SlideShare a Scribd company logo
1 of 21
Secure Perception for
Autonomous Vehicles
Todd Humphreys, Aerospace Engineering
CTR Symposium, April 23, 2014
Autonomous Control System Security
The general secure control problem envisions arbitrary
manipulation of y and u (e.g, deception and DoS attacks)
2008
Example: Autonomous Ground Vehicles
(1) V2V and V2I security is fairly good, but CRL may be stale
(2) Navigation and timing security is poor due to GPS vulnerability
(3) High-level “autonomy protocol” may be fragile, hackable
Example: Autonomous Aircraft
Wesson and Humphreys, Scientific American, Nov. 2013
Example: Autonomous Aircraft
Shepard, Bhatti, Humphreys, Fansler, “Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,” Proc. ION GNSS, Nashville, TN, 2012
Covert post-capture UAV control is possible provided the
spoofer can learn the target’s flight pattern
Covert Post-Capture UAV Control
A.J. Kerns, D.P. Shepard, J.A. Bhatti, T.E. Humphreys,
"Unmanned Aircraft Capture and Control via GPS Spoofing,“ Journal of Field Robotics, 2014.
Result of GPS hacking attack
V2V and V2I Security
(1) How will unauthenticated messages be handled?
(2) How to deal with latency in certificate revocation?
(3) Are proposed local ad-hoc cross-checks good enough?
(4) Should we give up on privacy?
Cautionary Tale: FAA’s ADS-B is Insecure
It may be too late for ADS-B, but V2V and V2I still have a
chance to get security right
radionavlab.ae.utexas.edu

More Related Content

More from Center for Transportation Research - UT Austin

More from Center for Transportation Research - UT Austin (20)

Flying with SAVES
Flying with SAVESFlying with SAVES
Flying with SAVES
 
Regret of Queueing Bandits
Regret of Queueing BanditsRegret of Queueing Bandits
Regret of Queueing Bandits
 
Advances in Millimeter Wave for V2X
Advances in Millimeter Wave for V2XAdvances in Millimeter Wave for V2X
Advances in Millimeter Wave for V2X
 
Collaborative Sensing and Heterogeneous Networking Leveraging Vehicular Fleets
Collaborative Sensing and Heterogeneous Networking Leveraging Vehicular FleetsCollaborative Sensing and Heterogeneous Networking Leveraging Vehicular Fleets
Collaborative Sensing and Heterogeneous Networking Leveraging Vehicular Fleets
 
Collaborative Sensing for Automated Vehicles
Collaborative Sensing for Automated VehiclesCollaborative Sensing for Automated Vehicles
Collaborative Sensing for Automated Vehicles
 
Statistical Inference Using Stochastic Gradient Descent
Statistical Inference Using Stochastic Gradient DescentStatistical Inference Using Stochastic Gradient Descent
Statistical Inference Using Stochastic Gradient Descent
 
CAV/Mixed Transportation Modeling
CAV/Mixed Transportation ModelingCAV/Mixed Transportation Modeling
CAV/Mixed Transportation Modeling
 
Real-time Signal Control and Traffic Stability / Improved Models for Managed ...
Real-time Signal Control and Traffic Stability / Improved Models for Managed ...Real-time Signal Control and Traffic Stability / Improved Models for Managed ...
Real-time Signal Control and Traffic Stability / Improved Models for Managed ...
 
Sharing Novel Data Sources to Promote Innovation Through Collaboration: Case ...
Sharing Novel Data Sources to Promote Innovation Through Collaboration: Case ...Sharing Novel Data Sources to Promote Innovation Through Collaboration: Case ...
Sharing Novel Data Sources to Promote Innovation Through Collaboration: Case ...
 
