论文标题

谁在控制?自动驾驶汽车中基于MMWave的感应的实用物理层攻击和防御

Who is in Control? Practical Physical Layer Attack and Defense for mmWave based Sensing in Autonomous Vehicles

论文作者

Sun, Zhi, Balakrishnan, Sarankumar, Su, Lu, Bhuyan, Arupjyoti, Wang, Pu, Qiao, Chunming

论文摘要

由于毫米波(MMWave)频带的宽带宽导致了前所未有的精度,因此MMWave感应对许多应用至关重要,尤其是在自动驾驶汽车(AVS)中。此外,与其他传感对应物(如相机和激光雷达)相比,MMWave感应具有卓越的可靠性,这对于关键危机至关重要。因此,了解安全漏洞并提高MMWave感测的安全性和可靠性至关重要。为此,我们通过在最先进的MMWave测试台上设计和实施实用的物理层攻击和防御策略,对AVS中基于MMWave的传感系统进行端到端的安全性分析。开发了各种策略来通过欺骗其MMWave感应模块来控制受害者AV,包括在任意位置增加假障碍并伪造现有障碍的位置。建造了五种现实世界中的攻击场景,以欺骗受害者的AV,并迫使其做出危险的驾驶决定,导致致命的坠机事故。进行现场实验,以使用基于林肯MKZ的AV测试床研究各种攻击方案的影响,该测试床确实可以验证攻击者确实可以控制受害者AV以损害其安全性和安全性。为了捍卫攻击,我们设计并实施了挑战反应身份验证方案和RF指纹方案,以可靠地检测上述欺骗攻击。

With the wide bandwidths in millimeter wave (mmWave) frequency band that results in unprecedented accuracy, mmWave sensing has become vital for many applications, especially in autonomous vehicles (AVs). In addition, mmWave sensing has superior reliability compared to other sensing counterparts such as camera and LiDAR, which is essential for safety-critical driving. Therefore, it is critical to understand the security vulnerabilities and improve the security and reliability of mmWave sensing in AVs. To this end, we perform the end-to-end security analysis of a mmWave-based sensing system in AVs, by designing and implementing practical physical layer attack and defense strategies in a state-of-the-art mmWave testbed and an AV testbed in real-world settings. Various strategies are developed to take control of the victim AV by spoofing its mmWave sensing module, including adding fake obstacles at arbitrary locations and faking the locations of existing obstacles. Five real-world attack scenarios are constructed to spoof the victim AV and force it to make dangerous driving decisions leading to a fatal crash. Field experiments are conducted to study the impact of the various attack scenarios using a Lincoln MKZ-based AV testbed, which validate that the attacker can indeed assume control of the victim AV to compromise its security and safety. To defend the attacks, we design and implement a challenge-response authentication scheme and a RF fingerprinting scheme to reliably detect aforementioned spoofing attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源