skip to main content
research-article

Attack-resilient Fusion of Sensor Data with Uncertain Delays

Published: 23 August 2022 Publication History

Abstract

Malicious attackers may disrupt the safety of autonomous systems through compromising sensors to feed wrong measurements to the controller. This article proposes attack-resilient sensor fusion that combines local sensor readings and shared sensing information from multiple sources. The method results in higher resilience against sensor attacks through jointly considering sensing noise and uncertain communication delay. To be specific, we first identify the considerable impact of the delay on determining attacked sensors. Second, we present a novel two-dimensional abstract sensor model, where each measurement is augmented as a probabilistic interval based on the convolution of the noise and delay. Third, we propose a fusion algorithm that admits the fused value with highest joint probability distribution of the intervals to tolerate corrupted measurements. Finally, we demonstrate the effectiveness of our method in a vehicle-platoon case study using extensive simulations and testbed experiments.

References

[1]
Seyed Farhad Aghili, Maede Ashouri-Talouki, and Hamid Mala. 2018. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomput. 74, 1 (2018), 509–525.
[2]
Francis Akowuah and Fanxin Kong. 2021. Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges. In Proceedings of the 4th International Conference on Connected and Autonomous Driving (MetroCAD). IEEE.
[3]
Francis Akowuah and Fanxin Kong. 2021. Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 237–250.
[4]
Francis Akowuah and Fanxin Kong. 2021. Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE.
[5]
Francis Akowuah, Romesh Prasad, Carlos Omar Espinoza, and Fanxin Kong. 2021. Recovery-by-learning: Restoring autonomous cyber-physical systems from sensor attacks. In Proceedings of the 27th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 61–66.
[6]
Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhang, and Kai Zeng. 2017. String stability analysis of cooperative adaptive cruise control under jamming attacks. In Proceedings of the IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 157–162.
[7]
Yosef Ashibani and Qusay H. Mahmoud. 2017. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 68 (2017), 81–97.
[8]
Filippo Cacace, Alfredo Germani, and Costanzo Manes. 2016. State estimation and control of nonlinear systems with large and variable measurement delays. In Recent Results on Nonlinear Delay Control Systems. Springer, 95–112.
[9]
Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, and Z. Morley Mao. 2019. Adversarial sensor attack on lidar-based perception in autonomous driving. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2267–2281.
[10]
Bo Chen, Li Yu, Wenan Zhang, and Andong Liu. 2013. Robust information fusion estimator for multiple delay-tolerant sensors with different failure rates. IEEE Trans. Circ. Syst. I-regul. Pap. 60, 2 (2013), 401–414.
[11]
Michelle S. Chong, Masashi Wakaiki, and Joao P. Hespanha. 2015. Observability of linear systems under adversarial attacks. In Proceedings of the American Control Conference (ACC). IEEE, 2439–2444.
[12]
H. Fawzi, P. Tabuada, and S. Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Automat. Control 59, 6 (2014), 1454–1467.
[13]
P. Ferrari, A. Flammini, E. Sisinni, S. Rinaldi, D. Brandão, and M. S. Rocha. 2018. Delay estimation of industrial IoT applications based on messaging protocols. IEEE Trans. Instrum. Meas. 67, 9 (2018), 2188–2199.
[14]
Ajit Gopalakrishnan, Niket S. Kaisare, and Shankar Narasimhan. 2011. Incorporating delayed and infrequent measurements in extended Kalman filter based nonlinear state estimation. J. Process Contr. 21, 1 (2011), 119–129.
[15]
Xiaolong Guo, Song Han, X. Sharon Hu, Xun Jiao, Yier Jin, Fanxin Kong, and Michael Lemmon. 2021. Towards scalable, secure, and smart mission-critical IoT systems: Review and vision. In Proceedings of the International Conference on Embedded Software. ACM, 1–10.
[16]
Ke He, Le He, Lisheng Fan, Yansha Deng, George K. Karagiannidis, and Arumugam Nallanathan. 2021. Learning-based signal detection for MIMO systems with unknown noise statistics. IEEE Trans. Commun. 69, 5 (2021), 3025–3038.
[17]
Ning He, Dawei Shi, and Tongwen Chen. 2018. Self-triggered model predictive control for networked control systems based on first-order hold. Int. J. Robust Nonlin. Contr. 28, 4 (2018), 1303–1318.
[18]