UT SAVES: Situation Aware Vehicular Engineering Systems
UT SAVES: Situation Aware Vehicular Engineering SystemsUT SAVES: Situation Aware Vehicular Engineering Systems
UT SAVES: Situation Aware Vehicular Engineering Systems
 
Regret of Queueing Bandits
Regret of Queueing BanditsRegret of Queueing Bandits
Regret of Queueing Bandits
 
Sharing Novel Data Sources to Promote Innovation through Collaboration: Case ...
Sharing Novel Data Sources to Promote Innovation through Collaboration: Case ...Sharing Novel Data Sources to Promote Innovation through Collaboration: Case ...
Sharing Novel Data Sources to Promote Innovation through Collaboration: Case ...
 
CAV/Mixed Transportation Modeling
CAV/Mixed Transportation ModelingCAV/Mixed Transportation Modeling
CAV/Mixed Transportation Modeling
 
Collaborative Sensing for Automated Vehicles
Collaborative Sensing for Automated VehiclesCollaborative Sensing for Automated Vehicles
Collaborative Sensing for Automated Vehicles
 
Advances in Millimeter Wave for V2X
Advances in Millimeter Wave for V2XAdvances in Millimeter Wave for V2X
Advances in Millimeter Wave for V2X
 
Statistical Inference Using Stochastic Gradient Descent
Statistical Inference Using Stochastic Gradient DescentStatistical Inference Using Stochastic Gradient Descent
Statistical Inference Using Stochastic Gradient Descent
 
Status of two projects: Real-time Signal Control and Traffic Stability; Impro...
Status of two projects: Real-time Signal Control and Traffic Stability; Impro...Status of two projects: Real-time Signal Control and Traffic Stability; Impro...
Status of two projects: Real-time Signal Control and Traffic Stability; Impro...
 
SAVES general overview
SAVES general overviewSAVES general overview
SAVES general overview
 
D-STOP Overview April 2018
D-STOP Overview April 2018D-STOP Overview April 2018
D-STOP Overview April 2018
 
Managing Mobility during Design-Build Highway Construction: Successes and Les...
Managing Mobility during Design-Build Highway Construction: Successes and Les...Managing Mobility during Design-Build Highway Construction: Successes and Les...
Managing Mobility during Design-Build Highway Construction: Successes and Les...
 

Recently uploaded

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 

Recently uploaded (20)

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 

Secure Communications for Autonomous Vehicles

  • 1. Secure Perception for Autonomous Vehicles Todd Humphreys, Aerospace Engineering CTR Symposium, April 23, 2014
  • 2. Autonomous Control System Security The general secure control problem envisions arbitrary manipulation of y and u (e.g, deception and DoS attacks) 2008
  • 3. Example: Autonomous Ground Vehicles (1) V2V and V2I security is fairly good, but CRL may be stale (2) Navigation and timing security is poor due to GPS vulnerability (3) High-level “autonomy protocol” may be fragile, hackable
  • 4. Example: Autonomous Aircraft Wesson and Humphreys, Scientific American, Nov. 2013
  • 6.
  • 7.
  • 8. Shepard, Bhatti, Humphreys, Fansler, “Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,” Proc. ION GNSS, Nashville, TN, 2012
  • 9. Covert post-capture UAV control is possible provided the spoofer can learn the target’s flight pattern Covert Post-Capture UAV Control A.J. Kerns, D.P. Shepard, J.A. Bhatti, T.E. Humphreys, "Unmanned Aircraft Capture and Control via GPS Spoofing,“ Journal of Field Robotics, 2014.
  • 10. Result of GPS hacking attack
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. V2V and V2I Security (1) How will unauthenticated messages be handled? (2) How to deal with latency in certificate revocation? (3) Are proposed local ad-hoc cross-checks good enough? (4) Should we give up on privacy?
  • 20. Cautionary Tale: FAA’s ADS-B is Insecure It may be too late for ADS-B, but V2V and V2I still have a chance to get security right

