Remote Attacks on Drones Vision Sensors: An Empirical Study

Vision systems applied to drones, automatic vehicles, and robots have become an increasingly popular sensing method. However, vision sensors that make up these systems are vulnerable to malicious input attacks, which can lead to serious consequences. Privious work on attacking cameras of automatic vehicles shows that lasers can cause failure of camera-based functionalities, but it lacks analysis of the results and does not conduct experiments in the actual scenarios. In this article, a laser-based attack on cameras and binocular vision sensors of drones is presented. First, we propose a threat model that describes how an adversary attacks the drone then perform feasibility analysis of the attack from theory and practice. Next, we design multi-variable experiments in the lab to systematically study the effectiveness of the attack, and further analyze how each variable affects the results. To get intuitive and fine-grained results, multidimensional image similarity is used to measure the effects. In particular, experiments in the actual scenarios are carried out, and results show that the attack can make obstacle avoidance, target recognition and tracking completely failed. Finally, lightweight countermeasures based on hardware and software are proposed to improve sensor resilience against the attack.

[1]  Mianxiong Dong,et al.  Big Data on the Fly: UAV-Mounted Mobile Edge Computing for Disaster Management , 2020, IEEE Transactions on Network Science and Engineering.

[2]  Kevin Fu,et al.  Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems , 2020, USENIX Security Symposium.

[3]  Mianxiong Dong,et al.  DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems , 2020, IEEE Transactions on Industrial Informatics.

[4]  Kaoru Ota,et al.  Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems , 2020, Peer-to-Peer Netw. Appl..

[5]  Wu Yang,et al.  UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion , 2020, ICCSP.

[6]  Quanfu Fan,et al.  Adversarial T-Shirt! Evading Person Detectors in a Physical World , 2019, ECCV.

[7]  Kai Chen,et al.  RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems , 2019, Inscrypt.

[8]  Kevin Fu,et al.  Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.

[9]  Adi Shamir,et al.  Drones' Cryptanalysis - Smashing Cryptography with a Flicker , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[10]  Toon Goedemé,et al.  Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[11]  Mianxiong Dong,et al.  Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Xiong Li,et al.  Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things , 2019, IEEE Access.

[13]  Wenyuan Xu,et al.  Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles , 2018, IEEE Internet of Things Journal.

[14]  Gang Wang,et al.  All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.

[15]  Atul Prakash,et al.  Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[16]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[17]  Romit Roy Choudhury,et al.  Inaudible Voice Commands: The Long-Range Attack and Defense , 2018, NSDI.

[18]  Yongdae Kim,et al.  Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications , 2017, CHES.

[19]  Wenyuan Xu,et al.  DolphinAttack: Inaudible Voice Commands , 2017, CCS.

[20]  Nick Feamster,et al.  Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.

[21]  Michael Blumenstein,et al.  A study on detecting drones using deep convolutional neural networks , 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[22]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[23]  Atul Prakash,et al.  Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.

[24]  Romit Roy Choudhury,et al.  BackDoor: Making Microphones Hear Inaudible Sounds , 2017, MobiSys.

[25]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[26]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[27]  Hao Liu,et al.  Drone Detection Based on an Audio-Assisted Camera Array , 2017, 2017 IEEE Third International Conference on Multimedia Big Data (BigMM).

[28]  Ivan Martinovic,et al.  Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones , 2017, NDSS.

[29]  Ian F. Akyildiz,et al.  Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.

[30]  Lujo Bauer,et al.  Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.

[31]  Vitor Guizilini,et al.  The Impact of DoS Attacks on the AR.Drone 2.0 , 2016, 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR).

[32]  Micah Sherr,et al.  Hidden Voice Commands , 2016, USENIX Security Symposium.

[33]  Hao Wu,et al.  Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.

[34]  Yongdae Kim,et al.  This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump , 2016, WOOT.

[35]  Chen Yan Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .

[36]  Peter Wellig,et al.  Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.

[37]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[38]  Micah Sherr,et al.  Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition , 2015, WOOT.

[39]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[40]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[41]  Michael Felsberg,et al.  Adaptive Color Attributes for Real-Time Visual Tracking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[42]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[43]  Xiaojiang Du,et al.  Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.

[44]  Reiner Creutzburg,et al.  Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy , 2014, Electronic Imaging.

[45]  Michael Felsberg,et al.  Accurate Scale Estimation for Robust Visual Tracking , 2014, BMVC.

[46]  Paulo Tabuada,et al.  Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.

[47]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[48]  Jana Dittmann,et al.  AR.Drone: security threat analysis and exemplary attack to track persons , 2012, Electronic Imaging.

[49]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[50]  George T. Flowers,et al.  A Characterization of the Performance of a MEMS Gyroscope in Acoustically Harsh Environments , 2011, IEEE Transactions on Industrial Electronics.

[51]  G.T. Flowers,et al.  On the Degradation of MEMS Gyroscope Performance in the Presence of High Power Acoustic Noise , 2007, 2007 IEEE International Symposium on Industrial Electronics.

[52]  George T. Flowers,et al.  Influence of Acoustic Noise on the Dynamic Performance of MEMS Gyroscopes , 2007 .

[53]  A. El Gamal,et al.  CMOS image sensors , 2005, IEEE Circuits and Devices Magazine.