1. Introduction
At present, the global innovation trend is surging, and a new round of industrial transformation is poised to take place. Internet, mobile communication, big data, artificial intelligence, and other new technologies accelerate breakthroughs and continue to evolve, promoting the rapid development of mobile Internet and automated driving technology. Connected and automated vehicles which can realize “safe, efficient, comfortable and energy-saving” driving will also emerge as the times require. CAVs are expected to improve the characteristics of traditional traffic flow from the micro vehicle level, and then provide an effective way to solve the problems of traffic congestion, traffic efficiency, and traffic pollution. Scholars have also carried out some research to demonstrate the great potential benefits of CAVs [
1,
2,
3]. However, with the help of diverse and advanced communication technology, the “intelligent” information exchange between vehicles and the surrounding environment/world is realized all the time. Therefore, such an open-access communication environment system increases the risk of vehicles being exposed to cyberattacks, which is an urgent and critical challenge to be solved [
4].
In order to effectively resist cyberattacks and improve traffic safety performance, scholars have conducted a lot of research on cyberattacks, which helps us understand the impact mechanism of cyberattacks on traffic flow evolution, and lays a foundation for us to design response strategies.
In terms of efforts to reveal the impact of cyberattacks on traffic flow characteristics, Amir et al. [
5] investigated the influence of mobile reactive jamming attacks on the stability of CACC platoon, and the results showed that this attack will reduce the stability of traffic flow system. Wang et al. [
6] proposed an extended car-following model to describe connected traffic dynamics under cyberattacks, the results showed that the proposed model will help to avoid collision and reduce traffic congestion under the influence of cyberattacks. Li et al. [
7] studied and evaluated the impact of slight cyberattacks on CAV longitudinal security through modeling and simulation. The results showed that the impact of communication location attacks is worse than that of speed attacks. In addition, the impact of cyberattacks in vehicle acceleration phase is more severe and dangerous than that in vehicle deceleration phase. Wang et al. [
8] proposed a bi-bi-layer architecture composed of both a vehicle layer and a cyber layer to explore the impact of cyberattacks on CAV platoon safety and efficiency. Dong et al. [
9] proposed an evaluation framework to measure the impact of cyberattacks on traffic flow performance and analyzed and studied the impact from the aspects of attack intensity, attack range, and traffic demand through numerical simulation. Khattak et al. [
10] used an infrastructure-based communication platform to discuss the impact of cyberattacks on the safety and stability of connected and automated vehicle platoons under lane changes.
Furthermore, in terms of countering the adverse impact of cyberattacks on traffic flow, Zhai et al. [
11] designed a new continuous feedback controller based on lattice hydrodynamic model to suppress the impact of cyberattacks, and the effectiveness of the controller in dealing with cyberattacks and reducing traffic congestion were analyzed and verified by stability analysis and numerical simulation. Noei et al. [
12] proposed a traffic microsimulation tool that can simulate conventional, automated, and connected and automated vehicles in a platoon under fault, failure, and cyberattack with optimized accuracy and simulation speed to maximize throughput and without compromising safety or string stability. Lyu et al. [
13] designed a communication topology safety response system (CTSRS), and further combined with the distributed model predictive control (DMPC) to ensure the stability and security of the truck platoon even if the trucks suffer cyberattacks. Cheng et al. [
14] proposes a novel intelligent driving model considering cyberattacks and heterogeneous vehicles and revealed that the traffic stability and safety under cyber-attacks can be enhanced through the high proportion of cars and the information accepted from cooperative vehicles ahead.
In addition, some effective and robust control strategies that are not targeted at CAVs also need to be further studied and are worthy of being applied to deal with CAV cyberattacks [
15,
16], but we will not make a further detailed summary here.
Although some studies investigated the impact of cyberattacks and put forward the corresponding strategies, to the best of our knowledge, almost no research has been done to deal with cyberattacks from the perspective of switching acceleration controller.
To fill this gap, this paper first takes cyberattacks and different types of CAVs into account in the Intelligent Driver Model (IDM). On this basis, an acceleration control switch is designed as a robust and resilient control strategy against cyberattacks, which can help traffic flow to restore stability and enhance security. Finally, the influence of cyberattacks on the evolution of mixed traffic flow and the role of RRCS in combating cyberattacks are revealed by numerical simulations. In particular, we also carried out a sensitivity analysis of the RRCS based on different vehicle type proportions and different vehicle distribution.
The rest of the paper is organized as follows.
Section 2 establishes a car-following model of CAV mixed flow under cyberattacks.
Section 3 proposes the robust and resilient control strategy against cyberattacks. In
Section 4, numerical simulations are carried out to reveal the impact of cyberattacks on the evolution of mixed traffic flow, and the feasibility of the RRCS is verified by comparative experiments. Finally,
Section 5 gives a general conclusion about this work and some prospects for the research direction that can be considered for future developments.
