Detecting and Mitigating Spoofing Attack Against an Automotive Radar

Applying cyber security mechanisms, such as cryptography, trusted computing, and network intrusion detection, is insufficient to secure cyber-physical systems (CPS) such as smart vehicles, because most sensors (and actuators) are designed without security considerations and remain vulnerable to sensor spoofing attacks in the analog domain. To address this problem, we present a new approach to detect and handle sensor spoofing attack against automotive radars—a key component for assisted and autonomous driving—by extending multiple beamforming in an automotive multi-input multi-output (MIMO) radar. In a simulation study for adaptive cruise control based on the car following model, our approach significantly outperforms three state-of-the-art baselines in terms of attack detection and ranging accuracy.

[1]  Hsiao-Hwa Chen,et al.  Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.

[2]  Marwan Younis,et al.  Radar 2020: The future of radar systems , 2015, 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).

[3]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[4]  Charles A. Kamhoua,et al.  Estimation of safe sensor measurements of autonomous system under attack , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[5]  Mani B. Srivastava,et al.  PROTC: PROTeCting Drone's Peripherals through ARM TrustZone , 2017, DroNet@MobiSys.

[6]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[7]  Paulo Tabuada,et al.  Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.

[8]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[9]  Reinhard Feger,et al.  FMCW MIMO Radar System for Frequency-Division Multiple TX-Beamforming , 2013, IEEE Transactions on Microwave Theory and Techniques.

[10]  R. O. Schmidt,et al.  Multiple emitter location and signal Parameter estimation , 1986 .

[11]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..