skip to main content
research-article
Public Access

Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems

Published:15 November 2019Publication History
Skip Abstract Section

Abstract

The transportation sector is on the threshold of a revolution as advances in real-time communication, real-time computing, and sensing technologies have brought to fruition the capability to build Transportation Cyber-Physical Systems (TCPS) such as self-driving cars, unmanned aerial vehicles, adaptive cruise control systems, truck platoons, and so on. While there are many benefits that TCPSs have to offer, a major challenge that needs to be addressed to enable their proliferation is their vulnerability to cyber attacks. In this article, we demonstrate, using laboratory prototypes of TCPSs, how the approach of Dynamic Watermarking can secure them from arbitrary sensor attacks. Specifically, we consider two TCPSs of topical interest: (i) an adaptive cruise control system and (ii) a system of self-driving vehicles tracking given trajectories. In each of these systems, we first show how cyber attacks on sensors can compromise safety and cause collisions between vehicles in spite of the presence of a collision avoidance module in the system. We then apply the approach of Dynamic Watermarking and demonstrate that it detects attacks with “low” delay. Once an attack is detected, the controller can take appropriate control actions to prevent collisions, thereby guaranteeing safety in the sense of collision freedom.

References

  1. [n.d.]. Critical Reasons for Crashes Investigated in the National Motor Vehicle Crash Causation Survey. Technical Report. A National Highway Transportation Safety Administration's report. Retrieved from https://crashstats.nhtsa.dot.gov/Api/Public/ViewPublication/812115.Google ScholarGoogle Scholar
  2. [n.d.]. Hackers Fool Tesla S’s Autopilot to hide and Spoof Obstacles. Wired magazine. Retrieved from https://www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/.Google ScholarGoogle Scholar
  3. [n.d.]. Hackers Remotely Kill a Jeep On the Highway- With Me in it. Wired magazine. Retrieved from https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.Google ScholarGoogle Scholar
  4. [n.d.]. Secure Control of an Intelligent Transportation System. Retrieved from https://youtu.be/xapmP2-u6HY.Google ScholarGoogle Scholar
  5. [n.d.]. Securing a Prototypical Automated Vehicle Platoon from Replay Attacks Using Dynamic Watermarking. Retrieved from https://youtu.be/996fg9hAfpw.Google ScholarGoogle Scholar
  6. [n.d.]. Securing an Adaptive Cruise Control System from Adversarial Sensors Using Dynamic Watermarking. Retrieved from https://youtu.be/n4dcaK7uGSo.Google ScholarGoogle Scholar
  7. [n.d.]. Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Society of Automobile Engineers standard. Retrieved from http://standards.sae.org/j3016_201401/.Google ScholarGoogle Scholar
  8. Marshall Abrams and Joe Weiss. 2008. Malicious Control System Cyber Security Attack Case Study—Maroochy Water Services, Australia. https://www.mitre.org/publications/technical-papers/malicious-control-system-cyber-security-attack-case-study-maroochy-water-services-australia.Google ScholarGoogle Scholar
  9. M. Amoozadeh, A. Raghuramu, C. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, and K. Levitt. 2015. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53, 6 (June 2015), 126--132. DOI:https://doi.org/10.1109/MCOM.2015.7120028Google ScholarGoogle ScholarCross RefCross Ref
  10. Tuomas Aura. 1997. Strategies against replay attacks. In Proceedings of the 10th Computer Security Foundations Workshop. IEEE, 59--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry. 2008. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC’08). USENIX Association, Berkeley, CA, Article 6, 6 pages. Retrieved from http://dl.acm.org/citation.cfm?id=1496671.1496677.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alvaro A. Cardenas, Saurabh Amin, and Shankar Sastry. 2008. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Soodeh Dadras, Ryan M. Gerdes, and Rajnikant Sharma. 2015. Vehicular platooning in an adversarial environment. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS’15). ACM, New York, NY, 167--178. DOI:https://doi.org/10.1145/2714576.2714619Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, and Patrick Tague. 2015. Is your commute driving you crazy?: A study of misbehavior in vehicular platoons. In Proceedings of the 8th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’15). ACM, New York, NY, Article 22, 11 pages. DOI:https://doi.org/10.1145/2766498.2766505Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. D. Dunn, S. A. Mitchell, I. Sajjad, R. M. Gerdes, R. Sharma, and M. Li. 2017. Regular: Attacker-induced traffic flow instability in a stream of semi-automated vehicles. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17). 499--510. DOI:https://doi.org/10.1109/DSN.2017.61Google ScholarGoogle Scholar
