March 2025
What is this page?
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
Publications (32)
March 2025
·
4 Reads
March 2025
February 2025
·
4 Reads
The combination of connectivity and automation allows connected and autonomous vehicles (CAVs) to operate autonomously using advanced on-board sensors while communicating with each other via vehicle-to-vehicle (V2V) technology to enhance safety, efficiency, and mobility. One of the most promising features of CAVs is cooperative adaptive cruise control (CACC). This system extends the capabilities of conventional adaptive cruise control (ACC) by facilitating the exchange of critical parameters among vehicles to enhance safety, traffic flow, and efficiency. However, increased connectivity introduces new vulnerabilities, making CACC susceptible to cyber-attacks, including false data injection (FDI) attacks, which can compromise vehicle safety. To address this challenge, we propose a secure observer-based control design leveraging Lyapunov stability analysis, which is capable of mitigating the adverse impact of FDI attacks and ensuring system safety. This approach uniquely addresses system security without relying on a known lead vehicle model. The developed approach is validated through simulation results, demonstrating its effectiveness.
February 2025
·
80 Reads
·
1 Citation
Connected and Autonomous Vehicles (CAVs) have the potential to revolutionize transportation by addressing critical challenges such as safety, energy efficiency, traffic congestion, and environmental impact. Realizing these benefits, however, requires the development of a rigorous testing and verification framework to enable the safe, efficient, and reliable deployment of CAVs across diverse operational scenarios. Despite the growing body of research, there remains a significant gap in review papers that comprehensively summarize recent studies related to the testing and verification of CAVs while identifying current challenges and highlighting future research directions. This paper seeks to address this gap by presenting a comprehensive review of the existing testing and verification frameworks for CAVs and identifying their associated challenges. Key topics covered include scenario generation, verification cost functions, assertion values, and security considerations. Furthermore, the paper highlights limitations within current frameworks, emphasizing the gaps that hinder systematic and comprehensive evaluations.
January 2025
·
6 Reads
·
1 Citation
SAE International Journal of Connected and Automated Vehicles
div>Connected and autonomous vehicles (CAVs) rely on communication channels to improve safety and efficiency. However, this connectivity leaves them vulnerable to potential cyberattacks, such as false data injection (FDI) attacks. We can mitigate the effect of FDI attacks by designing secure control techniques. However, tuning control parameters is essential for the safety and security of such techniques, and there is no systematic approach to achieving that. In this article, our primary focus is on cooperative adaptive cruise control (CACC), a key component of CAVs. We develop a secure CACC by integrating model-based and learning-based approaches to detect and mitigate FDI attacks in real-time. We analyze the stability of the proposed resilient controller through Lyapunov stability analysis, identifying sufficient conditions for its effectiveness. We use these sufficient conditions and develop a reinforcement learning (RL)-based tuning algorithm to adjust the parameter gains of the controller, observer, and FDI attack estimator, ensuring the safety and security of the developed CACC under varying conditions. We evaluated the performance of the developed controller before and after optimizing parameters, and the results show about a 50% improvement in accuracy of the FDI attack estimation and a 76% enhancement in safe following distance with the optimized controller in each scenario.</div
August 2024
·
5 Reads
·
1 Citation
International Journal of Systems Science
August 2024
·
11 Reads
·
6 Citations
IEEE Transactions on Intelligent Transportation Systems
Cooperative adaptive cruise control (CACC) is one of the many advanced driver assistance systems (ADAS) that leverage communication between nearby vehicles to maintain speed while ensuring safe following distances. The current CACC algorithms are designed with the assumption that the communication channel is secure. However, the use of communication channels makes CACC susceptible to attacks, such as False data injection (FDI). This paper develops a novel secure nonlinear controller and a nonlinear observer which can estimate FDI attacks in real-time. Furthermore, this paper shows that the developed controller and FDI attack estimation techniques ensure semi-globally uniformly bounded tracking under FDI attacks, noise, and disturbances. The efficaciousness of the proposed CACC algorithm was demonstrated in simulation and through experimental implementation. During testing using both methodologies, the controller was able to maintain a safe following distance and estimate FDI attacks and noise in real-time.
May 2024
·
1 Citation
International Journal of Systems Science
May 2024
·
1,619 Reads
·
95 Citations
Digital world has produced efficiencies, new innovative products, and close customer relationships globally by the effective use of mobile, IoT (Internet of Things), social media, analytics and cloud technology to generate models for better decisions. Blockchain is recently introduced and revolutionizing the digital world bringing a new perspective to security, resiliency and efficiency of systems. While initially popularized by Bitcoin, Blockchain is much more than a foundation for crypto currency. It offers a secure way to exchange any kind of good, service, or transaction. Industrial growth increasingly depends on trusted partnerships; but increasing regulation, cybercrime and fraud are inhibiting expansion. To address these challenges, Blockchain will enable more agile value chains, faster product innovations, closer customer relationships, and quicker integration with the IoT and cloud technology. Further Blockchain provides a lower cost of trade with a trusted contract monitored without intervention from third parties who may not add direct value. It facilitates smart contracts, engagements, and agreements with inherent, robust cyber security features. This paper is an effort to break the ground for presenting and demonstrating the use of Blockchain technology in multiple industrial applications. A healthcare industry application, Healthchain, is formalized and developed on the foundation of Blockchain using IBM Blockchain initiative. The concepts are transferable to a wide range of industries as finance, government and manufacturing where security, scalability and efficiency must meet.
