Secure Estimation and Attack Isolation for Connected and Automated Driving in the Presence of Malicious Vehicles

AI-generated keywords: Connected Automated Vehicles (CAVs)

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Connected and Automated Vehicles (CAVs) rely on accurate position and vehicle kinematics information for driving tasks
  • Malicious vehicles can send false sensor information, leading to traffic disruptions or loss of human lives
  • Authors propose using cloud-computing to enhance resilience against malicious vehicles
  • Vehicles share local sensor information in the cloud to create redundancy
  • Sensor fusion algorithm implemented in the cloud aims to provide robust state estimation of all vehicles
  • Algorithm identifies and isolates malicious vehicles by combining data from multiple sources
  • Numerical examples demonstrate successful detection and isolation of malicious vehicles while maintaining accurate state estimation for other vehicles
  • Research presents a novel solution for enhancing security and reliability of CAVs through cloud-computing and information redundancy.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Tianci Yang, Chen Lv

Abstract: Connected and Automated Vehicles (CAVs) rely on the correctness of position and other vehicle kinematics information to fulfill various driving tasks such as vehicle following, lane change, and collision avoidance. However, a malicious vehicle may send false sensor information to the other vehicles intentionally or unintentionally, which may cause traffic inconvenience or loss of human lives. Here, we take the advantage of cloud-computing and increase the resilience of CAVs to malicious vehicles by assuming each vehicle shares its local sensor information with other vehicles to create information redundancy on the cloud side. We exploit this redundancy and propose a sensor fusion algorithm for the cloud, capable of providing a robust state estimation of all vehicles in the cloud under the condition that the number of malicious information is sufficiently small. Using the proposed estimator, we provide an algorithm for isolating malicious vehicles. We use numerical examples to illustrate the effectiveness of our methods.

Submitted to arXiv on 01 Mar. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2103.00878v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

Connected and Automated Vehicles (CAVs) rely on accurate position and vehicle kinematics information to perform various driving tasks, including vehicle following, lane change, and collision avoidance. However, there is a risk of malicious vehicles intentionally or unintentionally sending false sensor information to other vehicles, which can lead to traffic disruptions or even loss of human lives. To address this issue, the authors propose leveraging cloud-computing to enhance the resilience of CAVs against malicious vehicles. The idea is for each vehicle to share its local sensor information with other vehicles, creating redundancy in the cloud. This redundancy is then exploited through a sensor fusion algorithm implemented in the cloud. The proposed sensor fusion algorithm aims to provide a robust state estimation of all vehicles in the cloud, assuming that the number of malicious information is relatively small. By combining data from multiple sources and cross-referencing them, the algorithm can identify and isolate malicious vehicles. To demonstrate the effectiveness of their approach, numerical examples are provided which showcase how the proposed estimator successfully detects and isolates malicious vehicles while maintaining accurate state estimation for all other vehicles. Overall, this research presents a novel solution for enhancing the security and reliability of CAVs by leveraging cloud-computing and information redundancy. By effectively detecting and isolating malicious vehicles, this approach has significant potential in ensuring safer and more efficient autonomous driving systems.
Created on 16 Aug. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.