Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles
- URL: http://arxiv.org/abs/2401.01304v1
- Date: Tue, 2 Jan 2024 17:30:46 GMT
- Title: Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles
- Authors: Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman
- Abstract summary: We present a sensor fusion-based spoofing attack detection framework for Autonomous Vehicles.
Experiments are conducted in Tuscaloosa, AL, mimicking urban road structures.
Results demonstrate the framework's ability to detect various sophisticated spoofing attacks, even including slow drifting attacks.
- Score: 5.624009710240032
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In this paper, we validate the performance of the a sensor fusion-based
Global Navigation Satellite System (GNSS) spoofing attack detection framework
for Autonomous Vehicles (AVs). To collect data, a vehicle equipped with a GNSS
receiver, along with Inertial Measurement Unit (IMU) is used. The detection
framework incorporates two strategies: The first strategy involves comparing
the predicted location shift, which is the distance traveled between two
consecutive timestamps, with the inertial sensor-based location shift. For this
purpose, data from low-cost in-vehicle inertial sensors such as the
accelerometer and gyroscope sensor are fused and fed into a long short-term
memory (LSTM) neural network. The second strategy employs a Random-Forest
supervised machine learning model to detect and classify turns, distinguishing
between left and right turns using the output from the steering angle sensor.
In experiments, two types of spoofing attack models: turn-by-turn and wrong
turn are simulated. These spoofing attacks are modeled as SQL injection
attacks, where, upon successful implementation, the navigation system perceives
injected spoofed location information as legitimate while being unable to
detect legitimate GNSS signals. Importantly, the IMU data remains uncompromised
throughout the spoofing attack. To test the effectiveness of the detection
framework, experiments are conducted in Tuscaloosa, AL, mimicking urban road
structures. The results demonstrate the framework's ability to detect various
sophisticated GNSS spoofing attacks, even including slow position drifting
attacks. Overall, the experimental results showcase the robustness and efficacy
of the sensor fusion-based spoofing attack detection approach in safeguarding
AVs against GNSS spoofing threats.
Related papers
- AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience [4.898754501085215]
This study explores a stealthy slow drift GPS spoofing attack, replicating the victim AV's satellite reception pattern.
The attack is designed to gradually deviate from the correct route, making real-time detection challenging.
Changing the pseudo ranges confuses the AV, leading it to incorrect destinations while remaining oblivious to the manipulation.
arXiv Detail & Related papers (2024-01-02T17:36:07Z) - Spatial-Temporal Anomaly Detection for Sensor Attacks in Autonomous
Vehicles [1.7188280334580195]
Time-of-flight (ToF) distance measurement devices are vulnerable to spoofing, triggering and false data injection attacks.
We propose a spatial-temporal anomaly detection model textitSTAnDS which incorporates a residual error spatial detector, with a time-based expected change detection.
arXiv Detail & Related papers (2022-12-15T12:21:27Z) - A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles [4.947150829838588]
This paper presents a sensor fusion based Global Navigation Satellite System (GNSS) spoofing attack detection framework for autonomous vehicles.
Data from multiple low-cost in-vehicle sensors are fused and fed into a recurrent neural network model.
We have combined k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect and classify left and right turns.
arXiv Detail & Related papers (2021-08-19T11:59:51Z) - Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles [4.947150829838588]
A sensor fusion-based attack detection framework is presented that consists of three concurrent strategies for an autonomous vehicle.
Data from multiple low-cost in-vehicle sensors are fused and fed into a recurrent neural network model.
We have combined k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect turns using data from the steering angle sensor.
Our analysis reveals that the sensor fusion-based detection framework successfully detects all three types of spoofing attacks within the required computational latency threshold.
arXiv Detail & Related papers (2021-06-05T23:02:55Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Object Detection Made Simpler by Eliminating Heuristic NMS [70.93004137521946]
We show a simple NMS-free, end-to-end object detection framework.
We attain on par or even improved detection accuracy compared with the original one-stage detector.
arXiv Detail & Related papers (2021-01-28T02:38:29Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles [5.579370215490055]
We have developed a prediction-based spoofing attack detection strategy using the long short-term memory (LSTM) model.
Based on the predicted distance traveled between the current location and the immediate future location, a threshold value is established.
Our analysis revealed that the prediction-based spoofed attack detection strategy can successfully detect the attack in real-time.
arXiv Detail & Related papers (2020-10-16T18:26:59Z) - Defending Water Treatment Networks: Exploiting Spatio-temporal Effects
for Cyber Attack Detection [46.67179436529369]
Water Treatment Networks (WTNs) are critical infrastructures for local communities and public health, WTNs are vulnerable to cyber attacks.
We propose a structured anomaly detection framework to defend WTNs by modeling thetemporal characteristics of cyber attacks in WTNs.
arXiv Detail & Related papers (2020-08-26T15:56:55Z) - Investigating Robustness of Adversarial Samples Detection for Automatic
Speaker Verification [78.51092318750102]
This work proposes to defend ASV systems against adversarial attacks with a separate detection network.
A VGG-like binary classification detector is introduced and demonstrated to be effective on detecting adversarial samples.
arXiv Detail & Related papers (2020-06-11T04:31:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.