Qing He and Jinkun Liu. 2016. Observer-based stabilisation of a class of nonlinear systems in the presence of measurement delay. Int. J. Contr. 89, 6 (2016), 1180–1190.
[19]
Tianjia He, Lin Zhang, Fanxin Kong, and Asif Salekin. 2020. Exploring inherent sensor redundancy for automotive anomaly detection. In Proceedings of the 57th Design Automation Conference.
[20]
Joo P. Hespanha, Payam Naghshtabrizi, and Yonggang Xu. 2007. A survey of recent results in networked control systems. Proc. IEEE 95, 1 (2007), 138–162.
[21]
Jinquan Huang and F. L. Lewis. 2003. Neural-network predictive control for nonlinear dynamic systems with time-delay. IEEE Trans. Neural Netw. 14, 2 (2003), 377–389.
[22]
Yi-Bo Huang, Yong He, Jianqi An, and Min Wu. 2021. Polynomial-type Lyapunov-Krasovskii functional and Jacobi-Bessel inequality: Further results on stability analysis of time-delay systems. IEEE Trans. Automat. Control 66, 6 (2021), 2905–2912.
[23]
Radoslav Ivanov, Miroslav Pajic, and Insup Lee. 2016. Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans. Embed. Comput. Syst. 15, 1 (2016), 21.
[24]
Iasson Karafyllis and Miroslav Krstic. 2011. Nonlinear stabilization under sampled and delayed measurements, and with inputs subject to delay and zero-order hold. IEEE Trans. Automat. Control 57, 5 (2011), 1141–1154.
[25]
Ali Khalajmehrabadi, Nikolaos Gatsis, David Akopian, and Ahmad F. Taha. 2018. Real-time rejection and mitigation of time synchronization attacks on the global positioning system. IEEE Trans. Industr. Electron. 65, 8 (2018), 6425–6435.
[26]
Bahador Khaleghi, Alaa Khamis, Fakhreddine O. Karray, and Saiedeh N. Razavi. 2013. Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion 14, 1 (2013), 28–44.
[27]
Fanxin Kong, Oleg Sokolsky, James Weimer, and Insup Lee. 2019. State consistencies for cyber-physical system recovery. In Proceedings of the 2nd Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR). 3–7.
[28]
Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, and Insup Lee. 2018. Cyber-physical system checkpointing and recovery. In Proceedings of the ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS). IEEE, 22–31.
[29]
Dana Lahat, Tulay Adali, and Christian Jutten. 2015. Multimodal data fusion: An overview of methods, challenges, and prospects. Proc. IEEE 103, 9 (2015), 1449–1477.
[30]
Chienliang Lai and Paulo Hsu. 2010. Design the remote control system with the time-delay estimator and the adaptive smith predictor. IEEE Trans. Industr. Inform. 6, 1 (2010), 73–80.
[31]
Chongyang Liu, Ryan Loxton, Kok Lay Teo, and Song Wang. 2022. Optimal state-delay control in nonlinear dynamic systems. Automatica 135 (2022), 109981.
[32]
Fei Long, Chuan-Ke Zhang, Lin Jiang, Yong He, and Min Wu. 2019. Stability analysis of systems with time-varying delay via improved Lyapunov–Krasovskii functionals. IEEE Trans. Syst., Man Cyber.: Syst. 51, 4 (2019), 2457–2466.
[33]
P. Lu, L. Zhang, B. B. Park, and L. Feng. 2018. Attack-resilient sensor fusion for cooperative adaptive cruise control. In Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC). 3955–3960.
[34]
Keith Marzullo. 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst. 8, 4 (1990), 284–304.
[35]
Khader Mohammad and Sos Agaian. 2009. Efficient FPGA implementation of convolution. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. IEEE, 3478–3483.
[36]
Emre Özkan, Václav Šmídl, Saikat Saha, Christian Lundquist, and Fredrik Gustafsson. 2013. Marginalized adaptive particle filtering for nonlinear models with unknown time-varying noise parameters. Automatica 49, 6 (2013), 1566–1575.
[37]
Miroslav Pajic, James Weimer, Nicola Bezzo, Paulo Tabuada, and George J. Pappas. 2014. Robustness of attack-resilient state estimators. In Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[38]
F. Pasqualetti, F. Dörfler, and F. Bullo. 2013. Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Control 58, 11 (2013), 2715–2729.
[39]
Asok Ray, L. W. Liou, and J. H. Shen. 1993. State estimation using randomly delayed measurements. J. Dynam. Syst., Meas. Contr., Trans. ASME 115 (1993), 19–26.
[40]
Helem Sabina Sanchez, Damiano Rotondo, Teresa Escobet, Vicenc Puig, Jordi Saludes, and Joseba Quevedo. 2019. Detection of replay attacks in cyber-physical systems using a frequency-based signature. J. Franklin Instit. 356, 5 (2019), 2798–2824.
[41]
Luca Schenato. 2007. Optimal sensor fusion for distributed sensors subject to random delay and packet loss. In Proceedings of the 46th IEEE Conference on Decision and Control. IEEE, 1547–1552.
[42]