Editor's Notes

  1. The general secure control problem, in which we wish to detect and survive an attack that can arbitrarily manipulate y and u is insoluble: under these conditions, it’s game over. To see why, consider just half the problem – that of secure state estimation ...
  2. By contrast to the so-called proximity spoofing attacks treated in (Humphreys et al., 2008) and (Shepard et al., 2012b), where the spoofer is effectively co-located with the target receiver, the current presentation considers spoofing from a distance, as illustrated in Fig. 1. Through its receive antenna, marked RX, the spoofer receives authentic signals from all visible GPS satellites. The vectors rTX and rt represent, respectively, the 3-dimensional coordinates of the spoofer’s transmit antenna, marked TX, and the target aircraft’s GPS antenna relative to the spoofer’s receive antenna. The spoofer and target antennas are assumed to be located at respective distances rsi and rti from the ith GPS satellite. The spoofer generates a counterfeit signal for each authentic signal received. In the case of an initially-aligned attack, the spoofer’s counterfeit signal ensemble arrives at the target antenna in such a way that each signal is approximately spreading-code-phase aligned (within a few meters) with its authentic counterpart. After capture of the target receiver’s carrier- and code-phase tracking loops, the spoofer adjusts the relative code phases of its spoofing signals to induce the target receiver to report the simulated (false) location r relative to its true location; the target receiver’s apparent time offset from true time can also be adjusted by a common displacement of the counterfeit code phases. An aligned attack is only possible if the spoofer (1) measures all relevant system delays to within a few nanoseconds, and (2) compensates for these delays by generating a slightly advanced (predicted) version of the signals it receives. For civil GPS signals, reliable prediction is trivial because the spreading codes are unencrypted and openly documented, the satellites follow regular orbits, and the modulating navigation data follow regular patterns. Military GPS signals, by contrast, enjoy strong encryption of the spreading code; indeed spreading code unpredictability is the very basis of their security. For the ith GPS satellite, the total distance-equivalent system delay that must be compensated is given by the equation above.
  3. By contrast to the so-called proximity spoofing attacks treated in (Humphreys et al., 2008) and (Shepard et al., 2012b), where the spoofer is effectively co-located with the target receiver, the current presentation considers spoofing from a distance, as illustrated in Fig. 1. Through its receive antenna, marked RX, the spoofer receives authentic signals from all visible GPS satellites. The vectors rTX and rt represent, respectively, the 3-dimensional coordinates of the spoofer’s transmit antenna, marked TX, and the target aircraft’s GPS antenna relative to the spoofer’s receive antenna. The spoofer and target antennas are assumed to be located at respective distances rsi and rti from the ith GPS satellite. The spoofer generates a counterfeit signal for each authentic signal received. In the case of an initially-aligned attack, the spoofer’s counterfeit signal ensemble arrives at the target antenna in such a way that each signal is approximately spreading-code-phase aligned (within a few meters) with its authentic counterpart. After capture of the target receiver’s carrier- and code-phase tracking loops, the spoofer adjusts the relative code phases of its spoofing signals to induce the target receiver to report the simulated (false) location r relative to its true location; the target receiver’s apparent time offset from true time can also be adjusted by a common displacement of the counterfeit code phases. An aligned attack is only possible if the spoofer (1) measures all relevant system delays to within a few nanoseconds, and (2) compensates for these delays by generating a slightly advanced (predicted) version of the signals it receives. For civil GPS signals, reliable prediction is trivial because the spreading codes are unencrypted and openly documented, the satellites follow regular orbits, and the modulating navigation data follow regular patterns. Military GPS signals, by contrast, enjoy strong encryption of the spreading code; indeed spreading code unpredictability is the very basis of their security. For the ith GPS satellite, the total distance-equivalent system delay that must be compensated is given by the equation above.
  4. The 213-foot, $80M White Rose of Drachs motoryacht.
  5. WROD experiment team (from left): Kenneth Himschoot, Master Andrew Schofield, Prof. Todd Humphreys, graduate studen Jahshan Bhatti.
  6. WROD navigation and surveillance equipment: 2 independent GPS units, magnetic compass, 2 independent gyrocompasses, dual-band radar, down-facing sonar, Doppler speed log, electronic chart display