Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking - Robotics Institute Carnegie Mellon University

Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking

M. Porter, S. Dey, A. Joshi, P. Hespanhol, A. Aswani, M. Johnson-Roberson, and R. Vasudevan
Conference Paper, Proceedings of IEEE Conference on Control Technology and Applications (CCTA '20), August, 2020

Abstract

Cyber-physical systems (CPS) such as autonomous vehicles rely on both on-board sensors and external communications to estimate their state. Unfortunately these communications render the system vulnerable to cyber-attacks. While many attack detection methods have begun to address these concerns they are limited to linear time-invariant (LTI) systems. Though LTI system models provide accurate approximations for CPS such as autonomous vehicles at constant speed and turning radii they are inaccurate for more complex motions such as lane changes turns and changes in velocity. Since these more complex motions are more suitably described by linear time-varying (LTV) system models rather than LTI models Dynamic Watermarking which adds a private excitation to the input signal to validate measurements has recently been extended to LTV systems. However this extension does not allow for LTV systems that require several steps before the ef ect of a given control input can be seen in the measurement signal. Additionally there is no consideration for the time-varying effects of auto-correlation. Furthermore a proof of concept was only provided using simulations of a simplified model. This paper relaxes the requirement for inputs to be visible in a single step and constructs an auto-correlation normalizing factor to remove the effects of auto-correlation. In addition, Dynamic Watermarking is applied to a high-fidelity vehicle model in CarSim TM and a 1/10 scale autonomous rover to further reinforce the proof of concept for realistic systems. In each case, the vehicle follows a predefined path with time-varying velocity and turning radii. A replay attack, which replays previously recorded measurements, is shown to be detectable using LTV Dynamic Watermarking in a quick and repeatable manner.

BibTeX

@conference{Porter-2020-130118,
author = {M. Porter and S. Dey and A. Joshi and P. Hespanhol and A. Aswani and M. Johnson-Roberson and R. Vasudevan},
title = {Detecting Deception Attacks on Autonomous Vehicles via Linear Time-Varying Dynamic Watermarking},
booktitle = {Proceedings of IEEE Conference on Control Technology and Applications (CCTA '20)},
year = {2020},
month = {August},
}