Attack Resilient State Estimation for Vehicular Systems

Similar documents
Vehicle Trust Management for Connected Vehicles

Cyber-Physical System Checkpointing and Recovery

Sensory Augmentation for Increased Awareness of Driving Environment

State Estimation for Continuous-Time Systems with Perspective Outputs from Discrete Noisy Time-Delayed Measurements

Autonomous Mobile Robot Design

Mobile Robotics. Mathematics, Models, and Methods. HI Cambridge. Alonzo Kelly. Carnegie Mellon University UNIVERSITY PRESS

Turning an Automated System into an Autonomous system using Model-Based Design Autonomous Tech Conference 2018

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

EE631 Cooperating Autonomous Mobile Robots

Safe Prediction-Based Local Path Planning using Obstacle Probability Sections

W4. Perception & Situation Awareness & Decision making

Jo-Car2 Autonomous Mode. Path Planning (Cost Matrix Algorithm)

High-assurance software for autonomous ground systems

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Reliable Navigation for Autonomous Vehicles in Connected Vehicle Environments by using Multi-agent Sensor Fusion

Examining future priorities for cyber security management

Dynamic Sensor-based Path Planning and Hostile Target Detection with Mobile Ground Robots. Matt Epperson Dr. Timothy Chung

Intelligent Outdoor Navigation of a Mobile Robot Platform Using a Low Cost High Precision RTK-GPS and Obstacle Avoidance System

Optimization of the Simultaneous Localization and Map-Building Algorithm for Real-Time Implementation

Automated Driving Development

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

WeVe: When Smart Wearables Meet Intelligent Vehicles

IEEE PROJECTS ON EMBEDDED SYSTEMS

Resilient Smart Grids

COS Lecture 13 Autonomous Robot Navigation

LIMoSim: A Lightweight and Integrated Approach for Simulating Vehicular Mobility with OMNeT++

GNU Radio Software Defined DSRC Radio

A Longitudinal Control Algorithm for Smart Cruise Control with Virtual Parameters

Automatic Pouring Robot. Akilah Harris-Williams Adam Olmstead Philip Pratt-Szeliga Will Roantree

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015

Idle Object Detection in Video for Banking ATM Applications

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Introduction to VANET

ON THE DUALITY OF ROBOT AND SENSOR PATH PLANNING. Ashleigh Swingler and Silvia Ferrari Mechanical Engineering and Materials Science Duke University

Terrain Roughness Identification for High-Speed UGVs

The Internet of Things: Secure Distributed. Inference

Practical Course WS12/13 Introduction to Monte Carlo Localization

Protection Against DDOS Using Secure Code Propagation In The VANETs

INCREMENTAL DISPLACEMENT ESTIMATION METHOD FOR VISUALLY SERVOED PARIED STRUCTURED LIGHT SYSTEM (ViSP)

Evaluation of Moving Object Tracking Techniques for Video Surveillance Applications

Dealing with Scale. Stephan Weiss Computer Vision Group NASA-JPL / CalTech

A Modular Software Framework for Eye-Hand Coordination in Humanoid Robots

Cybersecurity of Space Missions

#65 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR AT TRAFFIC INTERSECTIONS

Three-Dimensional Off-Line Path Planning for Unmanned Aerial Vehicle Using Modified Particle Swarm Optimization

다중센서기반자율시스템의모델설계및개발 이제훈차장 The MathWorks, Inc. 2

Laserscanner Based Cooperative Pre-Data-Fusion

CYBER RISK AND SHIPS :PRACTICAL ISSUES FOLLOWING BIMCO GUIDELINE

A General Framework for Mobile Robot Pose Tracking and Multi Sensors Self-Calibration

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Final Exam Practice Fall Semester, 2012

6D-Vision: Fusion of Stereo and Motion for Robust Environment Perception

Distributed Agent-Based Intrusion Detection for the Smart Grid

Aerial Robotic Autonomous Exploration & Mapping in Degraded Visual Environments. Kostas Alexis Autonomous Robots Lab, University of Nevada, Reno