  16. Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Automat. Control 59, 6 (2014), 1454--1467.Google ScholarGoogle ScholarCross RefCross Ref
  17. J. P. Hubaux, S. Capkun, and Jun Luo. 2004. The security and privacy of smart vehicles. IEEE Sec. Priv. 2, 3 (May 2004), 49--55. DOI:https://doi.org/10.1109/MSP.2004.26Google ScholarGoogle Scholar
  18. Brent Kesler. [n.d.]. The vulnerability of nuclear facilities to cyber attack. http://large.stanford.edu/courses/2015/ph241/holloway1/docs/SI-v10-I1_Kesler.pdf.Google ScholarGoogle Scholar
  19. Woo-Hyun Ko, B. Satchidanandan, and P. R. Kumar. 2016. Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’16). 416--420. DOI:https://doi.org/10.1109/CNS.2016.7860529Google ScholarGoogle Scholar
  20. P. R. Kumar and Pravin Varaiya. 1986. Stochastic Systems: Estimation, Identification and Adaptive Control. Prentice-Hall, Inc., Upper Saddle River, NJ.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Tze Leung Lai and Ching Zong Wei. 1982. Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. The Annals of Statistics (1982), 154--166. The Institute of Mathematical Statistics.Google ScholarGoogle Scholar
  22. Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Sec. Priv. 9, 3 (2011), 49--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Gary Lorden et al. 1971. Procedures for reacting to a change in distribution. Ann. Math. Stat. 42, 6 (1971), 1897--1908.Google ScholarGoogle ScholarCross RefCross Ref
  24. Sreekanth Malladi, Jim Alves-Foss, and Robert B. Heckendorn. 2002. On Preventing Replay Attacks on Security Protocols. Technical Report. Idaho University Moscow, Department of Computer Science.Google ScholarGoogle Scholar
  25. Fei Miao, Miroslav Pajic, and George J. Pappas. 2013. Stochastic game approach for replay attack detection. In Proceedings of the IEEE 52nd Conference on Decision and Control (CDC’13). IEEE.Google ScholarGoogle Scholar
  26. Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. http://illmatics.com/Remote%20Car%20Hacking.pdf.Google ScholarGoogle Scholar
  27. Shaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas Diggavi, and Paulo Tabuada. 2015. Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’15). IEEE, 2929--2933.Google ScholarGoogle ScholarCross RefCross Ref
  28. Yilin Mo, Rohan Chabukswar, and Bruno Sinopoli. 2014. Detecting integrity attacks on SCADA systems. IEEE Trans. Contr. Syst. Technol. 22, 4 (2014), 1396--1407.Google ScholarGoogle ScholarCross RefCross Ref
  29. Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno Sinopoli. 2012. Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100, 1 (2012), 195--209.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yilin Mo and B. Sinopoli. 2009. Secure control against replay attacks. In Proceedings of the 47th Allerton Conference on Communication, Control, and Computing. DOI:https://doi.org/10.1109/ALLERTON.2009.5394956Google ScholarGoogle Scholar
  31. Y. Mo, S. Weerakkody, and B. Sinopoli. 2015. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Contr. Syst. 35, 1 (Feb. 2015), 93--109. DOI:https://doi.org/10.1109/MCS.2014.2364724Google ScholarGoogle Scholar
  32. Fabio Pasqualetti, Florian Dörfler, and Francesco Bullo. 2013. Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Contr. 58, 11 (2013), 2715--2729.Google ScholarGoogle ScholarCross RefCross Ref
  33. J. Petit and S. E. Shladover. 2015. Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transport. Syst. 16, 2 (Apr. 2015), 546--556. DOI:https://doi.org/10.1109/TITS.2014.2342271Google ScholarGoogle Scholar
  34. Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and LIDAR. In Proceedings of the Black Hat Europe Conference.Google ScholarGoogle Scholar
  35. Moshe Pollak. 1985. Optimal detection of a change in distribution. Ann. Stat. (1985), 206--227. The Institute of Mathematical Statistics.Google ScholarGoogle Scholar
