A Reinforcement Learning Approach for GNSS Spoofing Attack Detection of
Autonomous Vehicles
- URL: http://arxiv.org/abs/2108.08628v1
- Date: Thu, 19 Aug 2021 11:48:27 GMT
- Title: A Reinforcement Learning Approach for GNSS Spoofing Attack Detection of
Autonomous Vehicles
- Authors: Sagar Dasgupta, Tonmoy Ghosh, Mizanur Rahman
- Abstract summary: This paper develops a deep reinforcement learning (RL)-based turn-by-turn spoofing attack detection using low-cost in-vehicle sensor data.
We find that the accuracy of the RL model ranges from 99.99% to 100%, and the recall value is 100%.
Overall, the analyses reveal that the RL model is effective in turn-by-turn spoofing attack detection.
- Score: 3.918774449495583
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: A resilient and robust positioning, navigation, and timing (PNT) system is a
necessity for the navigation of autonomous vehicles (AVs). Global Navigation
Satelite System (GNSS) provides satellite-based PNT services. However, a
spoofer can temper an authentic GNSS signal and could transmit wrong position
information to an AV. Therefore, a GNSS must have the capability of real-time
detection and feedback-correction of spoofing attacks related to PNT receivers,
whereby it will help the end-user (autonomous vehicle in this case) to navigate
safely if it falls into any compromises. This paper aims to develop a deep
reinforcement learning (RL)-based turn-by-turn spoofing attack detection using
low-cost in-vehicle sensor data. We have utilized Honda Driving Dataset to
create attack and non-attack datasets, develop a deep RL model, and evaluate
the performance of the RL-based attack detection model. We find that the
accuracy of the RL model ranges from 99.99% to 100%, and the recall value is
100%. However, the precision ranges from 93.44% to 100%, and the f1 score
ranges from 96.61% to 100%. Overall, the analyses reveal that the RL model is
effective in turn-by-turn spoofing attack detection.
Related papers
- Assimilation Matters: Model-level Backdoor Detection in Vision-Language Pretrained Models [71.44858461725893]
Given a model fine-tuned by an untrusted third party, determining whether the model has been injected with a backdoor is a critical and challenging problem.<n>Existing detection methods usually rely on prior knowledge of training dataset, backdoor triggers and targets.<n>We introduce Assimilation Matters in DETection (AMDET), a novel model-level detection framework that operates without any such prior knowledge.
arXiv Detail & Related papers (2025-11-29T06:20:00Z) - GPS Spoofing Attack Detection in Autonomous Vehicles Using Adaptive DBSCAN [1.932372263677091]
This study presents an adaptive detection approach utilizing a dynamically tuned Density Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm.<n>The modified algorithm effectively identifies turn-by-turn, stop, overshoot, and multiple small biased spoofing attacks.
arXiv Detail & Related papers (2025-10-12T19:06:44Z) - Quantum-Classical Hybrid Framework for Zero-Day Time-Push GNSS Spoofing Detection [8.560939383123657]
We develop a zero-day spoofing detection method using a Hybrid Quantum-Classical Autoencoder (HQC-AE)<n>We focus on spoofing detection in static receivers, where attackers manipulate timing information to induce incorrect time computations at the receiver.<n>Our analysis demonstrates that the HQC-AE consistently outperforms its classical counterpart, traditional supervised learning-based models, and existing unsupervised learning-based methods.
arXiv Detail & Related papers (2025-08-25T14:46:22Z) - GNSS Spoofing Detection Based on Opportunistic Position Information [1.9688858888666714]
Position-based Attack Detection Scheme (PADS) is a probabilistic framework that uses regression and uncertainty analysis for positions.<n>PADS achieves up to 3 times the true positive rate at a low false positive rate.
arXiv Detail & Related papers (2025-06-14T17:27:06Z) - An Efficient Ground-aerial Transportation System for Pest Control Enabled by AI-based Autonomous Nano-UAVs [45.07031440932014]
We design, fine-tune, and optimize a tiny image-based convolutional neural network (CNN) for pest detection.<n>Our CNN runs in real-time at 6.8 frame/s, requiring 33 mW on a GWT GAP9 System-on-Chip aboard a Crazyflie nano-UAV.<n>In this scenario, our efficient transportation system, compared to a traditional single-ground vehicle performing both inspection and treatment, can save up to 20 h working time.
arXiv Detail & Related papers (2025-02-20T11:14:55Z) - GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles [0.8906214436849204]
GPS networks are vulnerable to cyber-attacks like spoofing and jamming.
