In this article,a systematic assessment of cyber-physical security is developed for the lane-keeping control(LKC)system of autonomous vehicles(AVs),which has not been attempted before.A novel impact analysis methodolo...In this article,a systematic assessment of cyber-physical security is developed for the lane-keeping control(LKC)system of autonomous vehicles(AVs),which has not been attempted before.A novel impact analysis methodology for typical cyber-attacks is proposed with new evaluation metrics from the viewpoint of safety and performance and innovative index-based resilience and security criteria.Specifically,a security criterion is investigated by tracking performance,comfort and vehicle stability to evaluate the safety and security of the vehicle LKC system.Hardware-in-the-Loop(HiL)experimental results show that the proposed evaluation metrics are effective in analyzing the impact of cyberattacks on the commercial LKC system of Dongfeng Motor comprehensively.Finally,the conclusion provides guidelines for attack detection,diagnosis,and countermeasures for AVs.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants No.U1964201,62373281 and 62333015part by Shanghai Municipal Science and Technology Commission No.23ZR1467700.
文摘In this article,a systematic assessment of cyber-physical security is developed for the lane-keeping control(LKC)system of autonomous vehicles(AVs),which has not been attempted before.A novel impact analysis methodology for typical cyber-attacks is proposed with new evaluation metrics from the viewpoint of safety and performance and innovative index-based resilience and security criteria.Specifically,a security criterion is investigated by tracking performance,comfort and vehicle stability to evaluate the safety and security of the vehicle LKC system.Hardware-in-the-Loop(HiL)experimental results show that the proposed evaluation metrics are effective in analyzing the impact of cyberattacks on the commercial LKC system of Dongfeng Motor comprehensively.Finally,the conclusion provides guidelines for attack detection,diagnosis,and countermeasures for AVs.