+ All Categories
Home > Engineering > Secure Communications for Autonomous Vehicles

Secure Communications for Autonomous Vehicles

Date post: 20-Jan-2015
Category:
Upload: center-for-transportation-research-ut-austin
View: 225 times
Download: 5 times
Share this document with a friend
Description:
Todd Humphreys recently presented at the CTR Symposium on the vulnerabilities of wireless communications, and the future of how it applies to autonomous vehicles.
Popular Tags:
21
Data Supported Transportation Operations and Planning Center (D-STOP) Secure Perception for Autonomous Vehicles Todd Humphreys, Aerospace Engineering CTR Symposium, April 23, 2014
Transcript
Page 1: Secure Communications for Autonomous Vehicles

Secure Perception for Autonomous Vehicles

Todd Humphreys, Aerospace EngineeringCTR Symposium, April 23, 2014

Page 2: Secure Communications for Autonomous Vehicles

Autonomous Control System Security

The general secure control problem envisions arbitrary manipulation of y and u (e.g, deception and DoS attacks)

2008

Page 3: Secure Communications for Autonomous Vehicles

Example: Autonomous Ground Vehicles

(1) V2V and V2I security is fairly good, but CRL may be stale (2) Navigation and timing security is poor due to GPS vulnerability(3) High-level “autonomy protocol” may be fragile, hackable

Page 4: Secure Communications for Autonomous Vehicles

Example: Autonomous Aircraft

Wesson and Humphreys, Scientific American, Nov. 2013

Page 5: Secure Communications for Autonomous Vehicles

Example: Autonomous Aircraft

Page 6: Secure Communications for Autonomous Vehicles
Page 7: Secure Communications for Autonomous Vehicles
Page 8: Secure Communications for Autonomous Vehicles

Shepard, Bhatti, Humphreys, Fansler, “Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks,” Proc. ION GNSS, Nashville, TN, 2012

Page 9: Secure Communications for Autonomous Vehicles

Covert post-capture UAV control is possible provided the spoofer can learn the target’s flight pattern

Covert Post-Capture UAV Control

A.J. Kerns, D.P. Shepard, J.A. Bhatti, T.E. Humphreys, "Unmanned Aircraft Capture and Control via GPS Spoofing,“ Journal of Field Robotics, 2014.

Page 10: Secure Communications for Autonomous Vehicles

Result of GPS hacking attack

Page 11: Secure Communications for Autonomous Vehicles
Page 12: Secure Communications for Autonomous Vehicles
Page 13: Secure Communications for Autonomous Vehicles
Page 14: Secure Communications for Autonomous Vehicles
Page 15: Secure Communications for Autonomous Vehicles
Page 16: Secure Communications for Autonomous Vehicles
Page 17: Secure Communications for Autonomous Vehicles
Page 18: Secure Communications for Autonomous Vehicles
Page 19: Secure Communications for Autonomous Vehicles

V2V and V2I Security

(1) How will unauthenticated messages be handled? (2) How to deal with latency in certificate revocation?(3) Are proposed local ad-hoc cross-checks good enough?(4) Should we give up on privacy?

Page 20: Secure Communications for Autonomous Vehicles

Cautionary Tale: FAA’s ADS-B is Insecure

It may be too late for ADS-B, but V2V and V2I still have a chance to get security right

Page 21: Secure Communications for Autonomous Vehicles

radionavlab.ae.utexas.edu


Recommended