  36. Udaya L. N. Puvvadi, Kevin Di Benedetto, Aditya Patil, Kyoung-Don Kang, and Youngjoon Park. 2015. Cost-effective security support in real-time video surveillance. IEEE Trans. Industr. Inform. 11, 6 (2015), 1457--1465.Google ScholarGoogle ScholarCross RefCross Ref
  37. Craig L. Robinson, H.-J. Schutz, Girish Baliga, and P. R. Kumar. 2007. Architecture and algorithm for a laboratory vehicle collision avoidance system. In Proceedings of the IEEE 22nd International Symposium on Intelligent Control. IEEE, 23--28.Google ScholarGoogle Scholar
  38. B. Satchidanandan and P. R. Kumar. 2016. Secure control of networked cyber-physical systems. In Proceedings of the IEEE 55th Conference on Decision and Control (CDC’16). 283--289. DOI:https://doi.org/10.1109/CDC.2016.7798283Google ScholarGoogle Scholar
  39. B. Satchidanandan and P. R. Kumar. 2017. Dynamic watermarking: Active defense of networked cyber-physical systems. Proc. IEEE 105, 2 (Feb. 2017), 219--240. DOI:https://doi.org/10.1109/JPROC.2016.2575064Google ScholarGoogle ScholarCross RefCross Ref
  40. B. Satchidanandan and P. R. Kumar. 2017. On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems. In Proceedings of the 9th International Conference on Communication Systems and Networks (COMSNETS’17). 23--30. DOI:https://doi.org/10.1109/COMSNETS.2017.7945354Google ScholarGoogle Scholar
  41. B. Satchidanandan and P. R. Kumar. 2017. The securable subspace of a linear stochastic system with malicious sensors and actuators. In Proceedings of the 55th Allerton Conference on Communication, Control, and Computing. 911--917. DOI:https://doi.org/10.1109/ALLERTON.2017.8262835Google ScholarGoogle Scholar
  42. Bharadwaj Satchidanandan and P. R. Kumar. 2018. Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System. Springer International Publishing, Cham, 217--228. DOI:https://doi.org/10.1007/978-3-319-67068-3_16Google ScholarGoogle Scholar
  43. B. Satchidanandan and P. R. Kumar. 2018. On the operational significance of the securable subspace for partially observed linear stochastic systems. In Proceedings of the IEEE Conference on Decision and Control (CDC’18). 2068--2073. DOI:https://doi.org/10.1109/CDC.2018.8619407Google ScholarGoogle Scholar
  44. B. Satchidanandan and P. R. Kumar. 2020. On the design of security-guaranteeing dynamic watermarks. IEEE Contr. Syst. Lett. 4, 2 (Apr. 2020), 307--312. DOI:https://doi.org/10.1109/LCSYS.2019.2925278Google ScholarGoogle Scholar
  45. Albert N. Shiryaev. 1963. On optimum methods in quickest detection problems. Theor. Prob. Its Appl. 8, 1 (1963), 22--46.Google ScholarGoogle ScholarCross RefCross Ref
  46. Yasser Shoukry, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava. 2015. PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, 1004--1015. DOI:https://doi.org/10.1145/2810103.2813679Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Alexander G. Tartakovsky and Venugopal V. Veeravalli. 2005. General asymptotic Bayesian theory of quickest change detection. Theor. Prob. Its Appl. 49, 3 (2005), 458--497.Google ScholarGoogle ScholarCross RefCross Ref
  48. André Teixeira, Daniel Pérez, Henrik Sandberg, and Karl Henrik Johansson. 2012. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems. ACM, 55--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. 2012. Revealing stealthy attacks in control systems. In Proceedings of the 50th Allerton Conference on Communication, Control, and Computing. 1806--1813. DOI:https://doi.org/10.1109/Allerton.2012.6483441Google ScholarGoogle Scholar
  50. Junia Valente and Alvaro A. Cárdenas. 2015. Using visual challenges to verify the integrity of security cameras. In Proceedings of the 31st Computer Security Applications Conference (ACSAC’15). ACM, New York, NY, 141--150. DOI:https://doi.org/10.1145/2818000.2818045Google ScholarGoogle Scholar
  51. Venugopal V. Veeravalli and Taposh Banerjee. 2014. Quickest change detection. In Academic Press Library in Signal Processing, Vol. 3. Elsevier, 209--255.Google ScholarGoogle Scholar

Index Terms

  1. Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 4, Issue 1
      Special Issue on Transportation CPS
      January 2020
      311 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3371149
      • Editor:
      • Tei-Wei Kuo
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 November 2019
      • Accepted: 1 August 2019
      • Revised: 1 July 2019
      • Received: 1 December 2017
      Published in tcps Volume 4, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format