Abstract
The transportation sector is on the threshold of a revolution as advances in real-time communication, real-time computing, and sensing technologies have brought to fruition the capability to build Transportation Cyber-Physical Systems (TCPS) such as self-driving cars, unmanned aerial vehicles, adaptive cruise control systems, truck platoons, and so on. While there are many benefits that TCPSs have to offer, a major challenge that needs to be addressed to enable their proliferation is their vulnerability to cyber attacks. In this article, we demonstrate, using laboratory prototypes of TCPSs, how the approach of Dynamic Watermarking can secure them from arbitrary sensor attacks. Specifically, we consider two TCPSs of topical interest: (i) an adaptive cruise control system and (ii) a system of self-driving vehicles tracking given trajectories. In each of these systems, we first show how cyber attacks on sensors can compromise safety and cause collisions between vehicles in spite of the presence of a collision avoidance module in the system. We then apply the approach of Dynamic Watermarking and demonstrate that it detects attacks with “low” delay. Once an attack is detected, the controller can take appropriate control actions to prevent collisions, thereby guaranteeing safety in the sense of collision freedom.
- [n.d.]. Critical Reasons for Crashes Investigated in the National Motor Vehicle Crash Causation Survey. Technical Report. A National Highway Transportation Safety Administration's report. Retrieved from https://crashstats.nhtsa.dot.gov/Api/Public/ViewPublication/812115.Google Scholar
- [n.d.]. Hackers Fool Tesla S’s Autopilot to hide and Spoof Obstacles. Wired magazine. Retrieved from https://www.wired.com/2016/08/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles/.Google Scholar
- [n.d.]. Hackers Remotely Kill a Jeep On the Highway- With Me in it. Wired magazine. Retrieved from https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.Google Scholar
- [n.d.]. Secure Control of an Intelligent Transportation System. Retrieved from https://youtu.be/xapmP2-u6HY.Google Scholar
- [n.d.]. Securing a Prototypical Automated Vehicle Platoon from Replay Attacks Using Dynamic Watermarking. Retrieved from https://youtu.be/996fg9hAfpw.Google Scholar
- [n.d.]. Securing an Adaptive Cruise Control System from Adversarial Sensors Using Dynamic Watermarking. Retrieved from https://youtu.be/n4dcaK7uGSo.Google Scholar
- [n.d.]. Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Society of Automobile Engineers standard. Retrieved from http://standards.sae.org/j3016_201401/.Google Scholar
- Marshall Abrams and Joe Weiss. 2008. Malicious Control System Cyber Security Attack Case Study—Maroochy Water Services, Australia. https://www.mitre.org/publications/technical-papers/malicious-control-system-cyber-security-attack-case-study-maroochy-water-services-australia.Google Scholar
- M. Amoozadeh, A. Raghuramu, C. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, and K. Levitt. 2015. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53, 6 (June 2015), 126--132. DOI:https://doi.org/10.1109/MCOM.2015.7120028Google ScholarCross Ref
- Tuomas Aura. 1997. Strategies against replay attacks. In Proceedings of the 10th Computer Security Foundations Workshop. IEEE, 59--68.Google ScholarDigital Library
- Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry. 2008. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC’08). USENIX Association, Berkeley, CA, Article 6, 6 pages. Retrieved from http://dl.acm.org/citation.cfm?id=1496671.1496677.Google ScholarDigital Library
- Alvaro A. Cardenas, Saurabh Amin, and Shankar Sastry. 2008. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops. IEEE.Google ScholarDigital Library
- Soodeh Dadras, Ryan M. Gerdes, and Rajnikant Sharma. 2015. Vehicular platooning in an adversarial environment. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS’15). ACM, New York, NY, 167--178. DOI:https://doi.org/10.1145/2714576.2714619Google ScholarDigital Library
- Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, and Patrick Tague. 2015. Is your commute driving you crazy?: A study of misbehavior in vehicular platoons. In Proceedings of the 8th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’15). ACM, New York, NY, Article 22, 11 pages. DOI:https://doi.org/10.1145/2766498.2766505Google ScholarDigital Library
