li K. Stability and scalability of homogeneous vehicular platoon: Study on the influence of information flow topologies. IEEE Trans Intell Transport Syst 2016;17:14-26.
37. Wu C, Wu L, Liu J, Jiang Z. Active defense-based resilient sliding mode control under denial-of-service attacks. IEEE Trans Inform Forensic Secur 2020;15:237-49.
38. Ye Z, Zhang D, Wu Z. Adaptive event-based tracking control of unmanned marine vehicle systems with dos attack. J Franklin Inst 2021;358:1915-39.
39. Zhang D, Liu L, Feng G. Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack. IEEE Trans Cybern 019;49: 1501-11.
40. De Persis C, Tesi P. Input-to-state stabilizing control under denial-of-service. IEEE Trans Automat Contr 2015;60:2930-44.
41. Peng C, Fei M, Tian E, Guan Y. On hold or drop out-of-order packets in networked control systems. Inform Sciences 2014;268:436-46.
42. Zhang D, Xu Z, Karimi HR, Wang Q, Yu L. Distributed
Cite This Article
How to Cite
Zeng, H.; Ye Z.; Zhang D.; Lu Q. Robust distributed model predictive control of connected vehicle platoon against DoS attacks. Intell. Robot. 2023, 3, 288-305. http://dx.doi.org/10.20517/ir.2023.19
Download Citation
Export Citation File:
Type of Import
Tips on Downloading Citation
Citation Manager File Format
Type of Import
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.