References
- Al Maruf, A., Niu, L., Clark, A., Mertoguno, J.S., Poovendran, R. (2023) A timing-based framework for designing resilient cyber-physical systems under safety constraint. ACM Transactions on Cyber-Physical Systems, 7(3), 1-25. DOI:10.1145/3594638.
- Ali, M., Kaddoum, G., Li, W.T., Yuen, C., Tariq, M., Poor, H.V. (2023) A smart digital twin enabled security framework for vehicle-to-grid cyber-physical systems. IEEE Transactions on Information Forensics and Security, 18, 5258 – 5271. DOI: 10.1109/TIFS.2023.3305916.
- Amin, A.A., and Hasan, K.M. (2019) A review of fault tolerant control systems: advancements and applications. Measurement, 143, 58–68. DOI: 10.1016/j.measurement.2019.04.083.
- Baheti, R. and Gill, H. (2011) Cyber-physical systems. The Impact of Control Technology, 12(1), 161-166. Available at: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=ae1154337cdb44b69c1efbf3d9d9b52d76732be2.
- Ding, D., Han, Q.L., Xiang, Y., Ge, X., and Zhang, X.M. (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 275, 1674–1683, DOI:10.1016/j.neucom.2017.10.009.
- Duo, W., Zhou, M. and Abusorrah, A. (2022) A survey of cyberattacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784-800. DOI:10.1109/JAS.2022.105548.
- Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T. and Song, D. (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, June 2018. IEEE, 1625-1634. DOI: 10.1109/CVPR.2018.00175.
- Fan, J., Li, Y., Zhu, H., and Yu, S. (2021) Longitudinal control of connected truck platoon based on prescan. In: Proceedings of the 33rd Chinese Control and Decision Conference (CCDC), Kunming, May 2021. IEEE, 1110–1115. DOI: 10.1109/CCDC52312.2021.9602602.
- Garcia, F.D., Oswald, D., Kasper, T., and Pavlidès P. (2016) Lock it and still lose it—on the (in) security of automotive remote keyless entry systems. In: Proceedings of the 25th USENIX Security Symposium, Austin, August 2016. Available at: https://kasper-oswald.de/wp-content/uploads/2013/03/paper.pdf.
- Ge, X., Han, Q.L., Wu, Q. and Zhang, X.M. (2022) Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks. IEEE/CAA Journal of Automatica Sinica, 10(5), 1234-1251. DOI: 10.1109/JAS.2022.105845.
- Khadka, A., Karypidis, P., Lytos, A. and Efstathopoulos, G. (2021) A benchmarking framework for cyber-attacks on autonomous vehicles. Transportation Research Procedia, 52, 323-330. DOI:10.1016/j.trpro.2021.01.038.
- Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H. and Savage, S. (2010) Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, Oakland, May 2010. IEEE, 447-462. DOI:10.1109/SP.2010.34.
- Kukkala, V.K., Thiruloga, S.V. and Pasricha, S. (2022) Roadmap for cybersecurity in autonomous vehicles. IEEE Consumer Electronics Magazine, 11(6), 13-23. DOI:10.1109/MCE.2022.3154346.
- Kumar, A.D., Chebrolu, K.N.R., Vinayakumar R. and KP, S. (2018) A brief survey on autonomous vehicle possible attacks, exploits and vulnerabilities. arXiv preprint arXiv:1810.04144.
- Liu, X., Luo, B., Abdo, A., Abu-Ghazaleh, N. and Zhu, Q. (2021) Securing connected vehicle applications with an efficient dual cyber-physical blockchain framework. In: Proceedings of IEEE Intelligent Vehicles Symposium (IV), Nagoya, July 2021. IEEE Press, 393-400. DOI:10.1109/IV48863.2021.9575869.
- Liu, Y., Peng, Y., Wang, B., Yao, S. and Liu, Z. (2017) Review on cyber-physical systems. IEEE/CAA Journal of Automatica Sinica, 4(1), 27-40. DOI: 10.1109/JAS.2017.7510349.
- Liu, Y., Zong, C., Han, X., Zhang, D., Zheng, H. and Shi, C. (2020) Spacing allocation method for vehicular platoon: A cooperative game theory approach. Applied Sciences, 10(16), 5589. DOI:10.3390/app10165589.
- Miller, C. and Valasek, C. (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA. Available at: https://ioactive.com/wp-content/uploads/pdfs/IOActive_Remote_Car_Hacking.pdf.
