Abstract
Modern urban vehicles adopt sensing, communication and computing modules into almost every functioning aspect to assist humans in driving. However, the advanced technologies are inherently vulnerable to attacks, exposing vehicles to severe security risks. In this work, we focus on the detection of sensor and actuator attacks that are capable of actively altering vehicle behavior and directly causing damages to human beings and vehicles. We develop a collaborative intrusion detection system where each vehicle leverages sensing data from its onboard sensors and neighboring vehicles to detect sensor and actuator attacks without a centralized authority. The detection utilizes the unique feature that clean data and contaminated data are correlated through the physical dynamics of the vehicle. We demonstrate the effectiveness of the detection system in a scaled autonomous vehicle testbed by launching attacks through various attack channels.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We do not differentiate controller or human driver in the rest of the paper and refer to them as controller.
- 2.
A detailed explanation on why the NUISE algorithm can determine which mode reflects the authentic values is provided in [12] Sect. 5.2.
- 3.
Notations \(\dagger \) and \(|\cdot |_{+}\) refer pseudoinverse and pseudodeterminant, respectively.
References
Car Hacking Research: Remote attack Tesla motors. Keen Security Lab of Tencent (2016). http://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
Chinese group hacks a Tesla for the second year in a row (2017). https://www.usatoday.com/story/tech/2017/07/28/chinese-group-hacks-tesla-second-year-row/518430001/
Introducing the new NVIDIA DRIVE PX 2 for autocruise driving and HD mapping (2017). http://www.nvidia.com/object/drive-px.html
Nvidia driveworks software development kit for self driving cars (2017). https://developer.nvidia.com/driveworks
NVIDIA Jetson TK1 (2017). http://www.nvidia.com/object/jetson-tk1-embedded-dev-kit.html
RC TT02 Chassis - TT02 Factory Finished (2017). https://www.tamiyausa.com/items/radio-control-kits-30/rc-semi-assembled-chassis-35900/rc-tt02-chassis-57984?product-id=57984
Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. (TISSEC) 3, 186–205 (2000)
Bauza, R., Gozalvez, J., Sanchez-Soriano, J.: Road traffic congestion detection through cooperative vehicle-to-vehicle communications. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN) (2010)
Bezzo, N., Weimer, J., Pajic, M., Sokolsky, O., Pappas, G.J., Lee, I.: Attack resilient state estimation for autonomous robotic systems. In: IROS (2014)
Duda, R.O., Hart, P.E.: Use of the Hough transformation to detect lines and curves in pictures. Commun. ACM 15, 11–15 (1972)
Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59, 1454–1467 (2014)
Guo, P., Kim, H., Virani, N., Xu, J., Zhu, M., Liu, P.: Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots. arXiv preprint arXiv:1708.01834 (2017)
Hafner, M.R., Cunningham, D., Caminiti, L., Del Vecchio, D.: Cooperative collision avoidance at intersections: algorithms and experiments. IEEE Trans. Intell. Transp. Syst. 14, 1162–1175 (2013)
Hartenstein, H., Laberteaux, L.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6) (2008)
Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., OHanlon, B.W., Kintner Jr., P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Proceedings of the ION GNSS International Technical Meeting of the Satellite Division (2008)
Kuipers, J.B., et al.: Quaternions and Rotation Sequences. Princeton University Press, Princeton (1999)
Lee, W., Stolfo, S.J., et al.: Data mining approaches for intrusion detection. In: USENIX Security (1998)
Lichodzijewski, P., Zincir-Heywood, A.N., Heywood, M.I.: Host-based intrusion detection using self-organizing maps. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002 (2002)
Litman, T.: Autonomous vehicle implementation predictions. Implications for transport planning (2014). http://www.vtpi.org/avip.pdf
Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1, 370–379 (2014)
Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat, USA (2015)
Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC) (2010)
Pajic, M., Tabuada, P., Lee, I., Pappas, G.J.: Attack-resilient state estimation in the presence of noise. In: 2015 54th IEEE Conference on Decision and Control (CDC) (2015)
Park, J., Ivanov, R., Weimer, J., Pajic, M., Lee, I.: Sensor attack detection in the presence of transient faults. In: ICCPS (2015)
Park, P., Khadilkar, H., Balakrishnan, H., Tomlin, C.J.: High confidence networked control for next generation air transportation systems. IEEE Trans. Autom. Control 59, 3357–3372 (2014)
