Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle Perception (2310.05041v3)

Published 8 Oct 2023 in cs.RO, cs.SY, and eess.SY

Abstract: As a rapidly growing cyber-physical platform, Autonomous Vehicles (AVs) are encountering more security challenges as their capabilities continue to expand. In recent years, adversaries are actively targeting the perception sensors of autonomous vehicles with sophisticated attacks that are not easily detected by the vehicles' control systems. This work proposes an Anomaly Behavior Analysis approach to detect a perception sensor attack against an autonomous vehicle. The framework relies on temporal features extracted from a physics-based autonomous vehicle behavior model to capture the normal behavior of vehicular perception in autonomous driving. By employing a combination of model-based techniques and machine learning algorithms, the proposed framework distinguishes between normal and abnormal vehicular perception behavior. To demonstrate the application of the framework in practice, we performed a depth camera attack experiment on an autonomous vehicle testbed and generated an extensive dataset. We validated the effectiveness of the proposed framework using this real-world data and released the dataset for public access. To our knowledge, this dataset is the first of its kind and will serve as a valuable resource for the research community in evaluating their intrusion detection techniques effectively.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (13)
  1. Singh, Santokh. “Critical reasons for crashes investigated in the national motor vehicle crash causation survey.” No. DOT HS 812 115. 2015.
  2. National Highway Traffic Safety Administration. “Early Estimates of Motor Vehicle Traffic Fatalities And Fatality Rate by Sub-Categories in 2022” (2023): 1-9.
  3. Petrović, Dorde and Mijailović, Radomir and Pešić, Dalibor. “Traffic accidents with autonomous vehicles: type of collisions, maneuvers and errors of conventional vehicles’ drivers.” Transportation Research Procedia 45 (2020): 161-168.
  4. Litman, Todd. “Autonomous vehicle implementation predictions: Implications for transport planning.” (2020).
  5. Petit, Jonathan, and Steven E. Shladover. “Potential cyberattacks on automated vehicles.” IEEE Transactions on Intelligent transportation systems 16.2 (2014): 546-556.
  6. Liu, Jinshan, and Jung-Min Park. “Seeing is not always believing: detecting perception error attacks against autonomous vehicles.” IEEE Transactions on Dependable and Secure Computing 18.5 (2021): 2209-2223.
  7. Ivanov, Radoslav, Miroslav Pajic, and Insup Lee. “Attack-resilient sensor fusion for safety-critical cyber-physical systems.” ACM Transactions on Embedded Computing Systems (TECS) 15.1 (2016): 1-24.
  8. Milaat, Fahad Ali, and Hang Liu. “Decentralized detection of GPS spoofing in vehicular ad hoc networks.” IEEE Communications Letters 22.6 (2018): 1256-1259.
  9. Satam, Pratik, and Salim Hariri. “WIDS: An anomaly-based intrusion detection system for Wi-Fi (IEEE 802.11) protocol.” IEEE Transactions on Network and Service Management 18.1 (2020): 1077-1091.
  10. Tagne, Gilles, Reine Talj, and Ali Charara. “Design and comparison of robust nonlinear controllers for the lateral dynamics of intelligent vehicles.” IEEE Transactions on Intelligent Transportation Systems 17.3 (2015): 796-809.
  11. The QCar Quanser Project. Available online: https://www.quanser.com/products/qcar/ (accessed on 1 June 2023).
  12. Yan, Chen, Wenyuan Xu, and Jianhao Liu. “Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle.” Def Con 24.8 (2016): 109.
  13. Mehrab Abrar, Murad. (2023) “AVP-Dataset.” Available online: https://github.com/mehrab-abrar/AVP-Dataset/
Citations (1)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com