A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles
- URL: http://arxiv.org/abs/2108.08635v1
- Date: Thu, 19 Aug 2021 11:59:51 GMT
- Title: A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles
- Authors: Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
- Abstract summary: This paper presents a sensor fusion based Global Navigation Satellite System (GNSS) spoofing attack detection framework for autonomous vehicles.
Data from multiple low-cost in-vehicle sensors are fused and fed into a recurrent neural network model.
We have combined k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect and classify left and right turns.
- Score: 4.947150829838588
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: This paper presents a sensor fusion based Global Navigation Satellite System
(GNSS) spoofing attack detection framework for autonomous vehicles (AV) that
consists of two concurrent strategies: (i) detection of vehicle state using
predicted location shift -- i.e., distance traveled between two consecutive
timestamps -- and monitoring of vehicle motion state -- i.e., standstill/ in
motion; and (ii) detection and classification of turns (i.e., left or right).
Data from multiple low-cost in-vehicle sensors (i.e., accelerometer, steering
angle sensor, speed sensor, and GNSS) are fused and fed into a recurrent neural
network model, which is a long short-term memory (LSTM) network for predicting
the location shift, i.e., the distance that an AV travels between two
consecutive timestamps. This location shift is then compared with the
GNSS-based location shift to detect an attack. We have then combined k-Nearest
Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect and
classify left and right turns using data from the steering angle sensor. To
prove the efficacy of the sensor fusion-based attack detection framework,
attack datasets are created for four unique and sophisticated spoofing
attacks-turn-by-turn, overshoot, wrong turn, and stop, using the publicly
available real-world Honda Research Institute Driving Dataset (HDD). Our
analysis reveals that the sensor fusion-based detection framework successfully
detects all four types of spoofing attacks within the required computational
latency threshold.
Related papers
- Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience [4.898754501085215]
This study explores a stealthy slow drift GPS spoofing attack, replicating the victim AV's satellite reception pattern.
The attack is designed to gradually deviate from the correct route, making real-time detection challenging.
Changing the pseudo ranges confuses the AV, leading it to incorrect destinations while remaining oblivious to the manipulation.
arXiv Detail & Related papers (2024-01-02T17:36:07Z) - Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles [5.624009710240032]
We present a sensor fusion-based spoofing attack detection framework for Autonomous Vehicles.
Experiments are conducted in Tuscaloosa, AL, mimicking urban road structures.
Results demonstrate the framework's ability to detect various sophisticated spoofing attacks, even including slow drifting attacks.
arXiv Detail & Related papers (2024-01-02T17:30:46Z) - Unsupervised Domain Adaptation for Self-Driving from Past Traversal
Features [69.47588461101925]
We propose a method to adapt 3D object detectors to new driving environments.
Our approach enhances LiDAR-based detection models using spatial quantized historical features.
Experiments on real-world datasets demonstrate significant improvements.
arXiv Detail & Related papers (2023-09-21T15:00:31Z) - Correlating sparse sensing for large-scale traffic speed estimation: A
Laplacian-enhanced low-rank tensor kriging approach [76.45949280328838]
We propose a Laplacian enhanced low-rank tensor (LETC) framework featuring both lowrankness and multi-temporal correlations for large-scale traffic speed kriging.
We then design an efficient solution algorithm via several effective numeric techniques to scale up the proposed model to network-wide kriging.
arXiv Detail & Related papers (2022-10-21T07:25:57Z) - Minkowski Tracker: A Sparse Spatio-Temporal R-CNN for Joint Object
Detection and Tracking [53.64390261936975]
We present Minkowski Tracker, a sparse-temporal R-CNN that jointly solves object detection and tracking problems.
Inspired by region-based CNN (R-CNN), we propose to track motion as a second stage of the object detector R-CNN.
We show in large-scale experiments that the overall performance gain of our method is due to four factors.
arXiv Detail & Related papers (2022-08-22T04:47:40Z) - From One to Many: A Deep Learning Coincident Gravitational-Wave Search [58.720142291102135]
We construct a two-detector search for gravitational waves from binary black hole mergers using neural networks trained on non-spinning binary black hole data from a single detector.
We find that none of these simple two-detector networks are capable of improving the sensitivity over applying networks individually to the data from the detectors.
arXiv Detail & Related papers (2021-08-24T13:25:02Z) - Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles [4.947150829838588]
A sensor fusion-based attack detection framework is presented that consists of three concurrent strategies for an autonomous vehicle.
Data from multiple low-cost in-vehicle sensors are fused and fed into a recurrent neural network model.
We have combined k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect turns using data from the steering angle sensor.
Our analysis reveals that the sensor fusion-based detection framework successfully detects all three types of spoofing attacks within the required computational latency threshold.
arXiv Detail & Related papers (2021-06-05T23:02:55Z) - Fooling LiDAR Perception via Adversarial Trajectory Perturbation [13.337443990751495]
LiDAR point clouds collected from a moving vehicle are functions of its trajectories, because the sensor motion needs to be compensated to avoid distortions.
Could the motion compensation consequently become a wide-open backdoor in those networks, due to both the adversarial vulnerability of deep learning and GPS-based vehicle trajectory estimation?
We demonstrate such possibilities for the first time: instead of directly attacking point cloud coordinates which requires tampering with the raw LiDAR readings, only adversarial spoofing of a self-driving car's trajectory with small perturbations is enough.
arXiv Detail & Related papers (2021-03-29T04:34:31Z) - Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles [5.579370215490055]
We have developed a prediction-based spoofing attack detection strategy using the long short-term memory (LSTM) model.
Based on the predicted distance traveled between the current location and the immediate future location, a threshold value is established.
Our analysis revealed that the prediction-based spoofed attack detection strategy can successfully detect the attack in real-time.
arXiv Detail & Related papers (2020-10-16T18:26:59Z) - Defending Water Treatment Networks: Exploiting Spatio-temporal Effects
for Cyber Attack Detection [46.67179436529369]
Water Treatment Networks (WTNs) are critical infrastructures for local communities and public health, WTNs are vulnerable to cyber attacks.
We propose a structured anomaly detection framework to defend WTNs by modeling thetemporal characteristics of cyber attacks in WTNs.
arXiv Detail & Related papers (2020-08-26T15:56:55Z) - DR-SPAAM: A Spatial-Attention and Auto-regressive Model for Person
Detection in 2D Range Data [81.06749792332641]
We propose a person detection network which uses an alternative strategy to combine scans obtained at different times.
DR-SPAAM keeps the intermediate features from the backbone network as a template and recurrently updates the template when a new scan becomes available.
On the DROW dataset, our method outperforms the existing state-of-the-art, while being approximately four times faster.
arXiv Detail & Related papers (2020-04-29T11:01:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.