Abstract
Malicious attackers may disrupt the safety of autonomous systems through compromising sensors to feed wrong measurements to the controller. This article proposes attack-resilient sensor fusion that combines local sensor readings and shared sensing information from multiple sources. The method results in higher resilience against sensor attacks through jointly considering sensing noise and uncertain communication delay. To be specific, we first identify the considerable impact of the delay on determining attacked sensors. Second, we present a novel two-dimensional abstract sensor model, where each measurement is augmented as a probabilistic interval based on the convolution of the noise and delay. Third, we propose a fusion algorithm that admits the fused value with highest joint probability distribution of the intervals to tolerate corrupted measurements. Finally, we demonstrate the effectiveness of our method in a vehicle-platoon case study using extensive simulations and testbed experiments.
- [1] . 2018. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomput. 74, 1 (2018), 509–525.Google Scholar
Digital Library
- [2] . 2021. Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges. In Proceedings of the 4th International Conference on Connected and Autonomous Driving (MetroCAD). IEEE.Google Scholar
Cross Ref
- [3] . 2021. Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 237–250.Google Scholar
Cross Ref
- [4] . 2021. Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE.Google Scholar
Cross Ref
- [5] . 2021. Recovery-by-learning: Restoring autonomous cyber-physical systems from sensor attacks. In Proceedings of the 27th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 61–66.Google Scholar
Cross Ref
- [6] . 2017. String stability analysis of cooperative adaptive cruise control under jamming attacks. In Proceedings of the IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 157–162.Google Scholar
Cross Ref
- [7] . 2017. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 68 (2017), 81–97.Google Scholar
Digital Library
- [8] . 2016. State estimation and control of nonlinear systems with large and variable measurement delays. In Recent Results on Nonlinear Delay Control Systems. Springer, 95–112.Google Scholar
- [9] . 2019. Adversarial sensor attack on lidar-based perception in autonomous driving. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2267–2281.Google Scholar
Digital Library
- [10] . 2013. Robust information fusion estimator for multiple delay-tolerant sensors with different failure rates. IEEE Trans. Circ. Syst. I-regul. Pap. 60, 2 (2013), 401–414.Google Scholar
Cross Ref
- [11] . 2015. Observability of linear systems under adversarial attacks. In Proceedings of the American Control Conference (ACC). IEEE, 2439–2444.Google Scholar
Cross Ref
- [12] . 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Automat. Control 59, 6 (2014), 1454–1467.Google Scholar
Cross Ref
- [13] . 2018. Delay estimation of industrial IoT applications based on messaging protocols. IEEE Trans. Instrum. Meas. 67, 9 (2018), 2188–2199.Google Scholar
Cross Ref
- [14] . 2011. Incorporating delayed and infrequent measurements in extended Kalman filter based nonlinear state estimation. J. Process Contr. 21, 1 (2011), 119–129.Google Scholar
Cross Ref
- [15] . 2021. Towards scalable, secure, and smart mission-critical IoT systems: Review and vision. In Proceedings of the International Conference on Embedded Software. ACM, 1–10.Google Scholar
Digital Library
- [16] . 2021. Learning-based signal detection for MIMO systems with unknown noise statistics. IEEE Trans. Commun. 69, 5 (2021), 3025–3038.Google Scholar
Cross Ref
- [17] . 2018. Self-triggered model predictive control for networked control systems based on first-order hold. Int. J. Robust Nonlin. Contr. 28, 4 (2018), 1303–1318.Google Scholar
Cross Ref
- [18] . 2016. Observer-based stabilisation of a class of nonlinear systems in the presence of measurement delay. Int. J. Contr. 89, 6 (2016), 1180–1190.Google Scholar
Cross Ref
- [19] . 2020. Exploring inherent sensor redundancy for automotive anomaly detection. In Proceedings of the 57th Design Automation Conference.Google Scholar
Digital Library
- [20] . 2007. A survey of recent results in networked control systems. Proc. IEEE 95, 1 (2007), 138–162.Google Scholar
Cross Ref
- [21] . 2003. Neural-network predictive control for nonlinear dynamic systems with time-delay. IEEE Trans. Neural Netw. 14, 2 (2003), 377–389.Google Scholar
Digital Library
- [22] . 2021. Polynomial-type Lyapunov-Krasovskii functional and Jacobi-Bessel inequality: Further results on stability analysis of time-delay systems. IEEE Trans. Automat. Control 66, 6 (2021), 2905–2912.Google Scholar
Cross Ref
- [23] . 2016. Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans. Embed. Comput. Syst. 15, 1 (2016), 21.Google Scholar
Digital Library
- [24] . 2011. Nonlinear stabilization under sampled and delayed measurements, and with inputs subject to delay and zero-order hold. IEEE Trans. Automat. Control 57, 5 (2011), 1141–1154.Google Scholar
Cross Ref
- [25] . 2018. Real-time rejection and mitigation of time synchronization attacks on the global positioning system. IEEE Trans. Industr. Electron. 65, 8 (2018), 6425–6435.Google Scholar
Cross Ref
- [26] . 2013. Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion 14, 1 (2013), 28–44.Google Scholar
Digital Library
- [27] . 2019. State consistencies for cyber-physical system recovery. In Proceedings of the 2nd Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR). 3–7.Google Scholar
- [28] . 2018. Cyber-physical system checkpointing and recovery. In Proceedings of the ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 22–31.Google Scholar