Smart Attacks require Smart Defence Moving Target Defence

Unmanned Vehicle Technology Researches for Outdoor Environments. *Ju-Jang Lee 1)

Innovative M-Tech projects list

Heavy Vehicle Cyber Security Bulletin

An Experimental Analysis of the SAE J1939 Standard

Neuro-adaptive Formation Maintenance and Control of Nonholonomic Mobile Robots

An Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation

Optimal Path Finding for Direction, Location and Time Dependent Costs, with Application to Vessel Routing

Securing the future of mobility

Adaption of Robotic Approaches for Vehicle Localization

On A Traffic Control Problem Using Cut-Set of Graph

UAV Autonomous Navigation in a GPS-limited Urban Environment

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?

TURN AROUND BEHAVIOR GENERATION AND EXECUTION FOR UNMANNED GROUND VEHICLES OPERATING IN ROUGH TERRAIN

Mobile Millennium Using Smartphones as Traffic Sensors

Anibal Ollero Professor and head of GRVC University of Seville (Spain)

Mapping Contoured Terrain Using SLAM with a Radio- Controlled Helicopter Platform. Project Proposal. Cognitive Robotics, Spring 2005

Robot Localization based on Geo-referenced Images and G raphic Methods

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Impacts of Brooks Iyengar Algorithm on PhD Dissertations

Unmanned Aerial Vehicles

A Reactive Bearing Angle Only Obstacle Avoidance Technique for Unmanned Ground Vehicles

Vehicle Localization. Hannah Rae Kerner 21 April 2015

Nonlinear State Estimation for Robotics and Computer Vision Applications: An Overview

Error Simulation and Multi-Sensor Data Fusion

Towards Gaussian Multi-Robot SLAM for Underwater Robotics

Placement and Motion Planning Algorithms for Robotic Sensing Systems

Marker Based Localization of a Quadrotor. Akshat Agarwal & Siddharth Tanwar

CHAPTER OUTLINE Last Updated: 12 April 2014

Spring 2010: Lecture 9. Ashutosh Saxena. Ashutosh Saxena

MTRX4700: Experimental Robotics

EKF Localization and EKF SLAM incorporating prior information

IMU and Encoders. Team project Robocon 2016

MODAInnovations Complete Academic Project Solutions

Puzzle games (like Rubik s cube) solver

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

(W: 12:05-1:50, 50-N202)

Intermediate Desired Value Approach for Continuous Transition among Multiple Tasks of Robots

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014

Developing Algorithms for Robotics and Autonomous Systems

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

Cyber-physical intrusion detection on a robotic vehicle

Transcription:

December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania DISCLAIMER The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the U.S. Department of Transportation s University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof.

PROBLEM In recent years we have been witnessing an increase in autonomous vehicles: most of the cars we drive nowadays use multiple sensors to maintain constant speed (e.g., adaptive cruise control), avoid obstacles and collisions, park, move autonomously through traffic, and improve the overall driving comfort. In the presence of a cyber attack in which the received information from the sensors is compromised, safety is also compromised. Thus, our goal is to develop a resilient framework to guarantee vehicular safety in the presence of malicious cyber attacks. To consider cyber attacks that can compromise the overall safety of a vehicle, we are exploiting sensor fusion and redundancy in the sensor measurements. Specifically the problem under investigation is the following: Given a vehicle with N sensors measuring directly or indirectly a certain state, find the set of policies such that the vehicle can achieve a desired state while one or more sensor measurements are maliciously compromised by an adversarial attack. We focus primarily on control design schemes and address attacks on sensors for autonomous ground vehicles (Fig. 1). We build upon ways to introduce redundancy within the control loop, as well as methods for attack detection and identification. We utilize security-aware attack-resilient estimators that identify an attack and allow the controller to pursue a mitigation strategy. Fig.1: The ground vehicle used to test the attack detection/mitigation scheme developed within this project. The figure displays the sensors setup of the platform.

