Map-Based Localization Under Adversarial Attacks

Due to increasing proliferation of autonomous vehicles, securing robot navigation against malicious attacks becomes a matter of urgent societal interest, because attackers can fool these vehicles by manipulating their sensors, exposing us to unprecedented vulnerabilities and ever-increasing possibilities for malicious attacks. To address this issue, we analyze in-depth the Maximum Correntropy Criterion Extended Kalman Filter (MCC-EKF) and propose a weighted MCC-EKF (WMCC-EKF) algorithm by systematically, rather than in an ad-hoc way, inflating the noise covariance of the compromised measurements based on each measurement’s quality. As a conservative alternative, we also design a secure estimator by first detecting attacks based on \(\ell _0 (\ell _1)\)-optimization assuming that only a small number of measurements can be attacked, and then employ a sliding-window Kalman filter to update the state estimates and covariance using only the uncompromised measurements—the resulting algorithm is termed Secure Estimation-EKF (SE-EKF). Both Monte-Carlo simulations and experiments are performed to validate the proposed secure estimators for map-based localization.

[1]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[2]  Claire J. Tomlin,et al.  Secure Estimation based Kalman Filter for Cyber-Physical Systems against Adversarial Attacks , 2015, ArXiv.

[3]  Hadi Sadoghi Yazdi,et al.  Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noise , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[4]  Paulo Tabuada,et al.  Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[5]  Stephen P. Boyd,et al.  An Interior-Point Method for Large-Scale $\ell_1$-Regularized Least Squares , 2007, IEEE Journal of Selected Topics in Signal Processing.

[6]  Stergios I. Roumeliotis,et al.  IMU-RGBD camera 3D pose estimation and extrinsic calibration: Observability analysis and consistency improvement , 2013, 2013 IEEE International Conference on Robotics and Automation.

[7]  F. Dellaert Factor Graphs and GTSAM: A Hands-on Introduction , 2012 .

[8]  Ninghui Li,et al.  Introduction to special section SACMAT'08 , 2011, TSEC.

[9]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[10]  Paulo Tabuada,et al.  Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[11]  Paulo Tabuada,et al.  A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks , 2015, ArXiv.

[12]  Claire J. Tomlin,et al.  Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks , 2016, ArXiv.

[13]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[14]  R. Murray,et al.  Multi-dimensional state estimation in adversarial environment , 2015, 2015 34th Chinese Control Conference (CCC).

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[16]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[17]  M. V. Kulikova,et al.  Square-root algorithms for maximum correntropy estimation of linear discrete-time systems in presence of non-Gaussian noise , 2016, Syst. Control. Lett..

[18]  Dan Simon,et al.  Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noise , 2016 .

[19]  Insup Lee,et al.  Attack resilient state estimation for autonomous robotic systems , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[20]  Xi Liu,et al.  Extended Kalman filter under maximum correntropy criterion , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[21]  Stergios I. Roumeliotis,et al.  Observability-based Rules for Designing Consistent EKF SLAM Estimators , 2010, Int. J. Robotics Res..

[22]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[23]  Paulo Tabuada,et al.  Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).

[24]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[25]  A. Krener,et al.  Nonlinear controllability and observability , 1977 .

[26]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[27]  Stergios I. Roumeliotis,et al.  Stochastic cloning: a generalized framework for processing relative state measurements , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).

[28]  Eduardo Mario Nebot,et al.  Optimization of the simultaneous localization and map-building algorithm for real-time implementation , 2001, IEEE Trans. Robotics Autom..

[29]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.