21
Data Supported Transportation Operations and Planning Center (D-STOP) Secure Perception for Autonomous Vehicles Todd Humphreys, Aerospace Engineering CTR Symposium, April 23, 2014

Secure Communications for Autonomous Vehicles

Embed Size (px)

DESCRIPTION

Todd Humphreys recently presented at the CTR Symposium on the vulnerabilities of wireless communications, and the future of how it applies to autonomous vehicles.

Citation preview

Page 1: Secure Communications for Autonomous Vehicles

Secure Perception for Autonomous Vehicles

Todd Humphreys, Aerospace EngineeringCTR Symposium, April 23, 2014

Page 2: Secure Communications for Autonomous Vehicles

Autonomous Control System Security

The general secure control problem envisions arbitrary manipulation of y and u (e.g, deception and DoS attacks)

2008

Page 3: Secure Communications for Autonomous Vehicles

Example: Autonomous Ground Vehicles

(1) V2V and V2I security is fairly good, but CRL may be stale (2) Navigation and timing security is poor due to GPS vulnerability(3) High-level “autonomy protocol” may be fragile, hackable

Page 4: Secure Communications for Autonomous Vehicles

Example: Autonomous Aircraft

Wesson and Humphreys, Scientific American, Nov. 2013

Page 5: Secure Communications for Autonomous Vehicles

Example: Autonomous Aircraft

Page 6: Secure Communications for Autonomous Vehicles
Page 7: Secure Communications for Autonomous Vehicles
Page 8: Secure Communications for Autonomous Vehicles

Shepard, Bhatti, Humphreys, Fansler, “Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,” Proc. ION GNSS, Nashville, TN, 2012

Page 9: Secure Communications for Autonomous Vehicles

Covert post-capture UAV control is possible provided the spoofer can learn the target’s flight pattern

Covert Post-Capture UAV Control

A.J. Kerns, D.P. Shepard, J.A. Bhatti, T.E. Humphreys, "Unmanned Aircraft Capture and Control via GPS Spoofing,“ Journal of Field Robotics, 2014.

Page 10: Secure Communications for Autonomous Vehicles

Result of GPS hacking attack

Page 11: Secure Communications for Autonomous Vehicles
Page 12: Secure Communications for Autonomous Vehicles
Page 13: Secure Communications for Autonomous Vehicles
Page 14: Secure Communications for Autonomous Vehicles
Page 15: Secure Communications for Autonomous Vehicles
Page 16: Secure Communications for Autonomous Vehicles
Page 17: Secure Communications for Autonomous Vehicles
Page 18: Secure Communications for Autonomous Vehicles
Page 19: Secure Communications for Autonomous Vehicles

V2V and V2I Security

(1) How will unauthenticated messages be handled? (2) How to deal with latency in certificate revocation?(3) Are proposed local ad-hoc cross-checks good enough?(4) Should we give up on privacy?

Page 20: Secure Communications for Autonomous Vehicles

Cautionary Tale: FAA’s ADS-B is Insecure

It may be too late for ADS-B, but V2V and V2I still have a chance to get security right

Page 21: Secure Communications for Autonomous Vehicles

radionavlab.ae.utexas.edu