首页> 外文会议>Annual American Control Conference >PDE-based Analysis of Automotive Cyber-Attacks in Imperfect Information Scenarios
【24h】

PDE-based Analysis of Automotive Cyber-Attacks in Imperfect Information Scenarios

机译:基于PDE的Imperfect信息场景的汽车网络攻击分析

获取原文

摘要

This paper considers a class of cyber-attacks wherein an attacker has the ability to hack into a subset of vehicles driving on a highway, and inject subtle velocity changes in them. By performing such velocity changes, these vehicles (referred to as malicious vehicles) are able to manipulate the velocity/density profile of the non-malicious (normal) vehicles. The malicious and normal vehicles are modeled using a system of Partial Differential Equations (PDEs). A control system is demonstrated, using which, the malicious vehicles are able to modulate the velocity/density profile of the normal vehicles, so as to track a reference profile, chosen by the malicious vehicles. The effects of imperfection in information available to the attacker is considered, and it is seen that if the level of imperfection exceeds a threshold, then the attacker's intent can be foiled. Simulation results are presented.
机译:本文考虑了一类网络攻击,其中攻击者能够能够破解在高速公路上行驶的车辆的子集,并在它们中注入微妙的速度变化。 通过执行这种速度变化,这些车辆(称为恶意车辆)能够操纵非恶意(普通)车辆的速度/密度曲线。 使用部分微分方程(PDE)的系统建模恶意和正常车辆。 对控制系统进行说明,使用该控制系统,使用该控制系统,恶意车辆能够调制正常车辆的速度/密度曲线,以便跟踪由恶意车辆选择的参考曲线。 考虑了攻击者可用信息中不完美的影响,并且可以看出,如果缺陷水平超过阈值,则攻击者的意图可以挫败。 提出了仿真结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号