Tele-operation Control of a Vehicle During a Cyber Attack

سال انتشار: 1405
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 10

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-14-1_009

تاریخ نمایه سازی: 15 بهمن 1404

چکیده مقاله:

kground and Objectives: While intelligent vehicle teleoperation systems prioritize operational performance, their vulnerability to cyber-physical attacks—such as sensor spoofing and latency exploitation—remains a critical unsolved challenge. Existing solutions predominantly focus on attack prevention, leaving systems defenseless during active attacks that threaten stability and collision avoidance. This study addresses the unmet need for real-time resilience by introducing an adaptive control framework that dynamically mitigates attack-induced disruptions without relying on predefined vehicle models. Methods: We propose a novel adaptive LQR-based optimal controller that compensates for multi-vector attacks (e.g., false data injection, GPS spoofing) by estimating disturbed signals in real time. Unlike static models, our data-driven approach eliminates dependency on fixed dynamics. A rigorous case study evaluates performance under simultaneous command injection and DoS attacks, measuring trajectory deviation and recovery time. Results: The framework achieves ≤۱۲% trajectory deviation (۳۵% improvement over benchmarks) and ۴۰% faster recovery from destabilizing attacks. It outperforms conventional controllers by adapting to model uncertainties and multi-vector threats without prior knowledge of system parameters. Conclusion: This work pioneers a model-agnostic, real-time resilience paradigm for teleoperated vehicles, merging human oversight with autonomous adaptability. Beyond immediate safety gains, it underscores the necessity of embedding cybersecurity-aware control mechanisms in connected vehicles, shifting from passive prevention to active threat mitigation.

نویسندگان

Marziyeh Barootkar

Department of Computer Engineering, Technical and Vocational University (TVU), Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • K. B. Adedeji, Y. Hamam, "Cyber-physical systems for water supply ...
  • H. Zhang, B. Liu, H. Wu, "Smart grid cyber-physical attack ...
  • W. Duo, M. Zhou, A. Abusorrah, "A survey of cyber ...
  • S. Kim, K. J. Park, C. Lu, "A survey on ...
  • A. Hassanzadeh et al., "A review of cybersecurity incidents in ...
  • N. Ding, "Teleoperation system for autonomous vehicles," Doctoral Dissertations, Virginia ...
  • N. Ding, A. Eskandarian, "Real-time teleoperation control system for autonomous ...
  • G. Sharma, R. Rajamani, "Teleoperation enhancement for autonomous vehicles using ...
  • D. Zhang, C. Lv, T. Yang, P. Hang, "Cyberattack detection ...
  • T. Guan, Y. Han, N. Kang, N. Tang, X. Chen, ...
  • F. W. Alsaade, M. H. Al-Adhaileh, "Cyber attack detection for ...
  • M. Almehdhar et al., "Deep learning in the fast lane: ...
  • S. Ghosh, "Cyber-physical security analysis of teleoperated autonomous road vehicles," ...
  • T. Zhang, "Toward automated vehicle teleoperation: Vision, opportunities, and challenges," ...
  • K. Kuru, "Conceptualisation of human-on-the-loop haptic teleoperation with fully autonomous ...
  • F. J. Jiang, J. Mårtensson, K. H. Johansson, "Safe teleoperation ...
  • S. B. Kamtam, Q. Lu, F. Bouali, O. C. Haas, ...
  • S. Q. Zulqarnain, S. Lee, "Selecting remote driving locations for ...
  • L. Nagy, L. Márton, "Cyberattack detection and compensation for distant-controlled ...
  • M. M. Hamdan, M. S. Mahmoud, "Control of teleoperation systems ...
  • H. Kwon, H. Kawase, H. A. Nieves-Vazquez, K. Kogiso, J. ...
  • V. Hassani, N. Crasta, A. M. Pascoal, "Cyber security issues ...
  • M. Marvi, A. Arfeen, R. Uddin, "An augmented K‐means clustering ...
  • K. Bartos, M. Rehak, "IFS: Intelligent flow sampling for network ...
  • C. He, X. Xu, H. Jiang, J. Jiang, T. Chen, ...
  • N. I. Chowdhury, M. A. Hoque, R. Hasan, "An overview ...
  • L. Khoshnevisan, X. Liu, "A secure adaptive resilient neural network-based ...
  • A. Wegner, J. Graham, E. Ribble, "A new approach to ...
  • H. Bayanifar, H. Kühnle, "Enhancing dependability and security of cyber-physical ...
  • Y. Jiang, Z. P. Jiang, "Computational adaptive optimal control for ...
  • X. Huang, D. Zhai, J. Dong, "Adaptive integral sliding‐mode control ...
  • L. Xu, W. Zhuang, G. Yin, G. Li, C. Bian, ...
  • نمایش کامل مراجع