Skip to main content

Effect of DoS Attack into LiDAR Ethernet

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2024)

Abstract

For future fully autonomous vehicles, systems that utilize external sensors to recognize and judge the surrounding environment will become necessary. LiDAR plays an excellent role in autonomous driving because it provides accurate information by forming a 3D map. However, if the LiDAR sensor malfunctions and provides incorrect information, self-driving cars may be exposed to dangerous situations on the road. Many prior studies have recently been published demonstrating severe physical LiDAR spoofing attacks to induce obstacle misdetection. While existing research focuses on physically accessible spoofing attacks, this paper proposes an Ethernet data packet injection attack that can occur on a network using the Velodyne LiDAR VLP-16 (PUCK) sensor. The proposed method generated Ethernet data packets by replacing them with meaningless values based on analysis of Ethernet data packets on the network. A DoS attack was performed by injecting a large amount of data based on this. Additionally, based on these attacks, we would like to present a response methodology for LiDAR ethernet DoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gomes, T., Roriz, R., Cunha, L., Ganal, A., Soares, N., Araújo, T., Monteiro, J.: Evaluation and testing system for automotive LiDAR sensors. Appl. Sci. 12(24), 13003 (2022)

    Article  Google Scholar 

  2. Campbell, S., O’Mahony, N., Krpalcova, L., Riordan, D., Walsh, J., Murphy, A., Ryan, C.: Sensor technology in autonomous vehicles: A review. In: 29th Irish Signals and Systems Conference (ISSC), pp. 1–4. IEEE (2018)

    Google Scholar 

  3. Comerón, A., Muñoz-Porcar, C., Rocadenbosch, F., Rodríguez-Gómez, A., Sicard, M.: Current research in lidar technology used for the remote sensing of atmospheric aerosols. Sensors 17(6), 1450 (2017). https://doi.org/10.3390/s17061450

    Article  Google Scholar 

  4. Debnath, S., Paul, M., Debnath, T.: Applications of LiDAR in agriculture and future research directions. J. Imaging 9(3), 57 (2023)

    Article  Google Scholar 

  5. Chan, J., Raghunath, A., Michaelsen, K.E., Gollakota, S.: Testing a drop of liquid using smartphone LiDAR. Proc. ACM on Interact. Mob. Wearable and Ubiquitous Technol. 6(1), 1–27 (2022)

    Article  Google Scholar 

  6. Khader, M., Cherian, S.: An introduction to automotive lidar. Texas Instruments (2020)

    Google Scholar 

  7. Cao, Y., Xiao, C., Cyr, B., Zhou, Y., Park, W., Rampazzi, S., Chen, Q. A., Fu, K., Mao, Z.M.: Adversarial sensor attack on lidar-based perception in autonomous driving. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2267–2281 (2019)

    Google Scholar 

  8. Ji Jin, Z., Ji, X., Cheng, Y., Yang, B., Yan, C., Xu, W.: Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle. In: 2023 IEEE Symposium on Security and Privacy, pp. 1822–1839 (SP) (2023)

    Google Scholar 

  9. Shin, H., Kim, D., Kwon, Y., Kim, Y.: Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications. In: Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International Conference, pp. 445–467 (2017) 

    Google Scholar 

  10. Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Europe 11, 995 (2015)

    Google Scholar 

  11. Sun, J., Cao, Y., Chen, Q.A., Mao, Z.M.: Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 877–894 (2020)

    Google Scholar 

  12. TURING Drive Taps Velodyne Lidar for Autonomous Driving Development (2020). https://velodynelidar.com/blog/turing-drive-taps-velodyne-lidar-for-autonomous-driving-development/

  13. Velodyne: Velodyne User Manual (2019). https://velodynelidar.com/wp-content/uploads/2019/12/63-9243-Rev-E-VLP-16-User-Manual.pdf

  14. Innoviz tehnologies, Designing a Level 3 LiDAR for Highway Driving, https://downloads.innoviz-tech.com/ (2022)

  15. Livox: Livox Tele-15 user manual v1.2.pdf. https://www.livoxtech.com/downloads (2020)

  16. Ouster: datasheet-rev7-v3p0-osdome.pdf (2023). https://data.ouster.io/downloads/datasheets/datasheet-rev7-v3p0-osdome.pdf

  17. Kocić, J., Jovičić, N., Drndarević, V.: Sensors and sensor fusion in autonomous vehicles. In: 2018 26th Telecommunications Forum (TELFOR), pp. 420–425. IEEE (2018)

    Google Scholar 

  18. Hwang, S.: Network separation construction method using network virtualization. J. Korea Instit. Inform. Commun. Eng. (2020) 1071–1076

    Google Scholar 

  19. Wang, Q., Lu, Z., Qu, G.: An entropy analysis based intrusion detection system for controller area network in vehicles. In: 2018 31st IEEE International System-on-Chip Conference (SOCC), pp. 90–95 (2018)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810) (NRF-2018R1A4A1025632), This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2022-0-01197, Convergence security core talent training business (Soon Chun Hyang University)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, Y., Oh, I., Hwang, J., Jeong, M., Yim, K. (2024). Effect of DoS Attack into LiDAR Ethernet. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 214. Springer, Cham. https://doi.org/10.1007/978-3-031-64766-6_8

Download citation

Publish with us

Policies and ethics