Quantum secured LiDAR with Gaussian modulated coherent states
- URL: http://arxiv.org/abs/2308.12171v1
- Date: Wed, 23 Aug 2023 14:45:39 GMT
- Title: Quantum secured LiDAR with Gaussian modulated coherent states
- Authors: Dong Wang, Juan-Ying Zhao, Ya-Chao Wang, Liang-Jiang Zhou, and Yi-Bo
Zhao
- Abstract summary: LiDAR systems that rely on classical signals are susceptible to intercept-and-recent spoofing attacks.
We propose a quantum-secured LiDAR protocol that utilizes Gaussian modulated coherent states for both range determination and spoofing attack detection.
- Score: 6.207058145190368
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: LiDAR systems that rely on classical signals are susceptible to
intercept-and-recent spoofing attacks, where a target attempts to avoid
detection. To address this vulnerability, we propose a quantum-secured LiDAR
protocol that utilizes Gaussian modulated coherent states for both range
determination and spoofing attack detection. By leveraging the Gaussian nature
of the signals, the LiDAR system can accurately determine the range of the
target through cross-correlation analysis. Additionally, by estimating the
excess noise of the LiDAR system, the spoofing attack performed by the target
can be detected, as it can introduce additional noise to the signals. We have
developed a model for target detection and security check, and conducted
numerical simulations to evaluate the Receiver Operating Characteristic (ROC)
of the LiDAR system. The results indicate that an intercept-and-recent spoofing
attack can be detected with a high probability at a low false-alarm rate.
Furthermore, the proposed method can be implemented using currently available
technology, highlighting its feasibility and practicality in real-world
applications.
Related papers
- Filtered Randomized Smoothing: A New Defense for Robust Modulation Classification [16.974803642923465]
We study the problem of designing robust modulation classifiers that can provide provable defense against arbitrary attacks.
We propose Filtered Randomized Smoothing (FRS), a novel defense which combines spectral filtering together with randomized smoothing.
We show that FRS significantly outperforms existing defenses including AT and RS in terms of accuracy on both attacked and benign signals.
arXiv Detail & Related papers (2024-10-08T20:17:25Z) - Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS [2.632261166782093]
We propose the first framework of IDS that is robust against joint poisoning and evasion attacks.
We verify the robustness of our method on the IEEE-13 bus feeder model against a diverse set of poisoning and evasion attack scenarios.
arXiv Detail & Related papers (2024-05-05T16:24:30Z) - Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable [70.77600345240867]
A novel arbitrary-in-arbitrary-out (AIAO) strategy makes watermarks resilient to fine-tuning-based removal.
Unlike the existing methods of designing a backdoor for the input/output space of diffusion models, in our method, we propose to embed the backdoor into the feature space of sampled subpaths.
Our empirical studies on the MS-COCO, AFHQ, LSUN, CUB-200, and DreamBooth datasets confirm the robustness of AIAO.
arXiv Detail & Related papers (2024-05-01T12:03:39Z) - Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection [11.14938737864796]
We propose CAPTAIN, a rule-based PIDS capable of automatically adapting to diverse environments.
We build a differentiable tag propagation framework and utilize the gradient descent algorithm to optimize these adaptive parameters.
The evaluation results demonstrate that CAPTAIN offers better detection accuracy, less detection latency, lower runtime overhead, and more interpretable detection alarms and knowledge.
arXiv Detail & Related papers (2024-04-23T03:50:57Z) - Extending RAIM with a Gaussian Mixture of Opportunistic Information [1.9688858888666714]
Original receiver autonomous integrity monitoring (RAIM) was not designed for securing.
We extend RAIM by incorporating all opportunistic information, i.e., measurements from terrestrial infrastructures and onboard sensors.
The objective is to assess the likelihood of spoofing by analyzing locations derived from extended RAIM solutions.
arXiv Detail & Related papers (2024-02-05T19:03:18Z) - FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning
Attacks in Federated Learning [98.43475653490219]
Federated learning (FL) is susceptible to poisoning attacks.
FreqFed is a novel aggregation mechanism that transforms the model updates into the frequency domain.
We demonstrate that FreqFed can mitigate poisoning attacks effectively with a negligible impact on the utility of the aggregated model.
arXiv Detail & Related papers (2023-12-07T16:56:24Z) - ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal
Consistency [11.160041268858773]
Deep neural networks (DNNs) are increasingly integrated into LiDAR-based perception systems for autonomous vehicles (AVs)
We aim to address the challenge of LiDAR spoofing attacks, where attackers inject fake objects into LiDAR data and fool AVs to misinterpret their environment and make erroneous decisions.
We propose ADoPT (Anomaly Detection based on Point-level Temporal consistency), which quantitatively measures temporal consistency across consecutive frames and identifies abnormal objects based on the coherency of point clusters.
In our evaluation using the nuScenes dataset, our algorithm effectively counters various LiDAR spoofing attacks, achieving a low (
arXiv Detail & Related papers (2023-10-23T02:31:31Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Radio-Assisted Human Detection [61.738482870059805]
We propose a radio-assisted human detection framework by incorporating radio information into the state-of-the-art detection methods.
We extract the radio localization and identifer information from the radio signals to assist the human detection.
Experiments on the simulative Microsoft COCO dataset and Caltech pedestrian datasets show that the mean average precision (mAP) and the miss rate can be improved with the aid of radio information.
arXiv Detail & Related papers (2021-12-16T09:53:41Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Optimally Displaced Threshold Detection for Discriminating Binary
Coherent States Using Imperfect Devices [50.09039506170243]
We analytically study the performance of the generalized Kennedy receiver having optimally displaced threshold detection (ODTD) in a realistic situation with noises and imperfect devices.
We show that the proposed greedy search algorithm can obtain a lower and smoother error probability than the existing works.
arXiv Detail & Related papers (2020-07-21T21:52:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.