Real-Time Sensor Anomaly Detection and Identification in Automated Vehicles

Connected and automated vehicles (CAVs) are expected to revolutionize the transportation industry, mainly through allowing for a real-time and seamless exchange of information between vehicles and roadside infrastructure. Although connectivity and automation are projected to bring about a vast number of benefits, they can give rise to new challenges in terms of safety, security, and privacy. To navigate roadways, CAVs need to heavily rely on their sensor readings and the information received from other vehicles and roadside units. Hence, anomalous sensor readings caused by either malicious cyber attacks or faulty vehicle sensors can result in disruptive consequences and possibly lead to fatal crashes. As a result, before the mass implementation of CAVs, it is important to develop methodologies that can detect anomalies and identify their sources seamlessly and in real time. In this paper, we develop an anomaly detection approach through combining a deep learning method, namely convolutional neural network (CNN), with a well-established anomaly detection method, and Kalman filtering with a $\chi ^{2}$ -detector, to detect and identify anomalous behavior in CAVs. Our numerical experiments demonstrate that the developed approach can detect anomalies and identify their sources with high accuracy, sensitivity, and F1 score. In addition, this developed approach outperforms the anomaly detection and identification capabilities of both CNNs and Kalman filtering with a $\chi ^{2}$ -detector method alone. It is envisioned that this research will contribute to the development of safer and more resilient CAV systems that implement a holistic view toward intelligent transportation system (ITS) concepts.

[1]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[2]  George Loukas,et al.  Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[3]  Jaycil Z. Varghese,et al.  Overview of Autonomous Vehicle Sensors and Systems , 2015 .

[4]  Michele Colajanni,et al.  Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms , 2016, 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI).

[5]  T. Başar,et al.  A New Approach to Linear Filtering and Prediction Problems , 2001 .

[6]  Naim Asaj,et al.  Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[7]  Ljubo Vlacic,et al.  Sensor fault detection and diagnosis for autonomous vehicles , 2015 .

[8]  Eliahu Khalastchi,et al.  Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.

[9]  Chen Yan Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .

[10]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[11]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[12]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[13]  D. Mahinda Vilathgamuwa,et al.  A Sensor Fault Detection and Isolation Method in Interior Permanent-Magnet Synchronous Motor Drives Based on an Extended Kalman Filter , 2013, IEEE Transactions on Industrial Electronics.

[14]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[15]  Nitesh V. Chawla,et al.  SPECIAL ISSUE ON LEARNING FROM IMBALANCED DATA SETS , 2004 .

[16]  A. H. Mohamed,et al.  Adaptive Kalman Filtering for INS/GPS , 1999 .

[17]  Peter Christiansen,et al.  DeepAnomaly: Combining Background Subtraction and Deep Learning for Detecting Obstacles and Anomalies in an Agricultural Field , 2016, Sensors.

[18]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[19]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[20]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[21]  Je-Won Kang,et al.  Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.

[22]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[23]  R. Currie,et al.  Developments in Car Hacking , 2020 .

[24]  Robert Sutton,et al.  Adaptive tuning of a Kalman filter via fuzzy logic for an intelligent AUV navigation system , 2004 .

[25]  Nathalie Japkowicz,et al.  Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[26]  Insup Lee,et al.  Sensor attack detection in the presence of transient faults , 2015, ICCPS.

[27]  André Weimerskirch,et al.  An Overview of Automotive Cybersecurity: Challenges and Solution Approaches , 2015, TrustED@CCS.

[28]  C. Urmson,et al.  Classification and tracking of dynamic objects with multiple sensors for autonomous driving in urban environments , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[29]  Dominique Gruyer,et al.  Intelligent Vehicle Embedded Sensors Fault Detection and Isolation Using Analytical Redundancy and Nonlinear Transformations , 2017, J. Control. Sci. Eng..

[30]  Gregory D. Abowd,et al.  Preventing Camera Recording by Designing a Capture-Resistant Environment , 2005, UbiComp.

[31]  Insup Lee,et al.  Adaptive Transient Fault Model for Sensor Attack Detection , 2016, 2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).

[32]  Bin Ran,et al.  Dynamic Urban Transportation Network Models: Theory and Implications for Intelligent Vehicle-Highway Systems , 1994 .

[33]  Shu Yang,et al.  Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation , 2016, Mob. Inf. Syst..

[34]  Michel Verhaegen,et al.  Sensor fault detection and isolation for wind turbines based on subspace identification and Kalman filter techniques , 2009 .

[35]  Fan Bai,et al.  Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers , 2010, MobiCom.

[36]  Meir Kalech,et al.  Online anomaly detection in unmanned vehicles , 2011, AAMAS.

[37]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[38]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[39]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.

[40]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[41]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[42]  Seong-hun Park,et al.  Highway traffic accident prediction using VDS big data analysis , 2016, The Journal of Supercomputing.

[43]  Aryeh Kontorovich,et al.  Advanced Analytics for Connected Car Cybersecurity , 2017, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).