Abstract
For future fully autonomous vehicles, systems that utilize external sensors to recognize and judge the surrounding environment will become necessary. LiDAR plays an excellent role in autonomous driving because it provides accurate information by forming a 3D map. However, if the LiDAR sensor malfunctions and provides incorrect information, self-driving cars may be exposed to dangerous situations on the road. Many prior studies have recently been published demonstrating severe physical LiDAR spoofing attacks to induce obstacle misdetection. While existing research focuses on physically accessible spoofing attacks, this paper proposes an Ethernet data packet injection attack that can occur on a network using the Velodyne LiDAR VLP-16 (PUCK) sensor. The proposed method generated Ethernet data packets by replacing them with meaningless values based on analysis of Ethernet data packets on the network. A DoS attack was performed by injecting a large amount of data based on this. Additionally, based on these attacks, we would like to present a response methodology for LiDAR ethernet DoS attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gomes, T., Roriz, R., Cunha, L., Ganal, A., Soares, N., Araújo, T., Monteiro, J.: Evaluation and testing system for automotive LiDAR sensors. Appl. Sci. 12(24), 13003 (2022)
Campbell, S., O’Mahony, N., Krpalcova, L., Riordan, D., Walsh, J., Murphy, A., Ryan, C.: Sensor technology in autonomous vehicles: A review. In: 29th Irish Signals and Systems Conference (ISSC), pp. 1–4. IEEE (2018)
Comerón, A., Muñoz-Porcar, C., Rocadenbosch, F., Rodríguez-Gómez, A., Sicard, M.: Current research in lidar technology used for the remote sensing of atmospheric aerosols. Sensors 17(6), 1450 (2017). https://doi.org/10.3390/s17061450
Debnath, S., Paul, M., Debnath, T.: Applications of LiDAR in agriculture and future research directions. J. Imaging 9(3), 57 (2023)
Chan, J., Raghunath, A., Michaelsen, K.E., Gollakota, S.: Testing a drop of liquid using smartphone LiDAR. Proc. ACM on Interact. Mob. Wearable and Ubiquitous Technol. 6(1), 1–27 (2022)
Khader, M., Cherian, S.: An introduction to automotive lidar. Texas Instruments (2020)
Cao, Y., Xiao, C., Cyr, B., Zhou, Y., Park, W., Rampazzi, S., Chen, Q. A., Fu, K., Mao, Z.M.: Adversarial sensor attack on lidar-based perception in autonomous driving. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2267–2281 (2019)
Ji Jin, Z., Ji, X., Cheng, Y., Yang, B., Yan, C., Xu, W.: Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle. In: 2023 IEEE Symposium on Security and Privacy, pp. 1822–1839 (SP) (2023)
Shin, H., Kim, D., Kwon, Y., Kim, Y.: Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications. In: Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International Conference, pp. 445–467 (2017)
Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Europe 11, 995 (2015)
Sun, J., Cao, Y., Chen, Q.A., Mao, Z.M.: Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 877–894 (2020)
TURING Drive Taps Velodyne Lidar for Autonomous Driving Development (2020). https://velodynelidar.com/blog/turing-drive-taps-velodyne-lidar-for-autonomous-driving-development/
Velodyne: Velodyne User Manual (2019). https://velodynelidar.com/wp-content/uploads/2019/12/63-9243-Rev-E-VLP-16-User-Manual.pdf
Innoviz tehnologies, Designing a Level 3 LiDAR for Highway Driving, https://downloads.innoviz-tech.com/ (2022)
Livox: Livox Tele-15 user manual v1.2.pdf. https://www.livoxtech.com/downloads (2020)
Ouster: datasheet-rev7-v3p0-osdome.pdf (2023). https://data.ouster.io/downloads/datasheets/datasheet-rev7-v3p0-osdome.pdf
Kocić, J., Jovičić, N., Drndarević, V.: Sensors and sensor fusion in autonomous vehicles. In: 2018 26th Telecommunications Forum (TELFOR), pp. 420–425. IEEE (2018)
Hwang, S.: Network separation construction method using network virtualization. J. Korea Instit. Inform. Commun. Eng. (2020) 1071–1076
Wang, Q., Lu, Z., Qu, G.: An entropy analysis based intrusion detection system for controller area network in vehicles. In: 2018 31st IEEE International System-on-Chip Conference (SOCC), pp. 90–95 (2018)
Acknowledgments
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1A4A2001810) (NRF-2018R1A4A1025632), This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2022-0-01197, Convergence security core talent training business (Soon Chun Hyang University)).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, Y., Oh, I., Hwang, J., Jeong, M., Yim, K. (2024). Effect of DoS Attack into LiDAR Ethernet. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 214. Springer, Cham. https://doi.org/10.1007/978-3-031-64766-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-64766-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-64765-9
Online ISBN: 978-3-031-64766-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)