- Noei, S., Sargolzaei, A., Abbaspour, A. and Yen, K. (2016) A decision support system for improving resiliency of cooperative adaptive cruise control systems. Procedia Computer Science, 95, 489-496. DOI: 10.1016/j.procs.2016.09.326.
- Petit, J., Stottelaar, B., Feiri, M., and Kargl, F. (2015) Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR. In: Proceedings of Black Hat Europe Conference. Available at: https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf.
- Petrillo, A., Pescape, A., and Santini, S. (2020) A secure adaptive control for cooperative driving of autonomous connected vehicles in the presence of heterogeneous communication delays and cyberattacks. IEEE Transactions on Cybernetics, 51(3). DOI: 10.1109/TCYB.2019.2962601.
- Rehman, S.U. and Gruhn, V. (2018) An effective security requirements engineering framework for cyber-physical systems. Technologies, 6(3), 65. DOI:10.3390/technologies6030065.
- Sánchez, H.S., Rotondo, D., Puig, V., Escobet, T., and Quevedo, J. (2021) Detection of replay attacks in autonomous vehicles using a bank of qpv observers. In: Proceedings of the 29th Mediterranean Conference on Control and Automation (MED), Puglia, June 2021. IEEE, 1149–1154. DOI:10.1109/MED51440.2021.9480330.
- Sedjelmaci, H., Brahmi, I.H., Ansari, N. and Rehmani, M.H. (2019) Cyber security framework for vehicular network based on a hierarchical game. IEEE Transactions on Emerging Topics in Computing, 9(1), 429-440. DOI:10.1109/TETC.2018.2890476.
- Shirvani, S., Baseri, Y. and Ghorbani, A. (2023) Evaluation framework for electric vehicle security risk assessment. IEEE Transactions on Intelligent Transportation Systems, 25(1), 33-56. DOI:10.1109/TITS.2023.3307660.
- Singh, D., Tripathi, G., Shah, S.C. and da Rosa Righi, R. (2018) Cyber physical surveillance system for Internet of Vehicles. In: Proceedings of the 4th World Forum on Internet of Things (WF-IoT), Singapore, February 2018. IEEE, 546-551. DOI: 10.1109/WF-IoT.2018.8355218.
- Wouters, L., Gierlichs, B. and Preneel, B. (2021) My other car is your car: Compromising the Tesla Model X keyless entry system. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021(4), 149-172. DOI:10.46586/tches.v2021.i4.149-172.
- Wouters, L., Marin, E., Ashur, T., Gierlichs, B. and Preneel, B. (2019) Fast, furious and insecure: Passive keyless entry and start systems in modern supercars. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(3), 66-85. DOI:10.46586/tches.v2019.i3.66-85.
- Yamamoto, Y., Kuze, N. and Ushio, T. (2021) Attack detection and defense system using an unknown input observer for cooperative adaptive cruise control systems. IEEE Access, 9, 148810-148820. DOI:10.1109/ACCESS.2021.3124547.
- Zhai, C., Liu, Y., and Luo, F. (2018) A switched control strategy of heterogeneous vehicle platoon for multiple objectives with state constraints. IEEE Transactions on Intelligent Transportation Systems, 20(5), 1883–1896. DOI:10.1109/TITS.2018.2841980.
- Zhang, H., Cheng, P., Shi, L., and Chen, J. (2013) Optimal dos attack policy against remote state estimation. In: Proceedings of the 52nd IEEE Conference on Decision and Control, Firenze, December 2013. IEEE, 5444–5449. DOI: 10.1109/CDC.2013.6760746.
- Zhang, H., Pan, Y., Lu, Z., Wang, J. and Liu, Z. (2021) A cyber security evaluation framework for in-vehicle electrical control units. IEEE Access, 9, 149690-149706. DOI:10.1109/ACCESS.2021.3124565.
- Zhao, X., Ju, J., Dong, F., Chen, Y.H., Zhang, L. and Zhang, B. (2021) An exponential type control design for autonomous vehicle platoon systems. Asian Journal of Control, 23(2), 1025-1039. DOI:10.1002/asjc.2279.
- Zheng, Y., Li, S.E., Li, K. and Ren, W. (2017) Platooning of connected vehicles with undirected topologies: Robustness analysis and distributed H-infinity controller synthesis. IEEE Transactions on Intelligent Transportation Systems, 19(5), 1353-1364. DOI:10.1109/TITS.2017.2726038.