| Issue |
Security and Safety
Volume 4, 2025
Security and Safety in Artificial Intelligence
|
|
|---|---|---|
| Article Number | 2025002 | |
| Number of page(s) | 16 | |
| Section | Industrial Control | |
| DOI | https://doi.org/10.1051/sands/2025002 | |
| Published online | 24 July 2025 | |
Research Article
Secure platooning control of connected vehicles against data injection attacks
1
School of Electronics and Information Engineering, Tongji University, Shanghai, 201804, China
2
Shanghai Research Institute for Intelligent Autonomous Systems, Shanghai, 201210, China
3
Institute for Human-Machine Communication, Technical University of Munich, Munich 80333, Germany
* Corresponding authors (email: elewzp@tongji.edu.cn (Zhuping Wang); zhanghao@tongji.edu.cn (Hao Zhang))
Received:
25
October
2024
Revised:
14
December
2024
Accepted:
20
January
2025
This paper presents an attack-defense formation control framework for connected vehicle platoons. This framework effectively addresses the challenges posed by malicious attacks on multi-intelligent vehicle systems in open network environments. First, from the attacker’s perspective, an optimal data injection attack strategy is designed, considering energy constraints and the complexities of the communication environment. This strategy aims to disrupt the multi-intelligent vehicle system with minimal energy expenditure. Next, from the defender’s perspective, a formation compensation control strategy is proposed to enhance the system’s resilience against such attacks. This defense control strategy includes real-time monitoring and adjustments of communication data between vehicles, ensuring that vehicle formation remains stable and coordinated even in the case of data injection attacks. Finally, simulation experiments are conducted to validate the effectiveness and robustness of the proposed methods.
Key words: connected vehicle platoon / data injection attack / defense control / formation
Citation: Liu J, Tang S and Gao S et al. Secure platooning control of connected vehicles against data injection attacks. Security and Safety 2025; 4: 2025002. https://doi.org/10.1051/sands/2025002
© The Author(s) 2025. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
With the rapid development of intelligent transportation systems, multi-agent vehicle platooning systems, as an important application of cyber-physical systems (CPS), are gradually showing great potential in fields such as autonomous driving and vehicle cooperative control. These systems achieve efficient coordination between vehicles through wireless communication and cooperative control mechanisms, thereby improving road safety, driving efficiency, and energy utilization [1–3]. However, as platoon systems become increasingly complex and information-driven, network security issues have gradually become a major bottleneck restricting their widespread application. In particular in open network environments, attackers can initiate network attacks on multi-agent systems in various ways, leading to a degradation in system performance or even system collapse [4, 5].
Among them, false data injection (FDI) attacks are a common and serious form of network attack, widely applied in power grids [6], control systems [7], and connected vehicles [8]. FDI attacks work by falsifying control signals or sensor data, causing the system to make incorrect control decisions, which in turn affects the stability and coordination of the entire platoon. In multi-agent vehicle platoon systems, attackers can not only tamper with the control information of individual vehicles but also introduce network transmission disturbances, causing the entire platoon system to collapse [9, 10].
Currently, research on defending against FDI attacks focuses mainly on two types of strategies: attack detection [11] and attack defense [12]. Attack detection methods, such as chi-square detection [13] and entropy detection [14], are widely applied in multi-agent systems and can detect potential attacks by monitoring abnormal signals in the network. However, these traditional methods have certain limitations. First, attackers can exploit the shortcomings of existing detection mechanisms to design more covert and complex attack signals, avoiding detection using traditional methods [15]. Second, most existing detection methods focus on the identification of attack signals, and lack sufficient dynamic response and stability analysis of the system under complex attack scenarios [16]. Therefore, despite some progress in attack detection technology, it remains difficult to achieve effective defense when facing highly complex attacks. In contrast to attack detection, attack defense strategies focus more on taking appropriate control actions when an attack occurs to ensure system stability and security [17, 18]. In recent years, defense strategies based on control theory have become a research hotspot. Taking into account both attackers and defenders, optimal defense strategies have been proposed [19, 20]. These methods can effectively enhance the system’s ability to resist known attacks.