Pasqualetti, F., Carli, R., Bullo, F.: Distributed estimation via iterative projections with application to power network monitoring. Automatica 48, 747–758 (2012)
Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58, 2715–2729 (2013)
Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., Júnior, J.C., Katsikas, S.: A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Comput. Secur. 64, 92–109 (2017)
Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435–2463 (1999)
Petit, J., Stottelaar, B., Feiri, M., Kargl, F.: Remote attacks on automated vehicles sensors: experiments on camera and LiDAR. Black Hat, Europe (2015)
Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Wheeler, R., Ng, A.Y.: ROS: an open-source robot operating system. In: ICRA workshop on open source software (2009)
Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: LISA (1999)
Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in Neural Information Processing Systems (1998)
Schweber, B.: The autonomous car: a diverse array of sensors drives navigation, driving, and performance (2017). http://www.mouser.com/applications/autonomous-car-sensors-drive-performance/
Volpe, J.: Vulnerability assessment of the transportation infrastructure relying on the global positioning system (2001)
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy (1999)
Wu, Y.S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS. In: 2003 Proceedings of 19th Annual Computer Security Applications Conference (2003)
Yan, C., Xu, W., Liu, J.: Can you trust autonomous vehicles: contactless attacks against sensors of self-driving vehicle. In: 24th DEFCON Hacking Conference (2016)
Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit. 36, 229–243 (2003)
Yong, S., Zhu, M., Frazzoli, E.: Resilient state estimation against switching attacks on stochastic cyber-physical systems. In: CDC (2015)
Zeng, W., Chow, M.Y.: Resilient distributed control in the presence of misbehaving agents in networked control systems. IEEE Trans. Cybern. 44, 2038–2049 (2014)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (2000)
Acknowledgement
This work was supported by NSF CNS-1505664, ARO W911NF-13-1-0421 (MURI) and ARO W911NF-15-1-0576.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A Data Processing with Measurement Models
IPS. The IPS sensor directly measures and returns the states of a vehicle.
Wheel encoder. The raw data measured by the wheel encoders are the distances traveled by each wheel \((l_L, l_R)\). In data processing phase, we convert them into vehicle states using previous states \(\mathbf x _{k-1}\): \(x_{k} = x_{k-1} + (l_L+l_R)\cos \theta _{k}/2\), \(y_{k} = y_{k-1} + (l_L+l_R)\sin \theta _{k}/2\), \(\theta _{k} = \theta _{k-1} + (l_R-l_L)/R\), where R is the distance between the left and the right wheel.
IMU. The IMU sensor generates a quaternion \([q_0,q_1,q_2,q_3]^T\), a 3-D acceleration \(\mathbf a _{k,M}^{local}\), and a 3-D rotational speed \(\mathbf w _{k,M}^{local}\) on body-fixed coordinate. We first obtain coordinate transformation matrix from body-fixed coordinate to global coordinate [16]:
Acceleration vector and rotation speed on the global coordinate system can be obtained as \(C(q)\mathbf a _{k,M}^{local}\) and \(C(q)\mathbf w _{k,M}^{local}\), respectively. Vehicle velocity vector can be updated by: \(\mathbf v _k=[v_{k,M}^x,v_{k,M}^y,v_{k,M}^z]^T = \mathbf v _{k-1}+\mathbf a _k^{global}T\). Then the state vector can be calculated by integration as follows: \(x_k=x_{k-1}\,+\,v_{k,M}^xT\,+\,\frac{1}{2}a_{k,M}^x T^2\), \(y_k=y_{k-1}+v_{k,M}^yT+\frac{1}{2}a_{k,M}^y T^2\), \(\theta _k = \theta _{k-1}+w_{k,M}^z T\).
After the data processing phase for each sensor, sensor readings transmitted to the controller are in the form of vehicle states. For navigation sensors, we have: \(\mathbf z _{k, i} = \mathbf x _{k}+\mathbf d _{k, i}^s+\xi _{k, i}, i = I,W,M\), where \(\mathbf d _{k, i}^s=[d_{k,i}^{s, x},d_{k,i}^{s, y},d_{k,i}^{s, \theta }]^T\), \(\xi _{k, i}=[\xi _{k, i}^x, \xi _{k, i}^y, \xi _{k, i}^\theta ]^T\) refer to attack vectors and measurement noises for each navigation sensor, respectively.
Appendix B Algorithms
Algorithms 2 and 3Footnote 3 are proposed in the Appendix of [12]. We include them here to be self-contained.
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Guo, P., Kim, H., Guan, L., Zhu, M., Liu, P. (2018). VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 238. Springer, Cham. https://doi.org/10.1007/978-3-319-78813-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-78813-5_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78812-8
Online ISBN: 978-3-319-78813-5
eBook Packages: Computer ScienceComputer Science (R0)