Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles

被引:0
作者
Lemieux-Mack, Cailani [1 ]
Leach, Kevin [1 ]
Angstadt, Kevin [2 ]
机构
[1] Vmderbilt Univ, Nashville, TN 37235 USA
[2] St Lawrence Univ, Canton, NY USA
来源
PROCEEDINGS 15TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, ICCPS 2024 | 2024年
基金
美国国家科学基金会;
关键词
resilience; autonomous vehicles; redundant hardware; SYSTEM;
D O I
10.1109/ICCPS61052.2024.00019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As our reliance on micro autonomous vehicles increases, security vulnerabilities and software defects threaten the successful completion of tasks and missions. Recent work has developed end-to-end toolchains that provide trusted and resilient operation in the face of defects and attacks. These toolchains enable automatically repairing (and patching) the control software in the event of a failure. Existing techniques force the subject control software to terminate and the vehicle to be motionless, making the restart or post-repair deployment more complex and slow. The challenge remains to ensure that vehicle control software can recover from attacks and defects quickly and safely, even while the target vehicle remains in motion. This paper presents a technique for faster, simpler, and seamless hardware switchover that operates while the vehicle is in motion. The key contribution is the ability to restart the control software post-repair while the vehicle is in motion by transplanting sensor data between onboard control computers to bypass a costly portion of initialization. Although existing checkpoint and restore methods allow software to recover execution at a known-functional state, they are not lightweight enough to support recovery during mission execution. Instead, our approach transplants known-good sensor data from a trusted, isolated execution environment in the onboard computing hardware. Our evaluation successfully reproduces prior simulation results in hardware. Further, sensor transplantation allows for successful initialization while in motion, reduces time-to-ready by 40%, and is robust to variances in sensor readings.
引用
收藏
页码:135 / 146
页数:12
相关论文
共 52 条
[1]   Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification [J].
Alhawi, Omar M. ;
Mustafa, Mustafa A. ;
Cordiro, Lucas C. .
2019 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2019), 2019, :9-17
[2]   Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge [J].
Nguyen-Tuong A. ;
Melski D. ;
Davidson J.W. ;
Co M. ;
Hawkins W. ;
Hiser J.D. ;
Morris D. ;
Nguyen D. ;
Rizzi E. .
IEEE Security and Privacy, 2018, 16 (02) :42-51
[3]  
ArduPilot Development Team, 2023, ArduPilot
[4]  
ARM, 2022, TrustZone for Cortex-A
[5]   The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety [J].
Bak, Stanley ;
Chivukula, Deepti K. ;
Adekunle, Olugbemiga ;
Sun, Mu ;
Caccamo, Marco ;
Sha, Lui .
15TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATION SYMPOSIUM: RTAS 2009, PROCEEDINGS, 2009, :99-107
[6]   Directed Greybox Fuzzing [J].
Bohme, Marcel ;
Van-Thuan Pham ;
Manh-Dung Nguyen ;
Roychoudhury, Abhik .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2329-2344
[7]  
Choi CH, 2016, INT CONF CONTR AUTO, P132, DOI 10.1109/ICCAIS.2016.7822448
[8]  
Cox B, 2006, USENIX Association Proceedings of the 15th USENIX Security Symposium, P105
[9]   Applications of drone in disaster management: A scoping review [J].
Daud, Sharifah Mastura Syed Mohd ;
Yusof, Mohd Yusmiaidil Putera Mohd ;
Heo, Chong Chin ;
Khoo, Lay See ;
Singh, Mansharan Kaur Chainchel ;
Mahmood, Mohd Shah ;
Nawawi, Hapizah .
SCIENCE & JUSTICE, 2022, 62 (01) :30-42
[10]  
Dutt S, 2005, ELECTRICAL ENGINEERING HANDBOOK, P427, DOI 10.1016/B978-012170960-0/50034-7