In multi-agent vehicle systems, dedicated short range communication (DSRC) enables each vehicle to acquire real-time state information from other vehicles in the platoon, allowing it to adjust its own driving strategy, optimize energy management, and coordinate scheduling to complete tasks with minimal energy consumption. However, with the continuous evolution of attack strategies, DSRC communication channels face challenges in defending against various complex attacks. For instance, existing literature mentions that sliding mode observers can be used to monitor the expected distance differences in vehicle communication networks, responding to both attack and non-attack conditions [21]. However, such sliding mode observers have high requirements for external attack signals and can only handle relatively simple attacks. Furthermore, real-time diagnostic strategies based on sliding mode control and adaptive estimation theory, while effective in dealing with specific threats like denial of service (DOS) attacks [22], face significant difficulties in detecting more covert attacks, such as data injection attacks. Currently, there is limited research on defending multi-agent vehicles against data injection attacks. Therefore, designing secure control algorithms to safeguard against network attacks and enhance the security of multi-agent vehicle systems has become a key focus in current research.
To address the challenges mentioned above, this paper proposes a novel defense control framework against false data injection attacks. The research primarily solves the following problems: In response to the specific nature of false data injection attacks in multi-agent vehicle platoon systems, a defense control framework based on the attack is proposed. This framework comprehensively considers multiple factors, including network topology and the attacker’s energy constraints, and designs optimal attack and defense control strategies. The main contributions of this chapter can be summarized as follows:
-
(1)
A novel attack-defense formation control framework for connected vehicle platoons is proposed, considering the perspectives of both attackers and defenders to develop their respective optimal strategies.
-
(2)
The optimal strategy for data injection attacks is introduced, in which attackers inject data that combine false information and its derivatives into a healthy multi-agent vehicle system, utilizing minimal energy to cause significant damage and disrupt the system’s equilibrium position.
-
(3)
Unlike existing defense methods [15, 16], our approach emphasizes the system’s dynamic response and the design of control strategies to combat 0-day attacks. A 0-day attack refers to an attack strategy that exploits previously unknown vulnerabilities. By analyzing these stealthy attack strategies, we provide a secure defense strategy that guarantees the stability of the vehicle platoon system under optimal data injection attacks.
2. Problem formulation
2.1. Control objective
As shown in Figure 1, the platoon consists of a leader vehicle 0 and N following vehicles, i = 1, 2, …, N. Each follower vehicle i transmits its position qi and velocity pi information to the data processing center through DSRC. The data processing center sends the computed control signals to each vehicle via DSRC. When the network is subjected to an FDI attack, the previous control signal ui(t) for each following vehicle i will be replaced by
, and the stability of the platoon will be compromised.
![]() |
Figure 1. The vehicular platoon under FDI attack |
To address this issue, the following assumptions are made.
Assume that the original multi-vehicle control system and the attacker’s communication channel are ideal, without considering the effects of communication noise, packet loss, or delay. Additionly, the attacker’s energy is sufficient to implement an optimal attack strategy.
The following control objectives are proposed to achieve the stable formation of the multi-agent system under FDI attacks.
Consider a multi-agent vehicle platoon subjected to FDI attacks, the objective is to ensure that all vehicles maintain the same velocity and desired driving distance. That is
1) limt → ∞∥pi(t)−p0(t)∥ = 0,
2) limt → ∞∥qi(t)−qi − 1(t)∥ = ddes,
where pi is the velocity of the following vehicle i, p0 is the velocity of leader vehicle 0. qi is the position of the following vehicle i, qi − 1 is the position of the following vehicle i − 1, ddes is the desired distance between the following vehicle i and i − 1.