Digital Library
- [29] . 2015. Multimodal data fusion: An overview of methods, challenges, and prospects. Proc. IEEE 103, 9 (2015), 1449–1477.Google Scholar
Cross Ref
- [30] . 2010. Design the remote control system with the time-delay estimator and the adaptive smith predictor. IEEE Trans. Industr. Inform. 6, 1 (2010), 73–80.Google Scholar
Cross Ref
- [31] . 2022. Optimal state-delay control in nonlinear dynamic systems. Automatica 135 (2022), 109981.Google Scholar
Digital Library
- [32] . 2019. Stability analysis of systems with time-varying delay via improved Lyapunov–Krasovskii functionals. IEEE Trans. Syst., Man Cyber.: Syst. 51, 4 (2019), 2457–2466.Google Scholar
Cross Ref
- [33] . 2018. Attack-resilient sensor fusion for cooperative adaptive cruise control. In Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC). 3955–3960.Google Scholar
Digital Library
- [34] . 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst. 8, 4 (1990), 284–304.Google Scholar
Digital Library
- [35] . 2009. Efficient FPGA implementation of convolution. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. IEEE, 3478–3483.Google Scholar
Cross Ref
- [36] . 2013. Marginalized adaptive particle filtering for nonlinear models with unknown time-varying noise parameters. Automatica 49, 6 (2013), 1566–1575.Google Scholar
Digital Library
- [37] . 2014. Robustness of attack-resilient state estimators. In Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).Google Scholar
Digital Library
- [38] . 2013. Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Control 58, 11 (2013), 2715–2729.Google Scholar
Cross Ref
- [39] . 1993. State estimation using randomly delayed measurements. J. Dynam. Syst., Meas. Contr., Trans. ASME 115 (1993), 19–26.Google Scholar
Cross Ref
- [40] . 2019. Detection of replay attacks in cyber-physical systems using a frequency-based signature. J. Franklin Instit. 356, 5 (2019), 2798–2824.Google Scholar
Cross Ref
- [41] . 2007. Optimal sensor fusion for distributed sensors subject to random delay and packet loss. In Proceedings of the 46th IEEE Conference on Decision and Control. IEEE, 1547–1552.Google Scholar
Cross Ref
- [42] . 2015. Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1004–1015.Google Scholar
Digital Library
- [43] . 2021. Dynamic GPS spoofing attack detection, localization, and measurement correction exploiting PMU and SCADA. IEEE Syst. J. 15, 2 (2021), 2531–2540.Google Scholar
Cross Ref
- [44] . 2007. Multi-rate Kalman filtering for the data fusion of displacement and acceleration response measurements in dynamic system monitoring. Mechan. Syst. Sig. Process. 21, 2 (2007), 706–723.Google Scholar
Cross Ref
- [45] . 2012. Optimal linear filters for discrete-time systems with randomly delayed and lost measurements with/without time stamps. IEEE Trans. Automat. Control 58, 6 (2012), 1551–1556.Google Scholar
Cross Ref
- [46] . 2018. An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks. Journal Supercomput. 74, 3 (2018), 1267–1282.Google Scholar
Digital Library
- [47] . 2003. Control methodologies in networked control systems. Contr. Eng. Pract. 11, 10 (2003), 1099–1111.Google Scholar
Cross Ref
- [48] . 2014. Event-based state estimation with variance-based triggering. IEEE Trans. Automat. Contr. 59, 12 (2014), 3266–3281.Google Scholar
Cross Ref
- [49] . 2001. Dual extended Kalman filter methods. Kalman Filt. Neural Netw. 123 (2001).Google Scholar
Cross Ref
- [50] . 2021. Brief industry paper: HDAD: hyperdimensional computing-based anomaly detection for automotive sensor attacks. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 461–464.Google Scholar
Cross Ref
- [51] . 1995. An Introduction to the Kalman Filter. Technical Report TR 95-041, University of North Carolina, Department of Computer Science, 1995.Google Scholar
- [52] . 2017. Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106, 1 (2017), 9–20.Google Scholar
Cross Ref
- [53] . 2013. Delay analysis and study of IEEE 802.11 p based DSRC safety communication in a highway environment. In Proceedings of the IEEE INFOCOM. IEEE, 1591–1599.Google Scholar
- [54] . 2019. Joint communication and control for wireless autonomous vehicular platoon systems. IEEE Trans. Commun. 67, 11 (2019), 7907–7922.Google Scholar
Cross Ref
- [55] . 2020. Real-time recovery for cyber-physical systems using linear approximations. In Proceedings of the 41st IEEE Real-Time Systems Symposium (RTSS). IEEE.Google Scholar
Cross Ref
- [56] . 2021. Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator. ACM Trans. Embed. Comput. Syst. 20, 5s (2021), 79:1–79:24.Google Scholar
Digital Library
- [57] . 2017. Robust unscented Kalman filter for power system dynamic state estimation with unknown noise statistics. IEEE Trans. Smart Grid 10, 2 (2017), 1215–1224.Google Scholar
Cross Ref
Index Terms
Attack-resilient Fusion of Sensor Data with Uncertain Delays
Recommendations
Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems
This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped with multiple sensors measuring the same physical variable. A malicious attacker may be able to disrupt system performance through compromising a ...
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the wireless sensor network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information ...
Attack-resilient sensor fusion
DATE '14: Proceedings of the conference on Design, Automation & Test in EuropeThis work considers the problem of attack-resilient sensor fusion in an autonomous system where multiple sensors measure the same physical variable. A malicious attacker may corrupt a subset of these sensors and send wrong measurements to the controller ...






Comments