Sensor attack detection using history based pairwise inconsistency

Abstract This paper focuses on the security issues of Cyber-Physical Systems with multiple sensors measuring the same physical variables. We use an abstract sensor model, and each sensor provides the controller with an interval that contains the true value. Some of the sensors may be subject to malicious attacks and provide the wrong measurements, thereby misleading the controller into performing an unsafe action. Although there are several existing methods for detecting sensor attacks in the presence of transient sensor faults, they treat all sensors’ faults and attacks in the same way, and may not work well when an attacker has sufficient ability to cover up for different sensors at different times, e.g., stealth attacks. To address this problem, we propose a pairwise inconsistency based algorithm to enhance attack detection capability. The main idea is to build different fault models for different sensors, add a virtual sensor to utilize the fusion intervals and historical measurements, and use pairwise inconsistencies between real and virtual sensors to identify attacks. Finally, we validate the performance of the algorithm on real measurement data obtained from the LEGO EV3 ground vehicle, the results show that the proposed method outperforms state-of-the-art algorithms.

[1]  Kim-Kwang Raymond Choo,et al.  Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.

[2]  Christophe Champod,et al.  Risk evaluation for spoofing against a sensor supplied with liveness detection. , 2011, Forensic science international.

[3]  Rongxing Lu,et al.  From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.

[4]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[5]  Keith Marzullo,et al.  Tolerating failures of continuous-valued sensors , 1990, TOCS.

[6]  Kim-Kwang Raymond Choo,et al.  Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps , 2018, Future Gener. Comput. Syst..

[7]  Kim-Kwang Raymond Choo,et al.  An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks , 2017, J. Netw. Comput. Appl..

[8]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[9]  Insup Lee,et al.  Attack-resilient sensor fusion , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[10]  Yong Yu,et al.  Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..

[11]  Insup Lee,et al.  Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems , 2016, ACM Trans. Embed. Comput. Syst..

[12]  R. E. Kalman,et al.  A New Approach to Linear Filtering and Prediction Problems , 2002 .

[13]  Md. Rafiqul Islam,et al.  A secure and resilient cross‐domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy , 2017, Concurr. Comput. Pract. Exp..

[14]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[15]  Richard G. Baraniuk,et al.  Robust Distributed Estimation Using the Embedded Subgraphs Algorithm , 2006, IEEE Transactions on Signal Processing.

[16]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[17]  Todd E. Humphreys,et al.  Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .

[18]  Paulo Tabuada,et al.  Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.

[19]  Yunmin Zhu,et al.  Optimal interval estimation fusion based on sensor interval estimates with confidence degrees , 2006, Autom..

[20]  Ahmed Frikha,et al.  Analytic hierarchy process for multi-sensor data fusion based on belief function theory , 2015, Eur. J. Oper. Res..

[21]  Guowu Yang,et al.  Uncertainty Model for Configurable Hardware/Software and Resource Partitioning , 2016, IEEE Transactions on Computers.

[22]  Goran Frehse,et al.  Formal Analysis of Timing Effects on Closed-Loop Properties of Control Software , 2014, 2014 IEEE Real-Time Systems Symposium.

[23]  Paul Rad,et al.  Driverless vehicle security: Challenges and future research opportunities , 2020, Future Gener. Comput. Syst..

[24]  Yu Jiang,et al.  Design and Optimization of Multiclocked Embedded Systems Using Formal Techniques , 2015, IEEE Transactions on Industrial Electronics.

[25]  Yu Jiang,et al.  Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[26]  Tony J. Dodd,et al.  Multi-sensor data fusion in defence and aerospace , 1998, The Aeronautical Journal (1968).

[27]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[28]  Christian Brecher,et al.  Cyber-Physical Systems: Foundations, Principles and Applications , 2016 .

[29]  Beibei Li,et al.  DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Stephen P. Boyd,et al.  A scheme for robust distributed sensor fusion based on average consensus , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[31]  Insup Lee,et al.  Resilient multidimensional sensor fusion using measurement history , 2014, HiCoNS.

[32]  S. Sitharama Iyengar,et al.  Robust Distributed Comupting and Sensing Algorithm , 1996, Computer.

[33]  Kim-Kwang Raymond Choo,et al.  Resilient interconnection in cyber-physical control systems , 2017, Comput. Secur..

[34]  Insup Lee,et al.  Adaptive Transient Fault Model for Sensor Attack Detection , 2016, 2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).

[35]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[36]  Ulrich Schmid,et al.  How to reconcile fault-tolerant interval intersection with the Lipschitz condition , 2001, Distributed Computing.