2.2. System Dynamic of Connected Platoon
In studying the platoon control of multi-vehicle intelligent systems, the initial step is to model intelligent vehicles within the system. This can be achieved by representing each vehicle as a node and adopting a second-order model. The lead vehicle can then be represented as follows:
where q0(t) and p0(t) denote the position and velocity of the lead vehicle, respectively. u0(t) is the control input of the lead vehicle. The following vehicles can be represented as
where qi(t), pi(t) and ui(t) denote the position, velocity and control input of the following vehicle i, respectively, i = 1, …N. Denote
, taking the derivative of xi(t), we have
Defining
,
, we have
The control input ui(t) can be rewritten as
Defining
, then
Substituting Equation (6) into Equation (5) results into,
The equivalent transformation of the above formula is obtained
One of the primary objectives of multi-vehicle intelligent control is to ensure that each following vehicle maintains the same speed as the lead vehicle. To simplify the analysis, the following vehicle’s velocity is considered the output.
Currently, many multi-agent vehicle formation control strategies employ a second-order modeling approach. However, such a method treats the multi-agent vehicle platoon as a mass-spring-damping system, which is overly idealistic and fails to account for factors such as mass, aerodynamic drag, and mechanical efficiency in real-world environments. Consequently, a third-order model for the multi-agent vehicles is proposed [23], with the lead vehicle denoted as follows:
where q0(t),p0(t),a0(t),u0(t) represent the position, velocity, acceleration and control inputs of the lead vehicle, respectively. The following vehicle is denoted as
where qi(t) and pi(t) represent the position and velocity of the following vehicle i for i = 1, 2, 3, …, N. The variable ηi denotes the time delay constant of the longitudinal dynamic system for following vehicle i, mi is the mass of following vehicle i, τT, i represents the mechanical efficiency of the transmission system of following vehicle i, and rw, i is the wheel radius of following vehicle i. The term Ti(t)> 0 signifies the actual driving or braking torque of following vehicle i. Additionally, CA, i is the lumped air resistance coefficient for following vehicle i, g is the gravitational acceleration constant, fi is the rolling resistance coefficient of following vehicle i, and Tdes, i(t) is the torque corresponding to the desired driving or braking force of vehicle i.
The position qi(t) of the following vehicle i is denoted as
Continuing with further derivation using
, we obtain
The nonlinear model accurately reflects the node dynamics of the actual vehicle in a real-world environment. However, analyzing performance changes under platoon control using this model can be challenging. Therefore, it is essential to linearize the model and adopt a feedback linearization strategy.
where ui(t) is the control input of the following vehicle i after feedback linearization. Consequently, the general formula of dynamic third-order modeling is obtained.
Define
, by deriving xi(t), we have
Define
, we have
The control input ui(t) is as follows:
Define
, we have
The equivalent transformation of the above equation is obtained as follows:
Further, the model of the following vehicle can be rewritten as:
where matrix
. Based on the above analysis, the formulas obtained from both second-order and third-order modeling are similar. Therefore, the following analysis of attack strategies and formation control will be conducted using the third-order system as an example.
3. Control strategy design against data injection attacks
3.1. Optimal data injection attack strategy
Consider a multi-agent vehicle platoon under attack, as shown in Figure 1. The attacker compromises the control signal from the system controller by attacking the network communication channel. The control signal after the attack is denoted as
, replacing the original control signal ui(t), which is
where uai(t) represents the injected signal for the data injection attack, and the derived signal is intended to enhance the effectiveness of the attack. ui(t)=Ki xi(t) represents the healthy control input of the following vehicle i, with Ki being the control gain of the following vehicle i.
The multi-agent vehicle system after the attack is represented as:
The difference between the actual velocity and the desired velocity of each following vehicle is represented as ΔEi(t), which is as follows:
where ydes = p0, meaning that the velocity of all following vehicles matches the velocity of the leading vehicle p0.
This paper proposes an attack strategy aimed at compromising the vehicle network from the attacker’s perspective and discusses the impact of this attack on the control of the multi-agent vehicle system. In other words, the attacker seeks to achieve the least energy expenditure while causing the greatest state deviation in the attacked system.
The attacker compromises the control signal from the system controller by attacking the DSRC network communication channel. The attacker’s objective is to minimize the energy consumption required to inject the signal uai(t) into the platoon system Equation (23), while simultaneously maximizing the damage to the targeted platoon system.
In practical scenarios, the attacker’s energy is limited and typically sourced from electrical power. Therefore, when analyzing attack strategies and their impacts, it is crucial to consider the attacker’s energy costs.
