ENGLISH
La vitrine de diffusion des publications et contributions des chercheurs de l'ÉTS
RECHERCHER

Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework

Téléchargements

Téléchargements par mois depuis la dernière année

Plus de statistiques...

Wei, Henglai, Zhang, Hui, Ai-Haddad, Kamal et Shi, Yang. 2024. « Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework ». Engineering.
(Sous presse)

[thumbnail of Al-Haddad-K-2024-28406.pdf]
Prévisualisation
PDF
Al-Haddad-K-2024-28406.pdf - Version acceptée
Licence d'utilisation : Creative Commons CC BY-NC-ND.

Télécharger (2MB) | Prévisualisation

Résumé

This study investigates resilient platoon control for constrained intelligent and connected vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model-predictive platooning control framework for such ICVs. This framework seamlessly integrates the predesigned optimal control with distributed model predictive control (DMPC) optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles. Notably, our strategy uses previously broadcasted information and a specialized convex set, termed the ‘‘resilience set”, to identify unreliable data. This approach significantly eases graph robustness prerequisites, requiring only an (F + 1)-robust graph, in contrast to the established mean sequence reduced algorithms, which require a minimum (2F + 1)-robust graph. Additionally, we introduce a verification algorithm to restore trust in vehicles under minor attacks, further reducing communication network robustness. Our analysis demonstrates the recursive feasibility of the DMPC optimization. Furthermore, the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs, while ensuring constraint compliance and cybersecurity. Simulation results verify the effectiveness of our theoretical findings.

Type de document: Article publié dans une revue, révisé par les pairs
Professeur:
Professeur
Al Haddad, Kamal
Affiliation: Génie électrique
Date de dépôt: 04 mars 2024 15:50
Dernière modification: 11 mars 2024 16:16
URI: https://espace2.etsmtl.ca/id/eprint/28406

Actions (Authentification requise)

Dernière vérification avant le dépôt Dernière vérification avant le dépôt