Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.3.411

Vibration-Based Signal-Injection Attack Detection on MEMS Sensor  

Cho, Hyunsu (School of Cybersecurity, Korea University)
Oh, Heeseok (Hansung University)
Choi, Wonsuk (Hansung University)
Abstract
The autonomous driving system mounted on the unmanned vehicle recognizes the external environment through several sensors and derives the optimum control value through it. Recently, studies on physical level attacks that maliciously manipulate sensor data by performing signal-injection attacks have been published. signal-injection attacks are performed at the physical level and are difficult to detect at the software level because the sensor measures erroneous data by applying physical manipulations to the surrounding environment. In order to detect a signal-injection attack, it is necessary to verify the dependability of the data measured by the sensor. As so far, various methods have been proposed to attempt physical level attacks against sensors mounted on autonomous driving systems. However, it is still insufficient that methods for defending and detecting the physical level attacks. In this paper, we demonstrate signal-injection attacks targeting MEMS sensors that are widely used in unmanned vehicles, and propose a method to detect the attack. We present a signal-injection detection model to analyze the accuracy of the proposed method, and verify its effectiveness in a laboratory environment.
Keywords
Vibration; Signal-Injection Attack; PHY-level Attack; MEMS Gyroscope;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. Giechaskiel and K. Rasmussen, "Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 645-670, Firstquarter. 2020.   DOI
2 Y. Shoukry, P. Martin, Y. Yona, S. Diggavi, and M. Srivastava, "PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks," Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1004-1015, Oct. 2015.
3 D. Davidson, H. Wu, and R. Jellinek, "Controlling UAVs with Sensor Input Spoofing Attacks," 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), Aug. 2016.
4 T. Chen, L. Shangguan, Z. Li, and K. Jamieson, "Metamorph: Injecting inaudible commands into over-the-air voice controlled systems," Proceedings of NDSS, Feb. 2020.
5 R.N. Dean, G.T. Flowers, A.S. Hodel, G. Roth, S. Castro, R. Zhou, A. Moreira, A. Ahmed, R. Rifki, B.E. Grantham, D. Bittle, and J. Brunsch, "On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise," IEEE International Symposium on Industrial Electronics, pp. 1435-1440, Jun. 2017.
6 J. Selvaraj, G.Y. Dayanikli, N.P. Gaunkar, D. Ware, R.M. Gerdes, and M. Mina, "Electromagnetic Induction Attacks Against Embedded Systems," Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 499-510, May. 2018.
7 T. Trippel, O. Weisse, W. Xu, P. Honeyman, and K. Fu, "WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks," IEEE European Symposium on Security and Privacy (EuroS&P), pp. 3-18, April. 2017.
8 H. Shin, D. Kim, Y. Kwon, and Y. Kim, "Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications," In International Conference on Cryptographic Hardware and Embedded Systems, vol. 10529, pp. 445-467, 2017.
9 C. Yan, W. Xu, and J. Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle," DEFCON, 2016.
10 Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, "Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors," In 24th {USENIX} Security Symposium, pp. 881-896, Aug. 2015.
11 Y. Tu, Z. Lin, I. Lee, and X. Hei, "Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors," In 27th {USENIX} Security Symposium, pp. 1545-1562, Aug. 2018.
12 Y. Tu, S. Rampazzi, B. Hao, A. Rodriguez, and K. Fu, "Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks," Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2301-2315, Nov. 2019.
13 Google "MPU-6000 and MPU-6050 Product Specification Revision 3.4," https://invensense.tdk.com/wp-content/uploads/2015/02/MPU-6000-Datasheet1.pdf, May. 2021.
14 Y. Ashibani and Q.H. Mahmoud, "Cyber physical systems security: Analysis, challenges and solutions," Computers & Security, vol. 68, pp. 81-97, July. 2017.   DOI
15 Google "HC-SR04 module Datasheet," https://cdn.sparkfun.com/datasheets/Sensors/Proximity/HCSR04.pdf, May. 2021.
16 R.E. Blake, "Basic Vibration Theory," Shock and Vibration Handbook, New York, NY, USA:McGraw Hill, 1988.