Based on the attacker’s objectives, the network attack problem in multi-agent vehicles can be framed as the following optimization problem [24].
The attack problem can be formulated as
where P and Q are the weight matrices, Pi is a positive semi-definite matrix, and Qi is positive definite matrix.
By analyzing the objectives of the attacker, the network attack problem for multi-intelligent vehicles can be transformed into the following optimal problem. Here,
is used to represent the offset of the multi-intelligent vehicle system, and
denotes the energy consumed by the attacker due to the inflicted attacks.
The optimal attack strategy for multi-vehicle system Equation (8) is given by uai(t)=Qi−1BiTλi(t), as shown in Equation (22), where λi(t) satisfies
In this case, the attack strategy consumes less energy, uaiT(t)Qiuai(t), and causes more damage, ΔEiT(t)PiΔEi(t), to the multi-intelligent vehicles.
Firstly, consider the optimization problem of Equation (25). Denote ηi(t)=ΔEiT(t)PiΔEi(t)−uaiT(t)Qiuai(t). Then Equation (25) can be written as maxJi = ∫t0tfηi(t) dt. According to the definition of ΔEi(t) and 𝒰ai(t), it can be obtained that
The Hamiltonian function is defined as
According to the optimal control principle, the co-state equation is described as
Take the partial derivative of Equation (29), one obtains
Using the maximum principle conditions. Setting
, Equation (29) results into
and Equation (30) becomes
Combining Equation (31) and Equation (32), when uai(t)=Qi−1BiTλi(t) and
are satisfied, the optimization problem Equation (25) is fulfilled and Ji reaches its maximum value. At this point, the deviation of the multi-intelligent vehicle system, ΔEiT(t)PΔEi(t), and the difference in the attacker’s energy consumption, uaiT(t)Quai(t), reach their maximum, which can be considered as the completion of the attack objective. ▪
3.2. Control Strategy Design Against Data Injection Attacks
In Theorem 1, the optimal attack strategy uai(t) is obtained. As defined in Definition 1, the objective of the defense is to ensure that the multi-intelligent vehicles can still perform relatively stable formation control under optimal injection attacks uai(t).
To compensate for the offset caused by the attack uai(t), it need to design the control strategy ubi(t) against data injection attacks.
To compensate for the offset caused by the attack, the control signal after the attack is
. The control strategy against data injection attacks is derived as
where
, and
.
4. Simulation verification
4.1. Optimality verification of data injection attacks
From the attacker’s perspective, the optimal attack strategy involves using minimal energy to cause significant state deviations in the targeted system. In the multi-intelligent vehicle system, the control objective is for the vehicles to maintain the same driving velocity and desired inter-vehicle distances. Thus, the deviation in the system state represents the differences in speed and position relative to the desired values.
In this section, numerical simulations are performed on a multi-intelligent vehicle platoon consisting of three follower vehicles to validate the proposed approach. Initially, these follower vehicles are positioned at 4m, 6m, and 7m from the longitudinal zero reference point, respectively, to simulate the platoon’s braking process with an expected velocity of p0 = 0m/s. In the absence of an attack, the positions and velocities of these follower vehicles evolve as follows:
To verify the optimality of the proposed attack strategy, a comparative experiment is conducted between the attack energy and the attack effects on the vehicles. Using the optimal attack strategy method, the optimal attack gain is calculated as Ka = [ − 0.50.5]. Generating random numbers in MATLAB, we denote Kb = Ka + Ka * (rand(size(1)) − rand(size(1))), which can yield the random attack gains Kb.
Figures 2–4 illustrate the attack energy and the positional changes under both the optimal attack strategy Ka = [ − 0.50.5] and the random attack strategy Kb = [ − 0.1334 0.1334]. In Figure 2, the blue line represents the energy consumed by the optimal attack strategy Ka, while the orange line represents the energy consumed by the random attack strategy Kb. In Figures 3 and 4, the blue line illustrates the vehicle position and velocity changes under the optimal attack strategy Ka, and the orange line shows the changes under the random attack strategy. From Figure 2, it can be seen that under Kb = [ − 0.1334 0.1334], the random attack strategy consumes almost no energy. However, in Figures 3 and 4, it is evident that the random attack strategy causes little to no damage to the vehicle’s position and speed; the vehicle remains at the longitudinal zero reference point, and its speed stays around 0 m/s. The random attack strategy does not damage the system and is ineffective.
