Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles

Autonomous vehicles rely on sensors to measure road condition and make driving decisions, and their safety relies heavily on the reliability of these sensors. Out of all obstacle detection sensors, ultrasonic sensors have the largest market share and are expected to be increasingly installed on automobiles. Such sensors discover obstacles by emitting ultrasounds and analyzing their reflections. By exploiting the built-in vulnerabilities of sensors, we designed random spoofing, adaptive spoofing, and jamming attacks on ultrasonic sensors, and we managed to trick a vehicle to stop when it should keep moving, and let it fail to stop when it should. We validate our attacks on stand-alone sensors and moving vehicles, including a Tesla Model S with the “Autopilot” system. The results show that the attacks cause blindness and malfunction of not only sensors but also autonomous vehicles, which can lead to collisions. To enhance the security of ultrasonic sensors and autonomous vehicles, we propose two defense strategies, single-sensor-based physical shift authentication that verifies signals on the physical level, and multiple sensor consistency check that employs multiple sensors to verify signals on the system level. Our experiments on real sensors and MATLAB simulation reveal the validity of both schemes.

[1]  J. Pendry,et al.  Hiding under the carpet: a new strategy for cloaking. , 2008, Physical review letters.

[2]  Yongdae Kim,et al.  Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.

[3]  Chen Yan Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .

[4]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[5]  Christof Paar,et al.  Security in Automotive Bus Systems , 2004 .

[6]  Klaus-Werner Jörg,et al.  Using Pseudo-Random Codes for Mobile Robot Sonar Sensing , 1998 .

[7]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[8]  Ruchir Chauhan,et al.  A platform for false data injection in frequency modulated continuous wave radar , 2014 .

[9]  Hermann Winner,et al.  Handbook of Driver Assistance Systems: Basic Information, Components and Systems for Active Safety and Comfort , 2015 .

[10]  Wenyuan Xu,et al.  Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.

[11]  Lindsay Kleeman,et al.  A sonar sensor with random double pulse coding , 2000 .

[12]  Mani Srivastava,et al.  PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.

[13]  Behrooz Parhami A Data-Driven Dependability Assurance Scheme with Applications to Data and Design Diversity , 1991 .

[14]  He Lin,et al.  Development of submarine acoustic stealth technology , 2006 .

[15]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[16]  Heinrich Kuttruff,et al.  Ultrasonics fundamentals and applications , 1991 .

[17]  Fan Zhang,et al.  A Distributed TDMA Scheduling Algorithm for Target Tracking in Ultrasonic Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.

[18]  S. Cummer,et al.  One path to acoustic cloaking , 2007 .

[19]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[20]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[21]  Moon G. Joo,et al.  Multi-object identification for mobile robot using ultrasonic sensors , 2012 .

[22]  Fan Zhang,et al.  Distributed Active Sensor Scheduling for Target Tracking in Ultrasonic Sensor Networks , 2012, Mob. Networks Appl..

[23]  Ralph D. Hippenstiel,et al.  Detection Theory: Applications and Digital Signal Processing , 2001 .

[24]  André Weimerskirch,et al.  State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..

[25]  T. Başar,et al.  A New Approach to Linear Filtering and Prediction Problems , 2001 .

[26]  Stephen Milligan,et al.  Understanding Ultrasonic Level Measurement , 2013 .