Resource-Aware Stealthy Attacks in Vehicle Platoons
Eslami, Pirani
Connected and Autonomous Vehicles (CAVs) are transforming modern transportation by enabling cooperative applications such as vehicle platooning, where multiple vehicles travel in close formation to improve efficiency and safety. However, the heavy reliance on inter-vehicle communication makes platoons highly susceptible to attacks, where even subtle manipulations can escalate into severe physical consequences. While existing research has largely focused on defending against attacks, far less attention has been given to stealthy adversaries that aim to covertly manipulate platoon behavior. This paper introduces a new perspective on the attack design problem by demonstrating how attackers can guide platoons toward their own desired trajectories while remaining undetected. We outline conditions under which such attacks are feasible, analyze their dependence on communication topologies and control protocols, and investigate the resources required by the attacker. By characterizing the resources needed to launch stealthy attacks, we address system vulnerabilities and informing the design of resilient countermeasures. Our findings reveal critical weaknesses in current platoon architectures and anomaly detection mechanisms and provide methods to develop more secure and trustworthy CAV systems.
academic
Resource-Aware Stealthy Attacks in Vehicle Platoons
Connected and autonomous vehicles (CAVs) are transforming modern transportation through collaborative applications such as vehicle platooning, where multiple vehicles travel in tight formation to improve efficiency and safety. However, the critical dependence on inter-vehicle communication makes platoons highly vulnerable to attacks, where even subtle manipulations can escalate into severe physical consequences. While existing research primarily focuses on defensive mechanisms, there is limited attention to stealthy adversaries aimed at covertly manipulating platoon behavior. This paper provides a new perspective on attack design by demonstrating how attackers can steer platoons toward desired trajectories while remaining undetected. The research outlines the conditions under which such attacks are feasible, analyzes their dependence on communication topology and control protocols, and investigates the resources required by attackers.
Vulnerability of CAV Systems: Vehicle platoons achieve coordinated control through V2X communication, but this connectivity simultaneously introduces cybersecurity risks
Severity of Attack Consequences: Due to safety-security coupling characteristics, even subtle attacks can lead to physical accidents
Research Gap: Existing research primarily focuses on defensive mechanisms, lacking systematic analysis from the attacker's perspective
Novel Stealthy Attack Strategy: Proposes a covert attack framework for leader-follower vehicle platoons where attackers manipulate the platoon to track their own state rather than merely disrupting the formation
Multi-Scenario Attack Design: Designs attack signals for both compromised leader communication channels and secure channels, with rigorous analysis of stealth conditions
Control Protocol Impact Analysis: Investigates how agent control protocols affect attacker degradation capabilities, demonstrating how control protocols constrain the feasible set of stealthy attacks
Maintain stealth: Satisfy residual signal limt→∞rix=0
Manipulate tracking: Make attacked vehicle subset track attacker state xa while maintaining desired spacing
Stealth Definition (Definition 2):
An attack remains stealthy when, in the presence of attack signal aji=0, the residual signal satisfies:
limt→∞rix=limt→∞∑j∈Ni∥xi−xjc+dij∥=0
Theorem 1: Under Assumptions 1 and 2, attack signal (15) maintains stealth while causing follower vehicles to track the attacker state with desired spacing.
The paper cites 63 related references, primarily including:
CAV Security Surveys: Sun et al. (2021) on CAV network security
Formation Control: Zheng et al. (2015) on vehicle platoon stability and scalability
Resilient Control: LeBlanc et al. (2013) on resilient asymptotic consensus in robust networks
Attack Detection: Barboni et al. (2020) on detecting stealthy cyber attacks in interconnected systems
Overall Assessment: This is a high-quality paper with important contributions to CAV security, proposing novel attack perspectives and systematic analytical frameworks that provide valuable insights for both theoretical research and practical applications in the field. Despite certain limitations, its innovation and practical value make it an important reference in the field.