![]() |
Figure 2. Comparison of energy consumption under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
![]() |
Figure 3. Vehicle position changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
![]() |
Figure 4. Vehicle speed changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
Figures 5–7 illustrate the attack energy, position changes, and speed changes under the optimal attack gain
and the random attack gain Kb = [ − 0.6843 0.6843]. From Figure 5, it can be seen that under similar attack effects, the optimal attack gain Ka calculated using the optimal attack strategy method in this chapter consumes far less energy than the random attack gain Kb. At 10 seconds, the energy value represented by the orange line of Kb exceeds twice that of the blue line representing Ka. Figure 6 shows the position changes under different attack gains, while Figure 7 illustrates the velocity changes. Notably, during the first 0–2 seconds, the orange line Kb exhibits better destructive effects on position and velocity compared to the blue line Ka, as the energy consumption of Ka is nearly zero, indicating no effective attack yet. However, after 2 seconds, when the energy consumption of the optimal attack is less than that of the random attack gain, the destructive effects of the optimal attack gain Ka on position and velocity approach or surpass those of the random attack gain Kb.
![]() |
Figure 5. Comparison of energy consumption under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.0.6843 0.0.6843] |
![]() |
Figure 6. Vehicle position changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.6843 0.6843] |
![]() |
Figure 7. Vehicle velocity changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.0.6843 0.6843] |
Through the comparison of simulation results between the optimal attack strategy and two different random attack strategies in Figures 2–7, it can be concluded that under the random attack strategy, when the attack energy is small, the impact on the attacked system is minimal. However, when the energy is too large, it leads waste. In contrast, the optimal attack strategy designed in this paper is able to cause greater damage to the attacked system with the minimum energy consumption.
4.2. Validation of the effectiveness of the control strategy
To validate the effectiveness of the control strategy, simulations are conducted to assess the deviations in vehicle position and velocity induced by random data input attacks. Subsequently, the impact on vehicle position and velocity is analyzed when the compensatio control strategy is applied during the attack.
![]() |
Figure 8. Deviations of the first vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 9. Deviations of the first vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 10. Deviations of the second vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 11. Deviations of the second vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 12. Deviations of the third vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 13. Deviations of the third vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
![]() |
Figure 14. The initial positions and velocities of the platoon |
![]() |
Figure 15. Positions and velocities of vehicle platoon at 3s |
Figures 8 and 9 illustrate the position and velocity deviations of the first following vehicle during random data injection attacks and after the application of the compensation control strategy, respectively. The blue line represents the vehicle’s velocity deviation, while the red line indicates the vehicle’s position deviation. Under the attack strategy, the vehicle’s velocity oscillates continuously, making it impossible to achieve the braking objective. With the control strategy in place, the velocity and position deviations caused by the attack are partially corrected, indicating that the control strategy has a certain level of effectiveness.
Figures 10 and 11 illustrate the position and velocity deviations of the second following vehicle during random data injection attacks and after the application of the compensation control strategy, respectively. The blue line represents the vehicle’s velocity deviation, while the red line indicates the vehicle’s position deviation. Under the attack strategy, the vehicle’s velocity continuously oscillates, making it impossible to achieve the braking objective. With the control strategy in place, the velocity and position deviations caused by the attack are partially corrected, indicating that the control strategy has a certain level of effectiveness.
Figures 12 and 13 illustrate the position and velocity deviations of the third following vehicle during random data injection attacks and after the application of the compensation control strategy, respectively. The blue line represents the vehicle’s velocity deviation, while the red line indicates the vehicle’s position deviation. Under the attack strategy, the vehicle’s velocity continuously oscillates, making it impossible to achieve the braking objective. With the control strategy in place, the velocity and position deviations caused by the attack are partially corrected, indicating that the control strategy has a certain level of effectiveness.