- D. D. Dunn, S. A. Mitchell, I. Sajjad, R. M. Gerdes, R. Sharma, and M. Li. 2017. Regular: Attacker-induced traffic flow instability in a stream of semi-automated vehicles. In Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17). 499--510. DOI:https://doi.org/10.1109/DSN.2017.61Google Scholar
- Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Automat. Control 59, 6 (2014), 1454--1467.Google ScholarCross Ref
- J. P. Hubaux, S. Capkun, and Jun Luo. 2004. The security and privacy of smart vehicles. IEEE Sec. Priv. 2, 3 (May 2004), 49--55. DOI:https://doi.org/10.1109/MSP.2004.26Google Scholar
- Brent Kesler. [n.d.]. The vulnerability of nuclear facilities to cyber attack. http://large.stanford.edu/courses/2015/ph241/holloway1/docs/SI-v10-I1_Kesler.pdf.Google Scholar
- Woo-Hyun Ko, B. Satchidanandan, and P. R. Kumar. 2016. Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’16). 416--420. DOI:https://doi.org/10.1109/CNS.2016.7860529Google Scholar
- P. R. Kumar and Pravin Varaiya. 1986. Stochastic Systems: Estimation, Identification and Adaptive Control. Prentice-Hall, Inc., Upper Saddle River, NJ.Google ScholarDigital Library
- Tze Leung Lai and Ching Zong Wei. 1982. Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. The Annals of Statistics (1982), 154--166. The Institute of Mathematical Statistics.Google Scholar
- Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Sec. Priv. 9, 3 (2011), 49--51.Google ScholarDigital Library
- Gary Lorden et al. 1971. Procedures for reacting to a change in distribution. Ann. Math. Stat. 42, 6 (1971), 1897--1908.Google ScholarCross Ref
- Sreekanth Malladi, Jim Alves-Foss, and Robert B. Heckendorn. 2002. On Preventing Replay Attacks on Security Protocols. Technical Report. Idaho University Moscow, Department of Computer Science.Google Scholar
- Fei Miao, Miroslav Pajic, and George J. Pappas. 2013. Stochastic game approach for replay attack detection. In Proceedings of the IEEE 52nd Conference on Decision and Control (CDC’13). IEEE.Google Scholar
- Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. http://illmatics.com/Remote%20Car%20Hacking.pdf.Google Scholar
- Shaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas Diggavi, and Paulo Tabuada. 2015. Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’15). IEEE, 2929--2933.Google ScholarCross Ref
- Yilin Mo, Rohan Chabukswar, and Bruno Sinopoli. 2014. Detecting integrity attacks on SCADA systems. IEEE Trans. Contr. Syst. Technol. 22, 4 (2014), 1396--1407.Google ScholarCross Ref
- Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, and Bruno Sinopoli. 2012. Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100, 1 (2012), 195--209.Google ScholarCross Ref
- Yilin Mo and B. Sinopoli. 2009. Secure control against replay attacks. In Proceedings of the 47th Allerton Conference on Communication, Control, and Computing. DOI:https://doi.org/10.1109/ALLERTON.2009.5394956Google Scholar
- Y. Mo, S. Weerakkody, and B. Sinopoli. 2015. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Contr. Syst. 35, 1 (Feb. 2015), 93--109. DOI:https://doi.org/10.1109/MCS.2014.2364724Google Scholar
- Fabio Pasqualetti, Florian Dörfler, and Francesco Bullo. 2013. Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Contr. 58, 11 (2013), 2715--2729.Google ScholarCross Ref
- J. Petit and S. E. Shladover. 2015. Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transport. Syst. 16, 2 (Apr. 2015), 546--556. DOI:https://doi.org/10.1109/TITS.2014.2342271Google Scholar
- Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and LIDAR. In Proceedings of the Black Hat Europe Conference.Google Scholar
- Moshe Pollak. 1985. Optimal detection of a change in distribution. Ann. Stat. (1985), 206--227. The Institute of Mathematical Statistics.Google Scholar
- Udaya L. N. Puvvadi, Kevin Di Benedetto, Aditya Patil, Kyoung-Don Kang, and Youngjoon Park. 2015. Cost-effective security support in real-time video surveillance. IEEE Trans. Industr. Inform. 11, 6 (2015), 1457--1465.Google ScholarCross Ref
- Craig L. Robinson, H.-J. Schutz, Girish Baliga, and P. R. Kumar. 2007. Architecture and algorithm for a laboratory vehicle collision avoidance system. In Proceedings of the IEEE 22nd International Symposium on Intelligent Control. IEEE, 23--28.Google Scholar
- B. Satchidanandan and P. R. Kumar. 2016. Secure control of networked cyber-physical systems. In Proceedings of the IEEE 55th Conference on Decision and Control (CDC’16). 283--289. DOI:https://doi.org/10.1109/CDC.2016.7798283Google Scholar