METHODOLOGY To solve the problem above, we build an adaptive recursive estimator (RAE), which uses a filter approach to estimate the state while reducing the malicious effects introduced by an attacker. Our recursive algorithm is motivated by the results found in the Kalman Filter implementation with some modifications to accommodate the possible presence of an attack in one of the sensors. Together with the prediction and update phases found in the Kalman implementation we include a shield procedure. If an attack is present and such that one of the measurements is corrupted, the goal is to remove it or mitigate its effect. Since the attack vector is generally unknown, the strategy we implement changes the covariance matrix associated with the measurement error in order to increase the uncertainty where the measurement is different from the predicted state estimate. Our formulation is hierarchical and use feedback to control the motion of the vehicle and achieve the desired state. Specifically the application focus of this work is cruise-control for ground vehicles. Each sensor measures a specific environmental variable correlated with speed. The sensor measurements are passed to a security module, which is in charge of attack detection and state estimation and outputs an estimate of the velocity of the vehicle. The estimate is sent to a controller (in our application a P.I.D. loop) that returns the control inputs to drive the actuators to the desired state. RESULTS We illustrated the development framework on a design of secure cruise control of a fully electric unmanned ground vehicles (UGV) built at the University of Pennsylvania (UPenn), shown in Fig. 1. The robot was programmed in C++ on the ROS (robot operating system) environment. Several data were collected to extract the dynamical model of the vehicle. These tests were conducted on different type of surfaces both indoor and outdoor and, as a result, a seventh order model was extracted that captures both the electromechanical and kinematical constraints of the vehicle. Extensive simulations run in Matlab/Simulink (Fig. 2(a)) has shown that the vehicle can reach and maintain the desired state even when one of the sensors is compromised by a malicious attack. Specifically we showed that if less than N/2 sensors are under attack, we can estimate the correct state of the system and maintain the desired cruise speed.

During the hardware implementations (Fig. 2(b)) we decided to use GPS and the left and right encoders to obtain three independent speed measurements. The GPS measures time-stamped global position, thus with this information and specific transformations we can derive the speed. Similarly from the encoder we can obtain the number of counts which translate into rotational velocity and finally into linear velocity. (a) Fig.2: (a) Results from simulations in ROS and Matlab in which the GPS is spoofed while other two sensors are not compromised (bottom-left subfigure). (b) Hardware implementation on the UGV. The subfigure shows the GUI used during the experiments to visualize data and to launch attacks on the sensors. (b) Once an attack is injected in one of the sensors, a weight is added to the noise variance of the corrupted measurement decreasing its trustworthiness. During the experiments each of the sensors was attacked while the robot was moving to maintain the set cruise speed. The RAE algorithm was always able to detect and remove the sensor under attack and guarantee the desired performance. CONCLUSION The developed adaptive technique compares the estimated state with each of the sensor measurements and returns a higher variance of the measurement noise if a sensor is under attack. Within this technique we can consider noisy measurements to estimate the correct state of the system and detect attacks that act outside the noise profile of the sensors. The only limitation is that the adaptive recursive algorithm needs an accurate selection of the noise profile and weights in order to converge to the correct state. A too small bound on the error noise implies that the estimator may reject most of the measurements while a too large bound on the error can lead more attacks going through the system because they are within the error noise

profile. In real applications these boundaries on the noise profiles are usually given or can be calculated through hardware testing. Future work will focus on extending the proposed technique on multi-vehicle systems incorporating V2V (vehicle-to-vehicle) and V2I (vehicle-to-infrastructure) protocols. We are also targeting more complex hardware implementation such as adaptive cruise control, waypoint navigation, and complex attack vectors on both sensors and actuators as well as experimenting with passenger automobiles.