Abstract
Sensor attacks are a severe threat in cyber-physical systems (CPSs) and may cause serious personal casualties and huge economic losses. Adversaries can even non-invasively launch such sensor attacks without much domain knowledge or expensive equipment. The increasingly large scale and high autonomy in CPSs also emphasizes this issue. The strong need motivates many sensor attack detection methods to defend CPSs. AI-enabled sensor attack detection methods stand out among them because they are suitable for dealing with a large amount of CPS data with temporal and spatial dependencies while not requiring domain-specific knowledge. This chapter introduces the background of CPSs and sensor attacks, and demonstrates the workflow of designing AI-enabled sensor attack detectors. Finally, two case studies show how AI empowers sensor attack detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zambrano A, Betancur AP, Burbano L, Niño AF, Giraldo LF, Soto MG, Giraldo J, Cardenas AA (2021) You make me tremble: a first look at attacks against structural control systems. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 1320–1337
Amazon Staff (Aug 2022) How Amazon is building its drone delivery system. https://www.aboutamazon.com/news/transportation/how-amazon-is-building-its-drone-delivery-system
Cardenas AA, Safavi-Naini R (2012) Security and privacy in the smart grid (Chapter 25). In: Das SK, Kant K, Zhang N (eds) Handbook on securing cyber-physical critical infrastructure. Morgan Kaufmann, Boston, pp 637–654
Shen J, Won JY, Chen Z, Chen QA (2020) Drift with devil: security of multi-sensor fusion based localization in highlevel autonomous driving under GPS spoofing. In: 29th USENIX security symposium (USENIX Security 20), pp 931–948
Tu Y, Lin Z, Lee I, Hei X (2018) Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In: 27th USENIX security symposium (USENIX Security 18), pp 1545–1562
Sato T, Shen J, Wang N, Jia Y, Lin X, Chen QA (2021) Dirty road can attack: security of deep learning based automated lane centering under Physical-World attack. In: 30th USENIX security symposium (USENIX Security 21), pp 3309–3326
Chen Y, Zhang T, Kong F, Zhang L, Deng Q (2022) Attack-resilient fusion of sensor data with uncertain delays. ACM Trans Embed Comput Syst 21:1–25
Ivanov R, Pajic M, Lee I (2016) Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans Embed Comput Syst 15(1):1–24
Cao Y, Wang N, Xiao C, Yang D, Fang J, Yang R, Chen QA, Liu M, Li B (2021) Invisible for both camera and lidar: security of multi-sensor fusion based perception in autonomous driving under physical-world attacks. In: 2021 IEEE symposium on security and privacy (SP), pp 176–194. IEEE
Mitchell Waldrop M et al (2015) No drivers required. Nature 518(7537):20
Akowuah F, Prasad R, Espinoza CO, Kong F (2021) Recovery-by-learning: restoring autonomous cyber-physical systems from sensor attacks. In: 2021 IEEE 27th International conference on embedded and real-time computing systems and applications (RTCSA), pp 61–66. IEEE
Lee TJ, Gottschlich J, Tatbul N, Metcalf E, Zdonik S (2018) Greenhouse: a zero-positive machine learning system for time-series anomaly detection. arXiv preprint arXiv:1801.03168
Rajasegarar S, Leckie C, Bezdek JC, Palaniswami M (2010) Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans Inf Forensics Secur 5(3):518–533
Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58:121–134
Wang R, Kong F, Sudler H, Jiao X (2021) Brief industry paper: Hdad: hyperdimensional computing-based anomaly detection for automotive sensor attacks. In: 2021 IEEE 27th real-time and embedded technology and applications symposium (RTAS), pp 461–464. IEEE
Zhang L, Wang Z, Liu M, Kong F (2022) Adaptive window-based sensor attack detection for cyber-physical systems. In: Proceedings of the 59th ACM/IEEE design automation conference, pp 919–924
Akowuah F, Kong F (2021) Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges. In: 2021 Fourth International conference on connected and autonomous driving (MetroCAD), pp 31–40. IEEE
He T, Zhang L, Kong F, Salekin A (2020) Exploring inherent sensor redundancy for automotive anomaly detection. In: 2020 57th ACM/IEEE design automation conference (DAC), pp 1–6
Guo X, Han S, Hu XS, Jiao X, Jin Y, Kong F, Lemmon M (2021) Towards scalable, secure, and smart mission-critical IoT systems: review and vision: (special session paper). In: 2021 International conference on embedded software (EMSOFT), pp 1–10
Liu M, Zhang L, Lu P, Sridha K, Kong F, Sokolsky O, Lee I (2022) Fail-safe: securing cyber-physical systems against hidden sensor attacks. In: 43st IEEE real-time systems symposium (RTSS). IEEE
Quinonez R, Giraldo J, Salazar L, Bauman E, Cardenas A, Lin Z (2020) SAVIOR: securing autonomous vehicles with robust physical invariants. In: 29th USENIX security symposium (USENIX Security 20), pp 895–912
Zhang L, Lu P, Kong F, Chen X, Sokolsky O, Lee I (2021) Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator. ACM Trans Embed Comput Syst 20(5s):1–24
Luo Y, Xiao Y, Cheng L, Peng G, Yao D (2021) Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. ACM Comput Surv 54(5):1–36
Rieth CA, Amsel BD, Tran R, Cook MB (2017) Additional Tennessee Eastman process simulation data for anomaly detection evaluation Harvard Dataverse. https://doi.org/10.7910/DVN/6C3JR1
Buayai K, Chinnabutr K, Intarawong P, Kerdchuen K (2014) Applied MATPOWER for power system optimization research. Energy Procedia 56:505–509
iTrust Labs (2020) Secure water treatment dataset. https://itrust.sutd.edu.sg/itrust-labs_datasets/dataset_info/
Akowuah F, Kong F (2021) Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In: 2021 IEEE 27th real-time and embedded technology and applications symposium (RTAS), pp 237–250
Kaiser C, Stocker A, Festl A (2019) Automotive CAN bus data: an example dataset from the AEGIS big data project. Zenodo. https://doi.org/10.5281/zenodo.3267184
Ganesan A, Rao J, Shin K (2017) Exploiting consistency among heterogeneous sensors for vehicle anomaly detection. Technical report, SAE Technical Paper
Giraldo J, Urbina D, Cardenas A, Valente J, Faisal M, Ruths J, Tippenhauer NO, Sandberg H, Candell R (2018) A survey of physics-based attack detection in cyber-physical systems. ACM Comput Surv 51(4):1–36
Lai G, Chang W-C, Yang Y, Liu H (2018) Modeling long-and short-term temporal patterns with deep neural networks. In: The 41st International ACM SIGIR conference on research & development in information retrieval, pp 95–104
Zhang L, Chen X, Kong F, Cardenas AA (2020) Real-time recovery for cyber-physical systems using linear approximations. In: 41st IEEE real-time systems symposium (RTSS). IEEE
Acknowledgements
This work will not be possible without the excellent discussions with and support from many of our collaborators and colleagues. In Particular, we would like to thank (in alphabetical order) Prof. Francis Akowuah, Tianjia He, and Prof. Asif Salekin. We would also like to thank our editors and anonymous reviewers for their constructive criticism of the earlier manuscript. This work was supported in part by NSF CNS-2333980.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Zhang, L., Liu, M., Kong, F. (2023). AI-enabled Real-Time Sensor Attack Detection for Cyber-Physical Systems. In: Wang, C., Iyengar, S., Sun, K. (eds) AI Embedded Assurance for Cyber Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-42637-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-42637-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-42636-0
Online ISBN: 978-3-031-42637-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)