Figures 14 and 15 illustrate the state of the platoon at the initial state and the state of the platoon after running for 3 seconds, respectively. At the initial state, the speeds of the following vehicles are 10 m/s, 8 m/s, and 6 m/s. Since the simulation models the braking state of the platoon, the desired speed for all vehicles is 0 m/s. From Figure 15, it can be seen that after the platoon has traveled for 3 seconds, the speeds of all following vehicles have reached 0 m/s, indicating that the braking state has been achieved, and the vehicles maintain approximately the same distance from each other.
5. Conclusion
This paper investigates formation control of multi-agent vehicle systems against data injection attacks. As attack strategies continue to evolve, existing multi-agent vehicle control strategies struggle to cope with the impacts of complex attacks. A better understanding of attack behaviors can lead to the design of corresponding control strategies, preparing the system for secure defense. In this paper, multi-agent vehicles utilizes DSRC for inter-vehicle communication, and different scenarios are considered based on second-order and third-order modeling of multi-agent vehicles. Through the analysis of the attack objectives, the optimal data injection attack strategy is derived. The attacker injects a mix of false data and its derived data into a healthy multi-agent vehicle system, causing significant damage and shifting the balance position with minimal energy expenditure. By analyzing the attack strategy, corresponding multi-agent control strategies against data injection attacks are developed to guarantee the safety of the vehicle platoon. Future work will focus on addressing communication network issues and scalability challenges in larger systems, aiming to improve efficiency, collaboration, and stability.
Acknowledgments
We would like to thank all editors and reviewers who help us improve the paper.
Funding
This work is supported by the National Natural Science Foundation of China 62433014, in part by the Shanghai International Science and Technology Cooperation Project (22510712000), in part by National Key R&D Program of China under Grant (2020AAA0108100), in part by the Shanghai Municipal Science and Technology Major Project (2021SHZDZX0100) and in part by the Fundamental Research Funds for the Central Universities.
Conflicts of interest
The authors declare that they have no conflict of interest.
Data availability statement
The original data are available from corresponding authors upon reasonable request.
Author contribution statement
Juan Liu wrote and constructed this paper. Shuyi Tang carried out the theoretical derivation inspection. Sheng Gao performed simulation experiment assistance. Zhuping Wang discussed the recent development, corrects typos in the paper and jointly wrote this paper. Hao Zhang mainly surveyed the related work and jointly wrote this paper. Gerhard Rigoll revised this paper.
References
- Pan CW, Chen Y and Chen QC et al. Distributed fuzzy resilient control for vehicular platooning system with multiple nodes attacks in prescribed performance. IEEE Trans Veh Technol 2024; 73: 6129–42 [Google Scholar]
- Liu J, Yang X and Zhang H et al. Predictive control for unknown dynamics with observation loss: a temporal game-theoretic approach. IEEE Trans Indust Electron 2024; 3: 2965–77 [Google Scholar]
- Tian B, Zhang H and Wang Z et al. Fixed-time formation-containment of nonlinear systems using intermittent output and connectivity. IEEE Trans Indust Electron 2025; 1: 845–56 [Google Scholar]
- Gao S, Zhang H and Wang ZP et al. Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach. Secur Saf 2022; 1: 2022005 [Google Scholar]
- Feng XM and Hu SY. Cyber-physical zero trust architecture for industrial cyber-physical systems. IEEE Trans Indust Cyber-Phys Syst 2023; 1: 394–405 [Google Scholar]
- Wei K, Kwak JW and Ma DB. An encrypted on-chip power supply with random parallel power injection and charge recycling against power/EM side-channel attacks. IEEE Trans Power Electron 2023; 38: 500–9 [Google Scholar]
