Vehicle Trust Management for Connected Vehicles

Similar documents
Attack Resilient State Estimation for Vehicular Systems

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cyber-Physical System Checkpointing and Recovery

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

WeVe: When Smart Wearables Meet Intelligent Vehicles

Vehicle To Android Communication Mode

Mobile Millennium Using Smartphones as Traffic Sensors

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Securing the future of mobility

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Examining future priorities for cyber security management

Cooperative Vehicles Opportunity and Challenges

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Autonomous Mobile Robot Design

On A Traffic Control Problem Using Cut-Set of Graph

An Experimental Analysis of the SAE J1939 Standard

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

Autorama, Connecting Your Car to

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015

CYBER RISK AND SHIPS :PRACTICAL ISSUES FOLLOWING BIMCO GUIDELINE

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Protection Against DDOS Using Secure Code Propagation In The VANETs

Reduction Deliverable Intelligent V2V and V2I communication

IoT: Here or Hype? Steve Eglash Executive Director, Secure Internet of Things Project. ǀ Secure Internet of Things Project 1

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

ITS (Intelligent Transportation Systems) Solutions

Resilient Smart Grids

CS244-Introduction to Embedded Systems and Ubiquitous Computing. Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010

High-assurance software for autonomous ground systems

The Top 6 WAF Essentials to Achieve Application Security Efficacy

FPGA Image Processing for Driver Assistance Camera

Multi-Sector Urban System Initiatives

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

NCHRP Project Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies

Internet of Things Toolkit for Small and Medium Businesses

Prospects for Networked Vehicles of the Future

Heavy Vehicle Cyber Security Bulletin

#65 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR AT TRAFFIC INTERSECTIONS

REAL TIME PUBLIC TRANSPORT INFORMATION SERVICE

Electrification of Mobility

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

TomTom Innovation. Hans Aerts VP Software Development Business Unit Automotive November 2015

IEEE PROJECTS ON EMBEDDED SYSTEMS

User s Manual. Version

Airport Security & Safety Thales, Your Trusted Hub Partner

Accelerating Innovation and Collaboration for the Next Stage

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

The Need for Operational and Cyber Resilience in Transportation Systems

IoT CoAP Plugtests & Workshop Nov 27, 2012 Sophia Antipolis

Dedicated Short Range Communication: What, Why and How?

Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Cohda Wireless White Paper Mobility and Multipath: Challenges for DSRC

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

Data Backup for Mobile Nodes : a Cooperative Middleware and an Experimentation Platform

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Strategic Transport Research and Innovation Agenda - STRIA

ISAO SO Product Outline

Cybersecurity, safety and resilience - Airline perspective

Location-Specific Cyber Risk

November 28, 2012 ALTERNATIVES ANALYSIS PUBLIC MEETING

Control Challenges in the Vehicle Infrastructure Initiative (VII)

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

Sybil Attack Detection and Prevention Using AODV in VANET

Advanced Transportation Optimization Systems (ATOS)

Turbocharging Connectivity Beyond Cellular

Hardening Attack Vectors to cars by Fuzzing

How to Create, Deploy, & Operate Secure IoT Applications

ECE 1161/2161 Embedded Computer System Design 2. Introduction. Wei Gao. Spring

Evaluation of a laser-based reference system for ADAS

New Zealand National Cyber Security Centre Incident Summary

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov

Turning an Automated System into an Autonomous system using Model-Based Design Autonomous Tech Conference 2018

Security Challenges with ITS : A law enforcement view

SIP Automated Driving System ー Mobility bringing everyone a smile ー

ADVANCED ENDPOINT PROTECTION TEST REPORT

Enabling The Connected Car Revolution

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

Reporting road hazards using in-vehicle camera

Vehicular traffic estimation through bluetooth detection the open-source way

> Acoustical feedback in the form of a beep with increasing urgency with decreasing distance to an obstacle

CSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018

Strategies for Maritime Cyber Security Leveraging the Other Modes

Emerging Connected Vehicle based

Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Sensory Augmentation for Increased Awareness of Driving Environment

IEEE-SA Internet of Things - Security & Standards

People- and Environment-friendly Urban Development Utilizing Geospatial Information

State Estimation for Continuous-Time Systems with Perspective Outputs from Discrete Noisy Time-Delayed Measurements

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Continuous protection to reduce risk and maintain production availability

Transcription:

Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11

DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation s University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof.

