
Resilient path‐following control of autonomous vehicles subject to intermittent denial‐of‐service attacks
Author(s) -
Wang Yulei,
Bian Ning,
Zhang Lin,
Huang Yanjun,
Chen Hong
Publication year - 2021
Publication title -
iet intelligent transport systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.579
H-Index - 45
eISSN - 1751-9578
pISSN - 1751-956X
DOI - 10.1049/itr2.12114
Subject(s) - denial of service attack , computer science , observer (physics) , cyber physical system , controller (irrigation) , linear matrix inequality , control theory (sociology) , control engineering , control (management) , engineering , mathematical optimization , artificial intelligence , physics , the internet , mathematics , quantum mechanics , world wide web , agronomy , biology , operating system
An autonomous vehicle (AV) is a cyber‐physical system (CPS) incorporating dynamics, perception sensors (e.g. camera and radar), embedded electronic control units (ECUs) and in‐vehicle networking (e.g. CAN, LIN and FlexRay).Achieving path‐following control of an AV to track a desired path is therefore a highly non‐linear task that is naturally vulnerable to denial‐of‐service (DoS) attacks. Considering that DoS attacks can inhibit the services of a control system by overwhelming the performance capabilities of the ECUs or the bus, this paper investigates the cyber‐physical system problem of path‐following control for AVs under intermittent DoS attacks. To solve this problem, we propose resilient observer‐based non‐linear control based on the triple‐step approach. The core ideas behind this method are the integrated design of the observer and feedback gains incorporating the DoS duration and the convex design of controller parameters by solving a set of linear matrix inequalities. The proposed control scheme guarantees that the closed‐loop system maintains input‐to‐stable stability, while the error signals theoretically converge to a small neighbourhood of the origin. The effectiveness of the proposed approach is confirmed by the simulation results obtained for a high‐fidelity veDYNA full‐vehicle model with different driving tests and DoS attacks.