Impact Analysis of Cyberattacks in Electric Propulsion Systems for Hybrid Tracked Vehicles
DOI:
10.4271/2024-01-4114
Publication Date:
2024-09-16T02:15:25Z
AUTHORS (8)
ABSTRACT
<div class="section abstract">
<div class="htmlview paragraph">In the age of advancing digitalization and integrating complex electronics within
modern vehicles, hybrid tracked vehicles (HTVs) are increasingly becoming
susceptible to cybersecurity threats. Particularly vulnerable are the control
units, which have become prime targets for adversarial exploitation due to their
pivotal role in vehicle functionality. To address these security concerns, this
study demonstrates two distinct yet equally harmful scenarios using replay and
DoS attacks to uncover and evaluate vulnerabilities within the Energy Management
System (EMS) of HEVs. In the replay attack scenario, the adversary
surreptitiously alters the SoC control messages emanating from the Battery
Management System (BMS). The attack is calibrated to strategically time and
sequence the message replays across various operational states using
reinforcement learning, thereby maintaining apparent legitimacy within expected
SoC ranges to evade detection. The DoS attack, however, presents a more direct
threat by targeting the generator’s revolution speed sensors. By
compromising these sensors, the attack disrupts the generator and causes
subsequent engine shutdowns, compelling the battery to singularly meet the
vehicle’s power supply demands. Formal attack models are developed and
subsequently deployed on a simulated HTV platform within MATLAB/Simulink to
analyze the impacts of these cyberattacks. The simulation results illustrate the
impacts of the simulated cyberattacks, further reinforcing the importance of
resilient and adaptive security measures for the control layer.</div>
</div>
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (22)
CITATIONS (1)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....