- Zhu PP, JST and Bu XH et al. Model-free adaptive control for a class of MIMO nonlinear cyberphysical systems under false data injection attacks. IEEE Trans Control Network Syst 2023; 10: 467–78 [Google Scholar]
- Yang TC, Murguia C and Lv C. Risk assessment for connected vehicles under stealthy attacks on vehicle-to-vehicle networks. IEEE Trans Intell Transp Syst 2023; 24: 13627–38 [Google Scholar]
- Zhang H, Liu J and Wang ZP et al. Adaptive switched control for connected vehicle platoon with unknown input delays. IEEE Trans Cybern 2023; 53: 1511–21 [Google Scholar]
- Liu Y, Xu LW and Cai GS et al. Distributed robust platooning control for heterogeneous vehicle group under parametric uncertainty and hybrid attacks. IEEE Trans Veh Technol 2023; 72: 5677–89 [Google Scholar]
- Ahmadi A, Nabipour M and Taheri S, Mohammadi-ivatloo B and vahidinasab V. A new false data injection attack detection model for cyberattack resilient energy forecasting. IEEE Trans Indust Inf 2023; 19: 371–81 [Google Scholar]
- Luo X, He J and Wang X et al. Resilient defense of false data injection attacks in smart grids via virtual hidden networks. IEEE Internet Things J 2023; 10: 6474–90 [Google Scholar]
- Brumback B and Srinath M. A Chi-square test for fault-detection in Kalman filters. IEEE Trans Autom Control 1987; 32: 552–4 [Google Scholar]
- Guo L, Rivero D and Pazos A. Epileptic seizure detection using multi-wavelet transform based approximate entropy and artificial neural networks. J Neuroence Methods 2010; 193: 156–63 [Google Scholar]
- Biroon RA, Biron ZA and Pisu P. False data injection attack in a platoon of CACC: real-time detection and isolation with a PDE approach. IEEE Trans Intell Transp Syst 2022; 23: 8692–703 [Google Scholar]
- Guibene K, Messai N and Ayaida M et al. A pattern mining-based false data injection attack detector for industrial cyber-physical systems. IEEE Trans Indust Inf 2024; 20: 2969–78 [Google Scholar]
- Giraldo J, Hariri ME and Parvania M. Decentralized moving target defense for microgrid protection against false-data injection attacks. IEEE Trans Smart Grid 2022; 13: 3700–10 [Google Scholar]
- Xu W, Jaimoukha IM and Teng F. Robust moving target defence against false data injection attacks in power grids. IEEE Trans Inf Forensics Secur 2023; 18: 29–40 [Google Scholar]
- Lv M, Yu W and Lv Y et al. An integral sliding mode observer for CPS cyber security attack detection. Chaos: Interdiscip J Nonlinear Sci 2019; 29: 043120 [Google Scholar]
- Biron ZA, Dey S and Pisu P. Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Trans Intell Transp Syst 2018; 19: 3893–902 [Google Scholar]
- Qi X, Zhu L and Li X et al. Observer-based event-triggered sliding mode security control for nonlinear cyber-physical systems under DoS attacks. IEEE Trans Autom Sci Eng 2024; 21: 7480–93 [Google Scholar]
- Chawla A, Singh A and Agrawal P et al. Denial-of-service attacks pre-emptive and detection framework for synchrophasor based wide area protection applications. IEEE Syst J 2022; 16: 1570–81 [Google Scholar]
- Zheng Y, Li SE and Wang J et al. Stability and scalability of homogeneous vehicular platoon: Study on the influence of information flow topologies. IEEE Trans Intell Transp Syst 2015; 17: 14–26 [Google Scholar]
- Wu G, Sun J and Chen J. Optimal data injection attacks in cyber-physical systems. IEEE Trans Cybern 2018; 48: 3302–12 [CrossRef] [PubMed] [Google Scholar]

Juan Liu obtained her B.E. degree in automation from Hohai University, Jiangsu, China, in 2017, and later achieved her M.Sc. degree in control science and engineering from Tongji University, Shanghai, China, in 2020. Currently, she is actively engaged in her Ph.D. degree, specializing in control science and engineering at Tongji University, Shanghai, China. Her current research focuses on optimal attack strategy design and intelligent control.

Shuyi Tang received the B.Sc. degree in automation from ChangAn University, Xian, China in 2018 and M.Sc. in Control Science and Engineering with the school of Electronics and Information Engineering, TongjiUniversity, Shanghai, China, in 2022. Her research interest covers security in multi-agent vehicle formation and optimal attack strategy design problem.

