Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3437539.3437617acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Exploring inherent sensor redundancy for automotive anomaly detection

Published: 18 November 2020 Publication History

Abstract

The increasing autonomy and connectivity have been transitioning automobiles to complex and open architectures that are vulnerable to malicious attacks beyond conventional cyber attacks. Attackers may non-invasively compromise sensors and spoof the controller to perform unsafe actions. This concern emphasizes the need to validate sensor data before acting on them. Unlike existing works, this paper exploits inherent redundancy among heterogeneous sensors for detecting anomalous sensor measurements. The redundancy is that multiple sensors simultaneously respond to the same physical phenomenon in a related fashion. Embedding the redundancy into a deep autoencoder, we propose an anomaly detector that learns a consistent pattern from vehicle sensor data in normal states and utilizes it as the nominal behavior for the detection. The proposed method is independent of the scarcity of anomalous data for training and the intensive calculation of pairwise correlation among senors as in existing works. Using a real-world data set collected from tens of vehicle sensors, we demonstrate the feasibility and efficacy of the proposed method.

References

[1]
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al., "Experimental security analysis of a modern automobile," in IEEE Symposium on Security and Privacy, 2010.
[2]
M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, and K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative driving," IEEE Communications Magazine, 2015.
[3]
S. Parkinson, P. Ward, K. Wilson, and J. Miller, "Cyber threats facing autonomous and connected vehicles: Future challenges," IEEE transactions on intelligent transportation systems, 2017.
[4]
M. Pajic, J. Weimer, N. Bezzo, P. Tabuada, O. Sokolsky, I. Lee, and G. J. Pappas, "Robustness of attack-resilient state estimators," in ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2014.
[5]
F. Kong, M. Xu, J. Weimer, O. Sokolsky, and I. Lee, "Cyber-physical system checkpointing and recovery," in ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2018.
[6]
A. H. Rutkin, "spoofers use fake gps signals to knock a yacht off course," MIT Technology Review, 2013.
[7]
Y. Shoukry, P. Martin, P. Tabuada, and M. Srivastava, "Non-invasive spoofing attacks for anti-lock braking systems," in International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2013.
[8]
J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, "Remote attacks on automated vehicles sensors: Experiments on camera and lidar," Black Hat Europe, 2015.
[9]
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, "Attacks against process control systems: risk assessment, detection, and response," in Proceedings of the ACM symposium on information, computer and communications security, 2011.
[10]
R. Ivanov, M. Pajic, and I. Lee, "Attack-resilient sensor fusion for safety-critical cyber-physical systems," ACM Transactions on Embedded Computing Systems, 2016.
[11]
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE transactions on dependable and secure computing, 2004.
[12]
Q. Zhang, T. Yu, and P. Ning, "A framework for identifying compromised nodes in sensor networks," in Securecomm and Workshops. IEEE, 2006.
[13]
D. Kwon, H. Kim, J. Kim, S. C. Suh, I. Kim, and K. J. Kim, "A survey of deep learning-based network anomaly detection," Cluster Computing, 2017.
[14]
C. Kaiser, A. Stocker, and A. Festl, "Automotive CAN bus data: An Example Dataset from the AEGIS Big Data Project," 2019. [Online]. Available
[15]
A. Ganesan, J. Rao, and K. Shin, "Exploiting consistency among heterogeneous sensors for vehicle anomaly detection," SAE Technical Paper, Tech. Rep., 2017.
[16]
T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive can networks-practical examples and selected short-term countermeasures," in International Conference on Computer Safety, Reliability, and Security. Springer, 2008.
[17]
A. Taylor, N. Japkowicz, and S. Leblanc, "Frequency-based anomaly detection for the automotive can bus," in World Congress on Industrial Control Systems Security. IEEE, 2015.
[18]
C. Liu, S. Ghosal, Z. Jiang, and S. Sarkar, "An unsupervised spatiotemporal graphical modeling approach to anomaly detection in distributed cps," in ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2016.

Cited By

View all
  • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
  • (2022)Attack-resilient Fusion of Sensor Data with Uncertain DelaysACM Transactions on Embedded Computing Systems10.1145/353218121:4(1-25)Online publication date: 23-Aug-2022
  • (2021)Towards scalable, secure, and smart mission-critical IoT systemsProceedings of the 2021 International Conference on Embedded Software10.1145/3477244.3477624(1-10)Online publication date: 30-Sep-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '20: Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference
July 2020
1545 pages
ISBN:9781450367257
  • General Chair:
  • Zhuo Li

Sponsors

In-Cooperation

  • IEEE-CEDA

Publisher

IEEE Press

Publication History

Published: 18 November 2020

Check for updates

Author Tags

  1. anomaly detection
  2. autoencoder
  3. autonomous vehicle
  4. natural redundancy
  5. sensor

Qualifiers

  • Research-article

Conference

DAC '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
  • (2022)Attack-resilient Fusion of Sensor Data with Uncertain DelaysACM Transactions on Embedded Computing Systems10.1145/353218121:4(1-25)Online publication date: 23-Aug-2022
  • (2021)Towards scalable, secure, and smart mission-critical IoT systemsProceedings of the 2021 International Conference on Embedded Software10.1145/3477244.3477624(1-10)Online publication date: 30-Sep-2021
  • (2021)Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic RegulatorACM Transactions on Embedded Computing Systems10.1145/347701020:5s(1-24)Online publication date: 17-Sep-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media