Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3565287.3610253acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Wave-for-Safe: Multisensor-based Mutual Authentication for Unmanned Delivery Vehicle Services

Published: 16 October 2023 Publication History

Abstract

In recent years, the deployment of unmanned vehicle delivery services has increased unprecedentedly, leading to a need for enhanced security due to the risk of leaving high-value packages to an unauthorized third party during pickup or delivery. Existing authentication methods such as QR code and one-time password are inadequate, as they are susceptible to attacks and provide only one-way authentication. This paper, for the first time to our best knowledge, proposes Wave-for-Safe (W4S) --- a novel mutual authentication system that utilizes multi-modal sensors on both the user's smartphone and the unmanned vehicle. W4S uses random hand-waving by the legitimate user to achieve robust authentication by obtaining highly correlated sensory data measured by the Inertial Measurement Unit (IMU) in the smartphone and sensors in the unmanned vehicle (e.g., mmWave radar and camera). We propose several novel methods to overcome challenges such as heterogeneous data processing, asynchronization, and imitating attacks. The prototype is implemented on an unmanned vehicle and various smartphones, and evaluation in different real-world scenarios shows that W4S achieves an equal error rate below 0.013 against various attacks.

References

[1]
Pablo Arbelaez, Michael Maire, Charless Fowlkes, and Jitendra Malik. 2010. Contour detection and hierarchical image segmentation. IEEE TPAMI (2010).
[2]
Ron Y Asmar, David T Proefke, Charles J Bongiorno, and Aaron P Creguer. 2017. Method and system for authenticating vehicle equipped with passive keyless system. US Patent 9,710,983.
[3]
Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Čapkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, et al. 2018. Security of distance-bounding: A survey. ACM CSUR (2018).
[4]
John H Borghi. 1965. Distribution of human reaction time. Perceptual and motor skills (1965).
[5]
Guowei Cai, Ben M Chen, and Tong Heng Lee. 2011. Coordinate systems and transformations. In Springer Unmanned rotorcraft systems.
[6]
Gerard Canal, Sergio Escalera, and Cecilio Angulo. 2016. A real-time humanrobot interaction system based on gestures for assistive scenarios. Elsevier CVIU (2016).
[7]
Christine Chou. 2021. Alibaba's Driverless Robots Just Made Their One Millionth E-commerce Delivery. https://www.alizila.com/alibaba-driverless-robots-one-millionth-ecommerce-delivery/.
[8]
Clevon. 2022. CLEVON 1. https://clevon.com.
[9]
Cas Cremers, Kasper B Rasmussen, Benedikt Schmidt, and Srdjan Capkun. 2012. Distance hijacking attacks on distance bounding protocols. In IEEE S&P.
[10]
Dog-qiuqiu. 2021. Yolo-FastestV2: V0.2. https://github.com/dog-qiuqiu/Yolo-FastestV2.
[11]
Boyu Fan, Xuefeng Liu, Xiang Su, Pan Hui, and Jianwei Niu. 2020. EmgAuth: An EMG-based smartphone unlocking system using siamese network. In IEEE PerCom.
[12]
FedEx. 2022. Roxo. https://www.fedex.com/en-us/innovation/roxo-delivery-robot.html.
[13]
Andrea Ferlini, Dong Ma, Robert Harle, and Cecilia Mascolo. 2021. EarGate: Gait-based user identification with in-ear microphones. In ACM MobiCom.
[14]
Aurélien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS.
[15]
Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, and Wenke Lee. 2016. From physical to cyber: Escalating protection for personalized auto insurance. In ACM SenSys.
[16]
Anthony James. 2022. DHL teams up with TuSimple on autonomous trucking operations. https://www.autonomousvehicleinternational.com/news/trucks/dhl-teams-with-tusimple-on-autonomous-trucking-operations.html.
[17]
Meng Jin and Xinbing Wang. 2022. Pairing IoT Devices with Spatial Keys. In ACM/IEEE IPSN.
[18]
Timothy David Kentley-Klay, Rachad Youssef Gamara, and Gary Linscott. 2019. Software application to request and control an autonomous vehicle service. US Patent 10,446,037.
[19]
Felix Kreuk, Yossi Adi, Moustapha Cisse, and Joseph Keshet. 2018. Fooling end-to-end speaker verification with adversarial examples. In IEEE ICASSP.
[20]
Zeyu Lei, Yuhong Nan, Yanick Fratantonio, and Antonio Bianchi. 2021. On the insecurity of SMS one-time password messages against local attackers in modern mobile devices. In NDSS.
[21]
Bo Li, Wei Wu, Qiang Wang, Fangyi Zhang, Junliang Xing, and Junjie Yan. 2019. Siamrpn++: Evolution of siamese visual tracking with very deep networks. In CVPR.
[22]
Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch well before use: Intuitive and secure authentication for iot devices. In ACM MobiCom.
[23]
Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, and Jianying Zhou. 2022. A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles. arXiv preprint arXiv:2203.14965 (2022).
[24]
Marketsandmarkets Research Private Ltd. 2022. Autonomous Last Mile Delivery Market. https://www.marketsandmarkets.com/Market-Reports/autonomous-last-mile-delivery-market-41240862.html.
[25]
Nuro, Inc. 2022. Nuro. https://www.nuro.ai/.
[26]
Daniel Peralta, Isaac Triguero, Raul Sanchez-Reillo, Francisco Herrera, and José Manuel Benítez. 2014. Fast fingerprint identification for large databases. Pattern Recognition (2014).
[27]
Sonia Mutreja Prateek Yadav. 2022. Autonomous Last Mile Delivery Market by Application, Solution, Range and Vehicle Type: Global Opportunity Analysis and Industry Forecast, 2021--2030. https://www.alliedmarketresearch.com/autonomous-last-mile-delivery-market.
[28]
Kasper Bonne Rasmussen and Srdjan Capkun. 2010. Realization of RF distance bounding. In USENIX Security.
[29]
RobotoLab. 2022. Price of NAO ROBOT V6. https://www.robotlab.com/store/nao-power-v6-educator-pack.
[30]
Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In IEEE Trustcom.
[31]
Ralph Schmidt. 1986. Multiple emitter location and signal parameter estimation. IEEE TAP (1986).
[32]
Sean Scott. 2019. Meet Scout. https://www.aboutamazon.com/news/transportation/meet-scout.
[33]
Jonathan Sharp, Chuxiong Wu, and Qiang Zeng. 2022. Authentication for drone delivery through a novel way of using face biometrics. In ACM Mobicom.
[34]
Sheng Shen, Mahanth Gowda, and Romit Roy Choudhury. 2018. Closing the gaps in inertial motion tracking. In ACM MobiCom.
[35]
Starship Technologies. 2022. Starship. https://www.starship.xyz/.
[36]
Udelv. 2008. Udelv. https://www.udelv.com/.
[37]
Universal Postal Union. 2021. Number of parcels distributed worldwide from 2015 to 2020. https://www.statista.com/statistics/737418/parcel-traffic-worldwide-by-sector/.
[38]
Vincent T Van Hees, Lukas Gorzelniak, Emmanuel Carlos Dean León, Martin Eder, Marcelo Pias, Salman Taherian, Ulf Ekelund, Frida Renström, Paul W Franks, Alexander Horsch, et al. 2013. Separating movement and gravity components in an acceleration signal and implications for the assessment of human daily physical activity. PloS one (2013).
[39]
David Wells, Norman Beck, Alfred Kleusberg, Edward J Krakiwsky, Gerard Lachapelle, Richard B Langley, Klaus-peter Schwarz, James M Tranquilla, Petr Vanicek, and Demitris Delikaraoglou. 1987. Guide to GPS positioning. In Citeseer Canadian GPS Assoc.
[40]
Wired. 2017. Just a Pair of These $11 Radio Gadgets Can Steal a Car. https://www.wired.com/2017/04/just-pair-11-radio-gadgets-can-steal-car/.
[41]
Chuxiong Wu, Xiaopeng Li, Lannan Luo, and Qiang Zeng. 2022. G2Auth: Secure mutual authentication for drone delivery without special user-side hardware. In ACM Mobisys.
[42]
Chuxiong Wu and Qiang Zeng. 2023. Turning noises to fingerprint-free "credentials": Secure and usable authentication for drone delivery. arXiv preprint arXiv:2302.09197 (2023).
[43]
Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2016. Walkie-Talkie: Motion-assisted automatic key generation for secure on-body device communication. In ACM/IEEE IPSN.
[44]
Xiangyu Xu, Jiadi Yu, Yingying Chen, Qin Hua, Yanmin Zhu, Yi-Chao Chen, and Minglu Li. 2020. TouchPass: Towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations. In ACM MobiCom.
[45]
Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, and Xinwen Fu. 2012. Fingerprint attack against touch-enabled devices. In ACM SPSM.
[46]
Bing Zhou, Zongxing Xie, Yinuo Zhang, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2021. Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones. IEEE TMC (2021).

Cited By

View all

Index Terms

  1. Wave-for-Safe: Multisensor-based Mutual Authentication for Unmanned Delivery Vehicle Services

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
      October 2023
      621 pages
      ISBN:9781450399265
      DOI:10.1145/3565287
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 October 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. unmanned vehicle delivery
      3. sensor fusion

      Qualifiers

      • Research-article

      Funding Sources

      • NSFC
      • Research Grants Council of the Hong Kong Special Administrative Region
      • Shenzhen Science and Technology Funding Fundamental Research Program
      • NSF of Shandong Province
      • Research impact fund

      Conference

      MobiHoc '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 296 of 1,843 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 261
        Total Downloads
      • Downloads (Last 12 months)198
      • Downloads (Last 6 weeks)18
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media