Citations (23)
... Forensic data is processed by large amounts of AI with great speed, shortening the backlogs and enhancing decision making. Furthermore, AI is also useful in cyberforensics in threat detection, digital evidence analysis and predictive modeling for cybercrimes thereby leading to a proactive measure of digital investigations [3]. Though the AI has advanced significantly, the integration of AI into forensic science faces many issues due to data privacy, ethical concerns, and the need for explainable AI models to guarantee transparency in legal cases. ...
- Citing Article
- Full-text available
February 2025
... Additionally, it introduced a Lyapunov-based controller designed to reduce the adverse effects of FDI attacks, measurement noise, and external disturbances in CACC, ensuring the maintenance of a safe distance between vehicles. Further research on CACC under FDI attacks was presented in [22]. This study addressed the effects of FDI attacks, input time-varying delays, external disturbances, and measurement noise by developing a nonlinear controller, observer, and NN-based attack estimators. ...
- Citing Article
August 2024
International Journal of Systems Science
... EVs' energy efficiency increasing can be achieved through various approaches, including advancements in battery technology, driver training [5], improvements in power electronics, and optimization of vehicle control systems [6]. Also, some methods are studied in the literature to increase EV energy efficiency by increasing the efficiency of electric motors, as highlighted in [7]. ...
- Citing Chapter
- Full-text available
January 2024
... Another approach to improving EV efficiency, as explored in [11], involves optimizing energy consumption through energy management strategies under different driving cycles. With the recent advancements in connected and automated vehicle (CAV) technologies [12,13], higher energy efficiency can be achieved by the adoption of CAV features as discussed in [1]. ...
- Citing Article
- Full-text available
May 2024
... Another approach to improving EV efficiency, as explored in [11], involves optimizing energy consumption through energy management strategies under different driving cycles. With the recent advancements in connected and automated vehicle (CAV) technologies [12,13], higher energy efficiency can be achieved by the adoption of CAV features as discussed in [1]. ...
- Citing Article
August 2024
IEEE Transactions on Intelligent Transportation Systems
... BTA has a positive effect on the development of FP (Kumar et al., 2022) since, in the specific contexts, digital business strategies correlate with process innovation and financial success (Khalil et al., 2022). Moreover, BTA is recognized for more than its role as a cryptocurrency foundation through facilitating fluid value networks, rapid product development, enhanced customer connections and streamlined web and cloud-based integration (Ahram et al., 2017). Various features of BTA, including traceability, reliability, transparency and tokenization can support the circular economy (Kouhizadeh et al., 2023). ...
- Citing Article
- Full-text available
May 2024
... When combined with EEG data, Virtual Reality Exposure Therapy (VRET) [3] has enhanced the precision of diagnoses, enabling highly individualized treatments within its framework. EEG applications in VR driving [4] simulations have provided critical insights into cognitive processes like driver fatigue, navigation, obstacle avoidance, and real-time monitoring [5]. Distinct EEG microstates [6] reveal the emotional shifts within VR environments, with sharp transitions between microstates linked to positive or negative emotions. ...
- Citing Conference Paper
March 2024
... The hardware components of CAVs that are vulnerable to attacks include those within the automatic control systems, such as the ECU and Controller Area Network (CAN), as well as components of autonomous driving systems like LiDAR, GPS receivers, cameras, RADAR, and the Onboard Diagnosis (OBD) interface [202]. Sensors, which are critical hardware components of CAVs, are particularly susceptible to spoofing, jamming, tampering, adversarial attacks, and Denial of Service (DoS) attacks [203]. ...
- Citing Conference Paper
March 2024
... For instance, [22,23] introduced an automated braking planning system utilizing a dynamic programming-based energyefficient deceleration strategy to enhance regenerative energy recovery. Also, in the work reported in [24] an automated braking system aimed at maximizing RBS effectiveness. However, these studies did not compare their results with human braking behavior. ...
- Citing Conference Paper
- Full-text available
March 2024
... This section provides an overview of the recent concepts and mathematical representations of the testing and verification framework for CAVs and AVs as discussed in [35,[120][121][122]. Detailed elaborations on the framework's components are provided in the subsequent subsections. ...
- Citing Article
- Full-text available
January 2024
IEEE Access