Exploring Inherent Sensor Redundancy for Automotive Anomaly Detection

被引:36
作者
He, Tianjia [1 ]
Zhang, Lin [1 ]
Kong, Fanxin [1 ]
Salekin, Asif [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
来源
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2020年
关键词
Anomaly detection; autonomous vehicle; sensor; natural redundancy; autoencoder;
D O I
10.1109/dac18072.2020.9218557
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing autonomy and connectivity have been transitioning automobiles to complex and open architectures that are vulnerable to malicious attacks beyond conventional cyber attacks. Attackers may non-invasively compromise sensors and spoof the controller to perform unsafe actions. This concern emphasizes the need to validate sensor data before acting on them. Unlike existing works, this paper exploits inherent redundancy among heterogeneous sensors for detecting anomalous sensor measurements. The redundancy is that multiple sensors simultaneously respond to the same physical phenomenon in a related fashion. Embedding the redundancy into a deep autoencoder, we propose an anomaly detector that learns a consistent pattern from vehicle sensor data in normal states and utilizes it as the nominal behavior for the detection. The proposed method is independent of the scarcity of anomalous data for training and the intensive calculation of pairwise correlation among senors as in existing works. Using a real-world data set collected from tens of vehicle sensors, we demonstrate the feasibility and efficacy of the proposed method.
引用
收藏
页数:6
相关论文
共 18 条
[1]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[2]  
[Anonymous], **DATA OBJECT**, DOI DOI 10.5281/ZENODO.3267184
[3]  
[Anonymous], 2013, SPOOFERS USE FAKE GP
[4]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[5]  
Cardenas R, 2011, EUR CONF POW ELECTR
[6]  
Dusparic I, 2015, 2015 IEEE FIRST INTERNATIONAL SMART CITIES CONFERENCE (ISC2)
[7]  
Ganesan Arun., 2017, Exploiting Consistency Among Heterogeneous Sensors for Vehicle Anomaly Detection
[8]   Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures [J].
Hoppe, Tobias ;
Kiltz, Stefan ;
Dittmann, Jana .
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 :235-248
[9]   Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems [J].
Ivanov, Radoslav ;
Pajic, Miroslav ;
Lee, Insup .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2016, 15 (01)
[10]   Cyber-Physical System Checkpointing and Recovery [J].
Kong, Fanxin ;
Xu, Meng ;
Weimer, James ;
Sokolsky, Oleg ;
Lee, Insup .
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, :22-31