skip to main content
10.1145/3061639.3062241acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Estimation of Safe Sensor Measurements of Autonomous System Under Attack

Published: 18 June 2017 Publication History

Abstract

The introduction of automation in cyber-physical systems (CPS) has raised major safety and security concerns. One attack vector is the sensing unit whose measurements can be manipulated by an adversary through attacks such as denial of service and delay injection. To secure an autonomous CPS from such attacks, we use a challenge response authentication (CRA) technique for detection of attack in active sensors data and estimate safe measurements using the recursive least square algorithm. For demonstrating effectiveness of our proposed approach, a car-follower model is considered where the follower vehicle's radar sensor measurements are manipulated in an attempt to cause a collision.

References

[1]
M. S. Chong, M. Wakaiki, and J. P. Hespanha. 2015. Observability of linear systems under adversarial attacks. In 2015 ACC. 2439--2444.
[2]
Gerald H Engelman and et al. 2001. Adaptive vehicle cruise control system and methodology. (May 15 2001).
[3]
H. Fawzi, P. Tabuada, and S. Diggavi. 2014. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks. IEEE TAC 59, 6 (June 2014), 1454--1467.
[4]
Simon Haykin. 1996. Adaptive Filter Theory (3rd Ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA.
[5]
Vipul Jain and Payam Heydari. 2013. Radar Fundamentals. In Automotive Radar Sensors in Silicon Technologies. Springer New York, 5--11.
[6]
Shengbo Li, Keqiang Li, Rajesh Rajamani, and Jianqiang Wang. 2011. Model predictive multi-objective vehicular adaptive cruise control. IEEE TCST 19, 3 (2011), 556--566.
[7]
Chung-Wei Lin and et al. 2015. Security-Aware Design Methodology and Optimization for Automotive Systems. ACM TODAES 21, 1 (2015), 18.
[8]
Junkil Park, Radoslav Ivanov, James Weimer, Miroslav Pajic, and Insup Lee. 2015. Sensor attack detection in the presence of transient faults. In ACM/IEEE Sixth ICCPS. ACM, 1--10.
[9]
Jonathan Petit and et al. November, 2015. Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR. In Black Hat Europe.
[10]
Yasser Shoukry and et al. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofng Attacks. In 22Nd ACM SIGSAC CCS, 2015. 1004--1015.
[11]
Y. Shoukry and P. Tabuada. 2014. Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks. In 53rd IEEE CDC. 3548--3553.
[12]
Ashish Tiwari and et al. 2014. Safety Envelope for Security. In HiCoNS. 85--94.

Cited By

View all
  • (2024)Path-Following Control of Autonomous Vehicles Under Sensor Attacks2024 European Control Conference (ECC)10.23919/ECC64448.2024.10590744(3656-3661)Online publication date: 25-Jun-2024
  • (2024)Safeguard Vehicle Platooning Based on Resilient Control Against False Data Injection AttacksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.342468725:11(17023-17037)Online publication date: Nov-2024
  • (2024)Cyberattack Detection and Detector Limitations for Stochastic ProcessesSoutheastCon 202410.1109/SoutheastCon52093.2024.10500099(942-947)Online publication date: 15-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '17: Proceedings of the 54th Annual Design Automation Conference 2017
June 2017
533 pages
ISBN:9781450349277
DOI:10.1145/3061639
© 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2017

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DAC '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Path-Following Control of Autonomous Vehicles Under Sensor Attacks2024 European Control Conference (ECC)10.23919/ECC64448.2024.10590744(3656-3661)Online publication date: 25-Jun-2024
  • (2024)Safeguard Vehicle Platooning Based on Resilient Control Against False Data Injection AttacksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.342468725:11(17023-17037)Online publication date: Nov-2024
  • (2024)Cyberattack Detection and Detector Limitations for Stochastic ProcessesSoutheastCon 202410.1109/SoutheastCon52093.2024.10500099(942-947)Online publication date: 15-Mar-2024
  • (2024)Radar architectures and cyberattacks from an autonomous vehicles perspectiveHandbook of Power Electronics in Autonomous and Electric Vehicles10.1016/B978-0-323-99545-0.00005-1(45-57)Online publication date: 2024
  • (2024)Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection SystemRisks and Security of Internet and Systems10.1007/978-3-031-61231-2_5(51-66)Online publication date: 16-Jun-2024
  • (2023)A Novel Multi-Attack IDS Framework for Intelligent Connected Terminals Based on Over-the-Air Signature UpdatesElectronics10.3390/electronics1210226712:10(2267)Online publication date: 17-May-2023
  • (2023)Cover Chirp Jamming: Hybrid Jamming--Deception Attack on FMCW Radar and Its CountermeasureProceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security10.1145/3605769.3623990(39-50)Online publication date: 30-Nov-2023
  • (2023)PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179458(1822-1839)Online publication date: May-2023
  • (2023)mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179371(1807-1821)Online publication date: May-2023
  • (2023)Asymptotic Performance Limitations in Cyberattack DetectionIEEE Open Journal of Circuits and Systems10.1109/OJCAS.2023.33386394(336-346)Online publication date: 2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media