Yasser Shoukry, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava. 2015. Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1004–1015.
[43]
Sara Siamak, Maryam Dehghani, and Mohsen Mohammadi. 2021. Dynamic GPS spoofing attack detection, localization, and measurement correction exploiting PMU and SCADA. IEEE Syst. J. 15, 2 (2021), 2531–2540.
[44]
Andrew Smyth and Meiliang Wu. 2007. Multi-rate Kalman filtering for the data fusion of displacement and acceleration response measurements in dynamic system monitoring. Mechan. Syst. Sig. Process. 21, 2 (2007), 706–723.
[45]
Shuli Sun. 2012. Optimal linear filters for discrete-time systems with randomly delayed and lost measurements with/without time stamps. IEEE Trans. Automat. Control 58, 6 (2012), 1551–1556.
[46]
Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, De-Sheng Fu, and Jin Wang. 2018. An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks. Journal Supercomput. 74, 3 (2018), 1267–1282.
[47]
Y. Tipsuwan and Moyuen Chow. 2003. Control methodologies in networked control systems. Contr. Eng. Pract. 11, 10 (2003), 1099–1111.
[48]
S. Trimpe and R. D’Andrea. 2014. Event-based state estimation with variance-based triggering. IEEE Trans. Automat. Contr. 59, 12 (2014), 3266–3281.
[49]
Eric A. Wan and Alex T. Nelson. 2001. Dual extended Kalman filter methods. Kalman Filt. Neural Netw. 123 (2001).
[50]
Ruixuan Wang, Fanxin Kong, Hasshi Sudler, and Xun Jiao. 2021. Brief industry paper: HDAD: hyperdimensional computing-based anomaly detection for automotive sensor attacks. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 461–464.
[51]
Greg Welch and Gary Bishop. 1995. An Introduction to the Kalman Filter. Technical Report TR 95-041, University of North Carolina, Department of Computer Science, 1995.
[52]
Marilyn Wolf and Dimitrios Serpanos. 2017. Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106, 1 (2017), 9–20.
[53]
Yuan Yao, Lei Rao, Xue Liu, and Xingshe Zhou. 2013. Delay analysis and study of IEEE 802.11 p based DSRC safety communication in a highway environment. In Proceedings of the IEEE INFOCOM. IEEE, 1591–1599.
[54]
Tengchan Zeng, Omid Semiari, Walid Saad, and Mehdi Bennis. 2019. Joint communication and control for wireless autonomous vehicular platoon systems. IEEE Trans. Commun. 67, 11 (2019), 7907–7922.
[55]
Lin Zhang, Xin Chen, Fanxin Kong, and Alvaro A. Cardenas. 2020. Real-time recovery for cyber-physical systems using linear approximations. In Proceedings of the 41st IEEE Real-Time Systems Symposium (RTSS). IEEE.
[56]
Lin Zhang, Pengyuan Lu, Fanxin Kong, Xin Chen, Oleg Sokolsky, and Insup Lee. 2021. Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator. ACM Trans. Embed. Comput. Syst. 20, 5s (2021), 79:1–79:24.
[57]
Junbo Zhao and Lamine Mili. 2017. Robust unscented Kalman filter for power system dynamic state estimation with unknown noise statistics. IEEE Trans. Smart Grid 10, 2 (2017), 1215–1224.

Cited By

View all

Index Terms

  1. Attack-resilient Fusion of Sensor Data with Uncertain Delays

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 21, Issue 4
    July 2022
    330 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/3551651
    • Editor:
    • Tulika Mitra
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 23 August 2022
    Online AM: 18 April 2022
    Accepted: 01 March 2022
    Revised: 01 March 2022
    Received: 01 September 2021
    Published in TECS Volume 21, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Autonomous systems
    2. security
    3. attack-resilience
    4. sensor fusion
    5. uncertain delay

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)139
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 15 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sensor attack detection based on active excitation response with uncertain delaysJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103110150:COnline publication date: 1-May-2024
    • (2024)Industrial cyber-physical systems protectionComputers and Security10.1016/j.cose.2023.103531135:COnline publication date: 10-Jan-2024
    • (2023)Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems2023 IEEE Real-Time Systems Symposium (RTSS)10.1109/RTSS59052.2023.00017(78-91)Online publication date: 5-Dec-2023
    • (2022)Immediate Split Trees: Immediate Encoding of Floating Point Split Values in Random ForestsMachine Learning and Knowledge Discovery in Databases10.1007/978-3-031-26419-1_32(531-546)Online publication date: 19-Sep-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media