Sheng Gao received his B.Sc. degree in automation from Donghua University, Shanghai, China in 2019. He is currently working toward the Ph.D. degree in control science and engineering at Tongji University, Shanghai, China. From January to March 2024, he was a Visiting Ph.D. Student with the Chair of Intelligent Control Systems, RWTH Aachen University, Aachen, Germany. His current research interests include optimal control, cyber-physical systems, robot and cyber security.

Zhuping Wang received her B.Sc. degree and the M.Sc. degrees from Northwestern Polytechnic University, China, in 1994 and 1997, respectively. She further attained her Ph.D. degree from the National University of Singapore in 2003. She is currently a Professor with the College of Electronic and Information Engineering, Tongji University, Shanghai, China. Her research interests include autonomous vehicles and intelligent control of robotic systems.

Hao Zhang obtained the B.E. degree from Wuhan University of Technology, Wuhan, China, in 2001, and the Ph.D. degree from Huazhong University of Science and Technology, Wuhan, China, in 2007. She is currently a Professor within the College of Electronic and Information Engineering at Tongji University, Shanghai, China. Her research pursuits primarily focus on intelligent control, multi-agent systems, and optimal control.

Gerhard Rigoll (Life Fellow, IEEE) received the Dr.-Ing. habil. degree from the University of Stuttgart, Germany, in 1991. He spent several years as guest researcher in USA and Japan, and was appoined in 1993 as Full Professor of computer science at Gerhard-Mercator-University Duisbug, Germany. In 2002 he joined the Technical University of Munich (TUM), Germany, where he is heading the Institute for Human-Machine Communication. His research interests include human-machine communication and multimedia information processing, covering areas, such as speech and handwriting recognition, gesture recognition, face detection and identification, action and emotion recognition, and interactive computer graphics.
All Figures
![]() |
Figure 1. The vehicular platoon under FDI attack |
| In the text | |
![]() |
Figure 2. Comparison of energy consumption under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
| In the text | |
![]() |
Figure 3. Vehicle position changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
| In the text | |
![]() |
Figure 4. Vehicle speed changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.1334 0.1334] |
| In the text | |
![]() |
Figure 5. Comparison of energy consumption under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.0.6843 0.0.6843] |
| In the text | |
![]() |
Figure 6. Vehicle position changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.6843 0.6843] |
| In the text | |
![]() |
Figure 7. Vehicle velocity changes under the optimal attack strategy Ka = [ − 0.5 0.5] and the random attack strategy Kb = [ − 0.0.6843 0.6843] |
| In the text | |
![]() |
Figure 8. Deviations of the first vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 9. Deviations of the first vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 10. Deviations of the second vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 11. Deviations of the second vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 12. Deviations of the third vehicle under random data injection attacks. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 13. Deviations of the third vehicle under the compensation control strategy. (a) Position deviations. (b) Velocity deviations |
| In the text | |
![]() |
Figure 14. The initial positions and velocities of the platoon |
| In the text | |
![]() |
Figure 15. Positions and velocities of vehicle platoon at 3s |
| In the text | |
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.









![$$ \begin{aligned} \begin{aligned} y_{i}(t)=p_i(t)=\begin{bmatrix}0&1\end{bmatrix}\biggl [\begin{matrix}q_i(t)\\ p_i(t)\end{matrix}\biggr ] =Cx_{i}(t). \end{aligned} \end{aligned} $$](/articles/sands/full_html/2025/01/sands20240029/sands20240029-eq14.gif)


















![$$ \begin{aligned} \begin{aligned} H_i(\eta _i,\lambda _i,u_{ai},t)=\frac{1}{2}\eta _i(t)+\lambda _i^T(t)\Big [(A_i+B_iK_i)\tilde{x}_i(t)+B_iu_{ai}(t)\Big ]. \end{aligned} \end{aligned} $$](/articles/sands/full_html/2025/01/sands20240029/sands20240029-eq41.gif)



