Problem: The goal of this project is to research a wide range of transportation-related issues including: improving health and safety for all users of the transportation system, including bicycles, pedestrians and transit modes; reducing carbon emissions and other environmental impacts of transportation through a transition to zero-emission vehicles and fuels; and evaluating how increasingly autonomous vehicles affect driver behavior, safety and performance. Consider a scenario where a vehicle on a highway broadcasts a message with an incident report (e.g., accident, traffic congestion, broken bridge) to the vehicles immediately behind it using the underlying V2V network. Each receiving vehicle forwards the message further downstream. Additionally, if a forwarding vehicle (that is, the user driving it) believes the message itself, it will endorse the message by signing it. A vehicle originating an incident report will always endorse it. Consequently, a vehicle receiving a V2V incident report will have at least one endorsement associated with it. Upon receiving an incident report, a vehicle needs to make a decision on whether it trusts the report based on all the vehicles that have endorsed the report. This decision is taken based on: (1) a trust triple computed for each of the endorsers, and (2) combining the individual endorser trust triples to produce an aggregate trust score for the message. Approach: To solve the problem above, we build an adaptive recursive estimator (RAE), which uses a filter approach to estimate the state while reducing the malicious effects introduced by an attacker. Figure 2: Experimental vehicle platform used to test the attack detection/mitigation scheme developed for this project.

Methodology: Our recursive algorithm is motivated by the results found in the Kalman Filter implementation with some modifications to accommodate the possible presence of an attack in one of the sensors. Together with the prediction and update phases found in the Kalman implementation we include a shield procedure. If an attack is present and such that one of the measurements is corrupted, the goal is to remove it or mitigate its effect. Since the attack vector is generally unknown, the strategy we implement changes the covariance matrix associated with the measurement error in order to increase the uncertainty where the measurement is different from the predicted state estimate. Our formulation is hierarchical and use feedback to control the motion of the vehicle and achieve the desired state. Specifically the application focus of this work is cruise-control for ground vehicles. Each sensor measures a specific environmental variable correlated with speed. The sensor measurements are passed to a security module, which is in charge of attack detection and state estimation and outputs an estimate of the velocity of the vehicle. The estimate is sent to a controller (in our application a P.I.D. loop) that returns the control inputs to drive the actuators to the desired state. Findings: Several data were collected to extract the dynamical model of the vehicle. These tests were conducted on different type of surfaces both indoor and outdoor and, as a result, a seventh order model was extracted that capture both the electromechanical and kinematical constraints of the vehicle. Extensive simulations run in Matlab/Simulink (Fig. 2(a)) has shown that the vehicle can reach and maintain the desired state even when one of the sensors is compromised by a malicious attack. Specifically we showed that if less than N/2 sensors are under attack, we can estimate the correct state of the system and maintain the desired cruise speed. (a) (b) Figure 2: Results from when GPS signals are spoofed and the performance of the autonomous vehicle. The trust on an endorser is computed as a triple (t, c, f). Here, t is the measured reputation value computed based on the endorser s history of providing a correct and incorrect endorsement. It could be measured as simply as (# of endorsements of factual reports/total # of endorsements) assuming independence of individual endorsements. The value c is the

level of confidence on the measured reputation t, computed based on the goodness of fit of the distribution of the endorser s behavior to a specific user behavior. Finally, f is the default reputation value that is essential to reason about reports received from a vehicle that does not have any historical information available for it. The value of f is computed using static information about the endorser such as (1) vehicle make (e.g., Ford, BMW, etc.), (2) vehicle model (e.g., Corolla, Focus, etc.), (3) vehicle history (e.g., Carfax report), (4) vehicle type (e.g., ambulance, police car, etc.), (5) context information (e.g., current location: North Philly; current time: 2:00am). The vehicle uses the V2I network to obtain the static information about the endorsers, usually from the registration authority that assigns vehicle ids. Additionally, the user specifies policies to determine f, by explicitly stating its value for various combinations of static and contextual information. Conclusions: Thanks to the large availability and quality of modern sensors and the high CPU computation power, modern vehicles are becoming more and more autonomous increasing the overall driving comfort. However these vehicles are not built with security in mind. In fact hackers could compromise vehicle safety by spoofing sensors or by injecting malicious/malformed data through their network system. In our work we investigate techniques to detect and defend against malicious cyber attacks on modern vehicles. Our first target has been to develop techniques for one vehicle. Now that we have developed reliable attack resilient techniques for one system, we are expanding the current research to incorporate multi-vehicle networks interacting with each other using V2V and V2I technologies. Recommendations: Future work will focus on extending the proposed technique on multi-vehicle systems incorporating V2V (vehicle-to-vehicle) and V2I (vehicle-to-infrastructure) protocols. We are also targeting more complex hardware implementation such as adaptive cruise control, waypoint navigation, and complex attack vectors on both sensors and actuators as well as experimenting with passenger automobiles.