These threats are expected to intensify with the widespread deployment of AVs.
This paper proposes GPS Intrusion Detection System to detect GPS spoofing attacks on AVs.
arXiv Detail & Related papers (2024-05-14T06:55:16Z) - Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable [70.77600345240867]
A novel arbitrary-in-arbitrary-out (AIAO) strategy makes watermarks resilient to fine-tuning-based removal.
Unlike the existing methods of designing a backdoor for the input/output space of diffusion models, in our method, we propose to embed the backdoor into the feature space of sampled subpaths.
Our empirical studies on the MS-COCO, AFHQ, LSUN, CUB-200, and DreamBooth datasets confirm the robustness of AIAO.
arXiv Detail & Related papers (2024-05-01T12:03:39Z) - Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience [4.898754501085215]
This study explores a stealthy slow drift GPS spoofing attack, replicating the victim AV's satellite reception pattern.
The attack is designed to gradually deviate from the correct route, making real-time detection challenging.
Changing the pseudo ranges confuses the AV, leading it to incorrect destinations while remaining oblivious to the manipulation.
arXiv Detail & Related papers (2024-01-02T17:36:07Z) - Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles [5.624009710240032]
We present a sensor fusion-based spoofing attack detection framework for Autonomous Vehicles.
Experiments are conducted in Tuscaloosa, AL, mimicking urban road structures.
Results demonstrate the framework's ability to detect various sophisticated spoofing attacks, even including slow drifting attacks.
arXiv Detail & Related papers (2024-01-02T17:30:46Z) - Unsupervised Domain Adaptation for Self-Driving from Past Traversal
Features [69.47588461101925]
We propose a method to adapt 3D object detectors to new driving environments.
Our approach enhances LiDAR-based detection models using spatial quantized historical features.
Experiments on real-world datasets demonstrate significant improvements.
arXiv Detail & Related papers (2023-09-21T15:00:31Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - The Dark Side of AutoML: Towards Architectural Backdoor Search [49.16544351888333]
EVAS is a new attack that leverages NAS to find neural architectures with inherent backdoors and exploits such vulnerability using input-aware triggers.
EVAS features high evasiveness, transferability, and robustness, thereby expanding the adversary's design spectrum.
This work raises concerns about the current practice of NAS and points to potential directions to develop effective countermeasures.
arXiv Detail & Related papers (2022-10-21T18:13:23Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Model-Agnostic Defense for Lane Detection against Adversarial Attack [0.0]
Recent work on adversarial road patches have successfully induced perception of lane lines with arbitrary form.
We propose a modular lane verification system that can catch such threats before the autonomous driving system is misled.
Our experiments show that implementing the system with a simple convolutional neural network (CNN) can defend against a wide gamut of attacks on lane detection models.
arXiv Detail & Related papers (2021-03-01T00:05:50Z) - Probing Model Signal-Awareness via Prediction-Preserving Input
Minimization [67.62847721118142]
We evaluate models' ability to capture the correct vulnerability signals to produce their predictions.
We measure the signal awareness of models using a new metric we propose- Signal-aware Recall (SAR)
The results show a sharp drop in the model's Recall from the high 90s to sub-60s with the new metric.
arXiv Detail & Related papers (2020-11-25T20:05:23Z) - Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles [5.579370215490055]
We have developed a prediction-based spoofing attack detection strategy using the long short-term memory (LSTM) model.
Based on the predicted distance traveled between the current location and the immediate future location, a threshold value is established.
Our analysis revealed that the prediction-based spoofed attack detection strategy can successfully detect the attack in real-time.
arXiv Detail & Related papers (2020-10-16T18:26:59Z) - Physically Realizable Adversarial Examples for LiDAR Object Detection [72.0017682322147]
We present a method to generate universal 3D adversarial objects to fool LiDAR detectors.
In particular, we demonstrate that placing an adversarial object on the rooftop of any target vehicle to hide the vehicle entirely from LiDAR detectors with a success rate of 80%.
This is one step closer towards safer self-driving under unseen conditions from limited training data.
arXiv Detail & Related papers (2020-04-01T16:11:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.