Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Controls and Control Theory
Cyber-Threat Detection Strategies Governed By An Observer And A Neural-Network For An Autonomous Electric Vehicle, Douglas Scruggs
Cyber-Threat Detection Strategies Governed By An Observer And A Neural-Network For An Autonomous Electric Vehicle, Douglas Scruggs
All Theses
A pathway to prevalence for autonomous electrified transportation is reliant upon accurate and reliable information in the vehicle’s sensor data. This thesis provides insight as to the effective cyber-attack placements on an autonomous electric vehicle’s lateral stability control system (LSCS). Here, Data Integrity Attacks, Replay Attacks, and Denial-of-Service attacks are placed on the sensor data describing the vehicle’s actual yaw-rate and sideslip angle. In this study, there are three different forms of detection methods. These detection methods utilize a residual metric that incorporate sensor data, a state-space observer, and a Neural-Network. The vehicle at hand is a four-motor drive autonomous …