Secure Estimation and Attack Isolation for Connected and Automated Driving in the Presence of Malicious Vehicles
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- Connected and Automated Vehicles (CAVs) rely on accurate position and vehicle kinematics information for driving tasks
- Malicious vehicles can send false sensor information, leading to traffic disruptions or loss of human lives
- Authors propose using cloud-computing to enhance resilience against malicious vehicles
- Vehicles share local sensor information in the cloud to create redundancy
- Sensor fusion algorithm implemented in the cloud aims to provide robust state estimation of all vehicles
- Algorithm identifies and isolates malicious vehicles by combining data from multiple sources
- Numerical examples demonstrate successful detection and isolation of malicious vehicles while maintaining accurate state estimation for other vehicles
- Research presents a novel solution for enhancing security and reliability of CAVs through cloud-computing and information redundancy.
Authors: Tianci Yang, Chen Lv
Abstract: Connected and Automated Vehicles (CAVs) rely on the correctness of position and other vehicle kinematics information to fulfill various driving tasks such as vehicle following, lane change, and collision avoidance. However, a malicious vehicle may send false sensor information to the other vehicles intentionally or unintentionally, which may cause traffic inconvenience or loss of human lives. Here, we take the advantage of cloud-computing and increase the resilience of CAVs to malicious vehicles by assuming each vehicle shares its local sensor information with other vehicles to create information redundancy on the cloud side. We exploit this redundancy and propose a sensor fusion algorithm for the cloud, capable of providing a robust state estimation of all vehicles in the cloud under the condition that the number of malicious information is sufficiently small. Using the proposed estimator, we provide an algorithm for isolating malicious vehicles. We use numerical examples to illustrate the effectiveness of our methods.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.
⚠The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.