3. The Robust and Resilient Control Strategy (RRCS) against Cyberattacks
In order to mitigate and resist the harmful impact of cyberattacks on traffic flow, an acceleration control switch is designed as the RRCS against cyberattacks in this section. The specific control form is as follows:
where
= the control strategy in the state of “too close vehicle gap”;
= the control strategy based on the Intelligent Driver Model;
= the control strategy in the state of “too far vehicle gap”;
= vehicle time headway threshold when triggering and switching to Controller-A; and
= vehicle time headway threshold when triggering and switching to Controller-B.
The core idea of this strategy mainly has two points. The first is to keep the safe distance between vehicles under cyberattacks, and the second is to make the vehicle dynamically adjust the acceleration and gradually restore the stability of the traffic flow. When the vehicle returns to the steady-state position, its velocity shall also reach the steady-state to realize seamless switching with IDM controller. Taking Controller-A as an example, its design motivation and design steps are as follows.
First of all, we hope that the vehicles affected by the cyberattacks will return to the equilibrium position as soon as possible after implementing the strategy. At this time, the vehicle velocity is greater than the steady-state velocity, and the headway is less than the steady-state headway. Therefore, from the perspective of kinematics, the vehicle needs to decelerate first and then accelerate, resulting in the displacement difference with the steady-state, so as to achieve the established steady-state goal, in which a velocity node
needs to be set to connect deceleration and acceleration,
is the proportional coefficient (after preliminary simulation and verification, considering the control efficiency, we set
, which can be optimized in the future). The acceleration solution process is as follows. First, the basic kinematic equation is given as follows:
where
= time required to reach steady-state speed;
= displacement required to reach steady-state speed;
= displacement of vehicle running at steady-state velocity in time ;
Construct
, combined with Equation (6),
Moreover, the displacement difference is equal to the gap difference, that is:
Thus, the acceleration is:
Similarly, Controller-B controls the vehicle to accelerate first and then decelerate to restore the steady state, and the specific expressions of the two acceleration control strategies are as follows:
where
= steady-state velocity;
= steady-state gap;
= maximum deceleration; and
= maximum acceleration.
In addition, we carried out the string stability analysis of the CAV platoon, see
Appendix A for details.
As shown in
Figure 2, we designed an architecture with three layers to investigate the impacts of cyberattacks and RRCS of mixed CAV flow. In the first modeling building layer, we proposed a car-following model considering different cyberattack types for mixed CAV flow based on IDM. RRCS was proposed to mitigate the bad effects of cyberattacks on mixed CAV flow in the strategy construction layer. Finally, in the numerical simulation layer, we compared spatiotemporal evolution diagrams of mixed CAV flow under cyberattacks in two cases with and without RRCS. Moreover, sensitivity analyses were conducted in different platoon compositions, vehicle distributions, and cyberattack intensities.
5. Conclusions
Under the background of possible cyberattacks in the future connected and automated vehicles environment, this paper first builds a CAV mixed traffic flow car-following model considering cyberattacks. This will help us to understand the evolution characteristics of CAV mixed traffic flow under cyberattacks. Furthermore, we design an acceleration control switcher as a robust and resilient control strategy, so that the vehicle can switch the lower layer control strategy according to the current state under the cyberattack scenario. Finally, traffic numerical simulation experiments are carried out to study the impact of cyberattacks on the evolution of CAV mixed traffic flow with or without RRCS, and to verify the feasibility of the RRCS proposed in this paper. The conclusion mainly includes the following five points:
The threat of cyberattacks to CAV mixed traffic flow is significant, and the stability and security of the CAV platoon are adversely affected;
Different forms of cyberattacks will cause different forms and different degrees of harmful effects. For example, vehicles will suddenly accelerate or brake, resulting in too small or too large headways between vehicles, and may even lead to vehicle collisions;
Collusive attacks have the greatest adverse impact on the CAV platoon, as they involve multiple vehicle attacks;
The RRCS proposed in this paper is feasible. It can not only dynamically switch the acceleration control strategy when the vehicle is under cyberattacks, so as to maintain a safe and appropriate headway, but also ensure that the CAV platoon can gradually return to a stable state after being attacked.
The results of the sensitivity analyses indicates that RRCS could effectively alleviate the threat brought by cyberattacks in most scenarios with different platoon composition, vehicle distribution and most different cyberattack intensities, which shows a strong robustness.
Of course, there are still some deficiencies in this paper and the following aspects could be further explored in the future: First, there are common lane changing and overtaking behaviors in real traffic scenarios, which should be considered in the vehicle dynamics model to better describe the characteristics of traffic flow. Secondly, some parameters such as safe headway could vary rather than a fixed value, which will help to improve the universality and persuasion of the model and strategy. Thirdly, more sensor data could be considered such as LIDAR and camera. In this way, it could be possible to merge the proposed approach (RRCS) with the perception outputs and a risk assessment system. Last but not least, the effectiveness of the RRCS proposed in this paper should be verified in various car following models. It is worth mentioning that we also preliminarily confirmed the effectiveness of RRCS in PATH’s CACC car-following model [
35,
36], and the specific modeling and simulation results are shown in the
Appendix B.