ترغب بنشر مسار تعليمي؟ اضغط هنا

Event-triggered Add-on Safety for Connected and Automated Vehicles Using Road-side Network Infrastructure

72   0   0.0 ( 0 )
 نشر من قبل Mohammad H. Mamduhi
 تاريخ النشر 2019
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper proposes an event-triggered add-on safety mechanism to adjust the control parameters for timely braking in a networked vehicular system while maintaining maneuverability. Passenger vehicle maneuverability is significantly affected by the combined-slip friction effect, in which larger longitudinal tire slips result in considerable drop in lateral tire forces. This is of higher importance when unexpected dangerous situations occur on the road and immediate actions, such as braking, need to be taken to avoid collision. Harsh braking can lead to high-slip and loss of maneuverability, hence, timely braking is essential to reduce high-slip scenarios. In addition to the vehicles own active safety systems, the proposed event-triggered add-on safety is activated upon being informed about dangers by the road-side infrastructure. The aim is to incorporate the add-on safety feature to adjust the automatic control parameters for smooth and timely braking such that a collision is avoided while vehicles maneuverability is maintained. We study two different wireless technologies for communication between the infrastructure and the vehicles, the Long-Term Evolution (LTE) and the fifth generation (5G) schemes. The framework is validated through high-fidelity software simulations and the advantages of including the add-on feature to augment the safety margins for each communication technology is evaluated.



قيم البحث

اقرأ أيضاً

112 - Tianci Yang , Chen Lv 2021
By using various sensors to measure the surroundings and sharing local sensor information with the surrounding vehicles through wireless networks, connected and automated vehicles (CAVs) are expected to increase safety, efficiency, and capacity of ou r transportation systems. However, the increasing usage of sensors has also increased the vulnerability of CAVs to sensor faults and adversarial attacks. Anomalous sensor values resulting from malicious cyberattacks or faulty sensors may cause severe consequences or even fatalities. In this paper, we increase the resilience of CAVs to faults and attacks by using multiple sensors for measuring the same physical variable to create redundancy. We exploit this redundancy and propose a sensor fusion algorithm for providing a robust estimate of the correct sensor information with bounded errors independent of the attack signals, and for attack detection and isolation. The proposed sensor fusion framework is applicable to a large class of security-critical Cyber-Physical Systems (CPSs). To minimize the performance degradation resulting from the usage of estimation for control, we provide an $H_{infty}$ controller for CACC-equipped CAVs capable of stabilizing the closed-loop dynamics of each vehicle in the platoon while reducing the joint effect of estimation errors and communication channel noise on the tracking performance and string behavior of the vehicle platoon. Numerical examples are presented to illustrate the effectiveness of our methods.
132 - Tianci Yang , Chen Lv 2021
Connected and Automated Vehicles (CAVs) rely on the correctness of position and other vehicle kinematics information to fulfill various driving tasks such as vehicle following, lane change, and collision avoidance. However, a malicious vehicle may se nd false sensor information to the other vehicles intentionally or unintentionally, which may cause traffic inconvenience or loss of human lives. Here, we take the advantage of cloud-computing and increase the resilience of CAVs to malicious vehicles by assuming each vehicle shares its local sensor information with other vehicles to create information redundancy on the cloud side. We exploit this redundancy and propose a sensor fusion algorithm for the cloud, capable of providing a robust state estimation of all vehicles in the cloud under the condition that the number of malicious information is sufficiently small. Using the proposed estimator, we provide an algorithm for isolating malicious vehicles. We use numerical examples to illustrate the effectiveness of our methods.
The paper considers the problem of controlling Connected and Automated Vehicles (CAVs) traveling through a three-entry roundabout so as to jointly minimize both the travel time and the energy consumption while providing speed-dependent safety guarant ees, as well as satisfying velocity and acceleration constraints. We first design a systematic approach to dynamically determine the safety constraints and derive the unconstrained optimal control solution. A joint optimal control and barrier function (OCBF) method is then applied to efficiently obtain a controller that optimally track the unconstrained optimal solution while guaranteeing all the constraints. Simulation experiments are performed to compare the optimal controller to a baseline of human-driven vehicles showing effectiveness under symmetric and asymmetric roundabout configurations, balanced and imbalanced traffic rates and different sequencing rules for CAVs.
The emergence of the connected and automated vehicle (CAV) technology enables numerous advanced applications in our transportation system, benefiting our daily travels in terms of safety, mobility, and sustainability. However, vehicular communication technologies such as Dedicated Short-Range Communications (DSRC) or Cellular-Based Vehicle-to-Everything (C-V2X) communications unavoidably introduce issues like communication delay and packet loss, which will downgrade the performances of any CAV applications. In this study, we propose a consensus-based motion estimation methodology to estimate the vehicle motion when the vehicular communication environment is not ideal. This methodology is developed based on the consensus-based feedforward/feedback motion control algorithm, estimating the position and speed of a CAV in the presence of communication delay and packet loss. The simulation study is conducted in a traffic scenario of unsignalized intersections, where CAVs coordinate with each other through V2X communications and cross intersections without any full stop. Game engine-based human-in-the-loop simulation results shows the proposed motion estimation methodology can cap the position estimation error to 0.5 m during periodic packet loss and time-variant communication delay.
Cooperative Adaptive Cruise Control (CACC) is an autonomous vehicle-following technology that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is accomplished by exchanging inter-vehicle data through Vehicle-to-Vehic le (V2V) wireless communication networks. CACC increases traffic throughput and safety, and decreases fuel consumption. However, the surge of vehicle connectivity has brought new security challenges as vehicular networks increasingly serve as new access points for adversaries trying to deteriorate the platooning performance or even cause collisions. In this manuscript, we propose a novel attack detection scheme that leverage real-time sensor/network data and physics-based mathematical models of vehicles in the platoon. Nevertheless, even the best detection scheme could lead to conservative detection results because of unavoidable modelling uncertainties, network effects (delays, quantization, communication dropouts), and noise. It is hard (often impossible) for any detector to distinguish between these different perturbation sources and actual attack signals. This enables adversaries to launch a range of attack strategies that can surpass the detection scheme by hiding within the system uncertainty. Here, we provide risk assessment tools (in terms of semidefinite programs) for Connected and Automated Vehicles (CAVs) to quantify the potential effect of attacks that remain hidden from the detector (referred here as emph{stealthy attacks}). A numerical case-study is presented to illustrate the effectiveness of our methods.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا