Special Issue on Secure Control Systems for Connected and Automated Vehicles (CAVs) Subject to System Faults and/or Cyber Attacks
Connected and Automated Vehicles (CAVs) have been attracting vigorous attention recurring to the rapid developments of the sensing technology, computing capacity, networking and communication technologies. CAVs rely on intra-vehicle sensors and inter-vehicle communication to operate effectively. Reliable onboard sensors and expedite communication techniques are essential to realize the measurement/sensing information sharing and hence the overall performance and security optimization in CAVs. However, multiple miscellaneous sensors may easily lead to failures or degradations, especially advanced communication features are vulnerable to attacks. As a typical type of cyber–physical system, CAVs suffer from cyber attacks and the cyber security issues are critical due to the severe consequences (collisions/crashes) during autonomous driving, which could be caused by attacks, as an attacker can manipulate the sensing/communication process or even physically control the CAVs.
To this end, this special issue aims at discussing emerging fault-tolerant control and attack-resilient control methodologies for CAVs to deal with system failures and/or cyber-attacks. Such control methodologies are of great practical significance when the autonomous driving of CAVs is actually achieved on road in the V2X era. The goal of this issue is also to identify respective challenges, research needs, and to encourage cross-disciplinary collaborations related to the design of secure control systems for CAVs. Topics to be discussed include (but are not limited to) the following:
- Fault diagnosis, detection and estimation for sensor, actuator, network, and communication
- Fault-tolerant control (FTC) for CAVs subject to the following system faults:
- Sensor (e.g., LIDAR, radar, camera, GPS, IMU, etc.) failures, degradations or sensing imperfection (error, noise, drift, inaccuracies, and discrete data, etc.) and actuator failures
- Network/communication failure/imperfection, packet drop, delay, sampled data, quantization effect
- Modeling, detection and estimation of cyber attacks for CAVs
- Attack-resilient control for CAVs subject to the following cyber-attacks:
- Data jamming attacks, denial-of-service (DoS) attacks, deception attacks
- False-data injection (FDI), sensor tampering, replay attack
- Network control systems, event-trigger control for CAVs
- Machine learning methodologies for secure control system design of CAVs
Deadline to submit manuscript: December 31, 2021
Please submit your article at www.editorialmanager.com/saeconnautomveh/and include a submission note in Editorial Manager to indicate that it is for this special issue. For questions about authoring an SAE Journal article, view author instructions and guidelines.
For more information, please contact the Guest Editors:
Assistant Professor, University of Alaska Fairbanks, Fairbanks, USA
Associate Professor, Université Polytechnique des Hauts-de-France, Valenciennes, France.
Associate Professor, Beijing Institute of Technology, Beijing, China
Director, Engineering at Qualcomm Technologies Inc., Boxborough, USA
Zoleikha Abdollahi Biron
Assistant Professor, University of Florida, Gainesville, USA
Assistant Professor, Michigan State University, East Lansing, USA