- B. Satchidanandan and P. R. Kumar. 2017. Dynamic watermarking: Active defense of networked cyber-physical systems. Proc. IEEE 105, 2 (Feb. 2017), 219--240. DOI:https://doi.org/10.1109/JPROC.2016.2575064Google ScholarCross Ref
- B. Satchidanandan and P. R. Kumar. 2017. On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems. In Proceedings of the 9th International Conference on Communication Systems and Networks (COMSNETS’17). 23--30. DOI:https://doi.org/10.1109/COMSNETS.2017.7945354Google Scholar
- B. Satchidanandan and P. R. Kumar. 2017. The securable subspace of a linear stochastic system with malicious sensors and actuators. In Proceedings of the 55th Allerton Conference on Communication, Control, and Computing. 911--917. DOI:https://doi.org/10.1109/ALLERTON.2017.8262835Google Scholar
- Bharadwaj Satchidanandan and P. R. Kumar. 2018. Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System. Springer International Publishing, Cham, 217--228. DOI:https://doi.org/10.1007/978-3-319-67068-3_16Google Scholar
- B. Satchidanandan and P. R. Kumar. 2018. On the operational significance of the securable subspace for partially observed linear stochastic systems. In Proceedings of the IEEE Conference on Decision and Control (CDC’18). 2068--2073. DOI:https://doi.org/10.1109/CDC.2018.8619407Google Scholar
- B. Satchidanandan and P. R. Kumar. 2020. On the design of security-guaranteeing dynamic watermarks. IEEE Contr. Syst. Lett. 4, 2 (Apr. 2020), 307--312. DOI:https://doi.org/10.1109/LCSYS.2019.2925278Google Scholar
- Albert N. Shiryaev. 1963. On optimum methods in quickest detection problems. Theor. Prob. Its Appl. 8, 1 (1963), 22--46.Google ScholarCross Ref
- Yasser Shoukry, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava. 2015. PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, 1004--1015. DOI:https://doi.org/10.1145/2810103.2813679Google ScholarDigital Library
- Alexander G. Tartakovsky and Venugopal V. Veeravalli. 2005. General asymptotic Bayesian theory of quickest change detection. Theor. Prob. Its Appl. 49, 3 (2005), 458--497.Google ScholarCross Ref
- André Teixeira, Daniel Pérez, Henrik Sandberg, and Karl Henrik Johansson. 2012. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems. ACM, 55--64.Google ScholarDigital Library
- A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. 2012. Revealing stealthy attacks in control systems. In Proceedings of the 50th Allerton Conference on Communication, Control, and Computing. 1806--1813. DOI:https://doi.org/10.1109/Allerton.2012.6483441Google Scholar
- Junia Valente and Alvaro A. Cárdenas. 2015. Using visual challenges to verify the integrity of security cameras. In Proceedings of the 31st Computer Security Applications Conference (ACSAC’15). ACM, New York, NY, 141--150. DOI:https://doi.org/10.1145/2818000.2818045Google Scholar
- Venugopal V. Veeravalli and Taposh Banerjee. 2014. Quickest change detection. In Academic Press Library in Signal Processing, Vol. 3. Elsevier, 209--255.Google Scholar
Index Terms
- Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems
Recommendations
Dynamic intersections and self-driving vehicles
ICCPS '18: Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical SystemsConnected and automated vehicles are expected to be at the core of future intelligent transportation systems. One of the main practical challenges for self-driving vehicles on public roads is safe cooperation and collaboration among multiple vehicles ...
Highway Accident Localization Based on Virtual Fence for Intelligent Transportation Systems
Web Information Systems and ApplicationsAbstractIt is important to determine the mile marker information of traffic accident (i.e., accident localization) for highway repairs and emergency rescue services in intelligent transportation systems. Since traditional localization methods usually ...
Social vehicle-to-everything (V2X) communication model for intelligent transportation systems based on 5G scenario
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed SystemsVehicular-to-Everything (V2X) communications are the emerging paradigm for the Intelligent Transportation System (ITS) used to enhance the traffic efficiency and reliability of timely data delivery by implementing a complete set of communication ...
Comments