Secure Communications for Autonomous Vehicles
-
Upload
center-for-transportation-research-ut-austin -
Category
Engineering
-
view
225 -
download
5
description
Transcript of Secure Communications for Autonomous Vehicles
![Page 1: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/1.jpg)
Secure Perception for Autonomous Vehicles
Todd Humphreys, Aerospace EngineeringCTR Symposium, April 23, 2014
![Page 2: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/2.jpg)
Autonomous Control System Security
The general secure control problem envisions arbitrary manipulation of y and u (e.g, deception and DoS attacks)
2008
![Page 3: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/3.jpg)
Example: Autonomous Ground Vehicles
(1) V2V and V2I security is fairly good, but CRL may be stale (2) Navigation and timing security is poor due to GPS vulnerability(3) High-level “autonomy protocol” may be fragile, hackable
![Page 4: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/4.jpg)
Example: Autonomous Aircraft
Wesson and Humphreys, Scientific American, Nov. 2013
![Page 5: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/5.jpg)
Example: Autonomous Aircraft
![Page 6: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/6.jpg)
![Page 7: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/7.jpg)
![Page 8: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/8.jpg)
Shepard, Bhatti, Humphreys, Fansler, “Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,” Proc. ION GNSS, Nashville, TN, 2012
![Page 9: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/9.jpg)
Covert post-capture UAV control is possible provided the spoofer can learn the target’s flight pattern
Covert Post-Capture UAV Control
A.J. Kerns, D.P. Shepard, J.A. Bhatti, T.E. Humphreys, "Unmanned Aircraft Capture and Control via GPS Spoofing,“ Journal of Field Robotics, 2014.
![Page 10: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/10.jpg)
Result of GPS hacking attack
![Page 11: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/11.jpg)
![Page 12: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/12.jpg)
![Page 13: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/13.jpg)
![Page 14: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/14.jpg)
![Page 15: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/15.jpg)
![Page 16: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/16.jpg)
![Page 17: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/17.jpg)
![Page 18: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/18.jpg)
![Page 19: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/19.jpg)
V2V and V2I Security
(1) How will unauthenticated messages be handled? (2) How to deal with latency in certificate revocation?(3) Are proposed local ad-hoc cross-checks good enough?(4) Should we give up on privacy?
![Page 20: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/20.jpg)
Cautionary Tale: FAA’s ADS-B is Insecure
It may be too late for ADS-B, but V2V and V2I still have a chance to get security right
![Page 21: Secure Communications for Autonomous Vehicles](https://reader033.fdocuments.in/reader033/viewer/2022061221/54be74194a79591e7f8b4570/html5/thumbnails/21.jpg)
radionavlab.ae.utexas.edu