Search papers, labs, and topics across Lattice.
This paper demonstrates that Kalman filters in Adaptive Cruise Control (ACC) systems have bounded tolerance to fault-injection attacks on speed measurements, beyond which unsafe acceleration decisions and collisions can occur. To address this vulnerability, they propose ACC-IDS, an augmented ACC controller that incorporates Intrusion Detection System (IDS) outputs to trigger emergency braking when an intrusion is detected. They prove that ACC-IDS, under certain detection performance and latency constraints, can mitigate these attacks and maintain collision-avoidance guarantees.
Even with Kalman filters, Adaptive Cruise Control systems can be dangerously vulnerable to fault-injection attacks, but a simple intrusion detection system can restore safety guarantees.
An Adaptive Cruise Control (ACC) system automatically adjusts the host vehicle's speed to maintain a safe following distance from a lead vehicle. In typical implementations, a feedback controller (e.g., a Proportional-Integral-Derivative (PID) controller) computes the host vehicle's acceleration using a target speed and a spacing error, defined as the difference between the measured inter-vehicle distance and a desired safe distance. ACC is often assumed to be resilient to fault-injection attacks because a Kalman filter (KF) can smooth noisy speed measurements. However, we show--through analytical proofs and simulation results--that a KF can tolerate injected speed values only up to a bounded threshold. When injected values exceed this threshold, the filter can be driven off track, causing the ACC controller to make unsafe acceleration decisions and potentially leading to collisions. Our main contribution is to augment the PID-based controller with Intrusion Detection System (IDS) outputs, yielding Intrusion Detection Systems-Based Adaptive Cruise Control (ACC-IDS). The ACC-IDS controller is simple and implementable: a binary intrusion flag switches the control law to emergency braking. We prove that augmenting ACC with an IDS, under assumed detection-performance and latency constraints, can mitigate these attacks and help preserve ACC's collision-avoidance guarantees.