Date of Award:


Document Type:


Degree Name:

Master of Science (MS)


Electrical and Computer Engineering


Ryan Gerdes


Automated vehicles promise to be one of the most constructive inventions of late as they promote road safety, fuel efficiency, and reduced time road travel, by decreasing traffic congestion and workload on the driver. In a platoon (which is a method of grouping vehicles, which helps increase the capacity of roads by managing the distance between vehicles by using electrical and mechanical coupling) of such automated vehicles, as in automated highway systems (AHS), tracking of inter-vehicular spacing is one of the significant factors to be considered. Because of the close spacing, computer-controlled platoons with inter-vehicular communication, which is the concept of adaptive cruise control (ACC), become open to cyber security attacks.

Cyber physical and cyber attacks on smart grid systems in the electricity market have been a focus of researchers, and much work has been done on that front. However, cyber physical (CP) attacks on autonomous vehicle platoons have not been examined. Thus this research entails the survey of a number of vehicle models used in different works pertaining to longitudinal vehicle motion and analysis of a special class of cyber physical attacks called false data injection (FDI) attacks on vehicle platoons moving with longitudinal motion. In this kind of attack, an attacker can exploit the configuration of any cyber physical system to launch such attacks to successfully introduce arbitrary errors into certain state variables so as to gain control over the system. So here, an n-vehicle platoon is considered and a linearized vehicle model is used as a testbed to study vehicle dynamics and control, after false information is fed into the system.