Skip to main content

AI-enabled Real-Time Sensor Attack Detection for Cyber-Physical Systems

  • Chapter
  • First Online:
AI Embedded Assurance for Cyber Systems

Abstract

Sensor attacks are a severe threat in cyber-physical systems (CPSs) and may cause serious personal casualties and huge economic losses. Adversaries can even non-invasively launch such sensor attacks without much domain knowledge or expensive equipment. The increasingly large scale and high autonomy in CPSs also emphasizes this issue. The strong need motivates many sensor attack detection methods to defend CPSs. AI-enabled sensor attack detection methods stand out among them because they are suitable for dealing with a large amount of CPS data with temporal and spatial dependencies while not requiring domain-specific knowledge. This chapter introduces the background of CPSs and sensor attacks, and demonstrates the workflow of designing AI-enabled sensor attack detectors. Finally, two case studies show how AI empowers sensor attack detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zambrano A, Betancur AP, Burbano L, Niño AF, Giraldo LF, Soto MG, Giraldo J, Cardenas AA (2021) You make me tremble: a first look at attacks against structural control systems. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 1320–1337

    Google Scholar 

  2. Amazon Staff (Aug 2022) How Amazon is building its drone delivery system. https://www.aboutamazon.com/news/transportation/how-amazon-is-building-its-drone-delivery-system

  3. Cardenas AA, Safavi-Naini R (2012) Security and privacy in the smart grid (Chapter 25). In: Das SK, Kant K, Zhang N (eds) Handbook on securing cyber-physical critical infrastructure. Morgan Kaufmann, Boston, pp 637–654

    Chapter  Google Scholar 

  4. Shen J, Won JY, Chen Z, Chen QA (2020) Drift with devil: security of multi-sensor fusion based localization in highlevel autonomous driving under GPS spoofing. In: 29th USENIX security symposium (USENIX Security 20), pp 931–948

    Google Scholar 

  5. Tu Y, Lin Z, Lee I, Hei X (2018) Injected and delivered: fabricating implicit control over actuation systems by spoofing inertial sensors. In: 27th USENIX security symposium (USENIX Security 18), pp 1545–1562

    Google Scholar 

  6. Sato T, Shen J, Wang N, Jia Y, Lin X, Chen QA (2021) Dirty road can attack: security of deep learning based automated lane centering under Physical-World attack. In: 30th USENIX security symposium (USENIX Security 21), pp 3309–3326

    Google Scholar 

  7. Chen Y, Zhang T, Kong F, Zhang L, Deng Q (2022) Attack-resilient fusion of sensor data with uncertain delays. ACM Trans Embed Comput Syst 21:1–25

    Article  Google Scholar 

  8. Ivanov R, Pajic M, Lee I (2016) Attack-resilient sensor fusion for safety-critical cyber-physical systems. ACM Trans Embed Comput Syst 15(1):1–24

    Article  Google Scholar 

  9. Cao Y, Wang N, Xiao C, Yang D, Fang J, Yang R, Chen QA, Liu M, Li B (2021) Invisible for both camera and lidar: security of multi-sensor fusion based perception in autonomous driving under physical-world attacks. In: 2021 IEEE symposium on security and privacy (SP), pp 176–194. IEEE

    Google Scholar 

  10. Mitchell Waldrop M et al (2015) No drivers required. Nature 518(7537):20

    Article  Google Scholar 

  11. Akowuah F, Prasad R, Espinoza CO, Kong F (2021) Recovery-by-learning: restoring autonomous cyber-physical systems from sensor attacks. In: 2021 IEEE 27th International conference on embedded and real-time computing systems and applications (RTCSA), pp 61–66. IEEE

    Google Scholar 

  12. Lee TJ, Gottschlich J, Tatbul N, Metcalf E, Zdonik S (2018) Greenhouse: a zero-positive machine learning system for time-series anomaly detection. arXiv preprint arXiv:1801.03168

    Google Scholar 

  13. Rajasegarar S, Leckie C, Bezdek JC, Palaniswami M (2010) Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans Inf Forensics Secur 5(3):518–533

    Article  Google Scholar 

  14. Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58:121–134

    Article  Google Scholar 

  15. Wang R, Kong F, Sudler H, Jiao X (2021) Brief industry paper: Hdad: hyperdimensional computing-based anomaly detection for automotive sensor attacks. In: 2021 IEEE 27th real-time and embedded technology and applications symposium (RTAS), pp 461–464. IEEE

    Google Scholar 

  16. Zhang L, Wang Z, Liu M, Kong F (2022) Adaptive window-based sensor attack detection for cyber-physical systems. In: Proceedings of the 59th ACM/IEEE design automation conference, pp 919–924

    Google Scholar 

  17. Akowuah F, Kong F (2021) Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges. In: 2021 Fourth International conference on connected and autonomous driving (MetroCAD), pp 31–40. IEEE

    Google Scholar 

  18. He T, Zhang L, Kong F, Salekin A (2020) Exploring inherent sensor redundancy for automotive anomaly detection. In: 2020 57th ACM/IEEE design automation conference (DAC), pp 1–6

    Google Scholar 

  19. Guo X, Han S, Hu XS, Jiao X, Jin Y, Kong F, Lemmon M (2021) Towards scalable, secure, and smart mission-critical IoT systems: review and vision: (special session paper). In: 2021 International conference on embedded software (EMSOFT), pp 1–10

    Google Scholar 

  20. Liu M, Zhang L, Lu P, Sridha K, Kong F, Sokolsky O, Lee I (2022) Fail-safe: securing cyber-physical systems against hidden sensor attacks. In: 43st IEEE real-time systems symposium (RTSS). IEEE

    Google Scholar 

  21. Quinonez R, Giraldo J, Salazar L, Bauman E, Cardenas A, Lin Z (2020) SAVIOR: securing autonomous vehicles with robust physical invariants. In: 29th USENIX security symposium (USENIX Security 20), pp 895–912

    Google Scholar 

  22. Zhang L, Lu P, Kong F, Chen X, Sokolsky O, Lee I (2021) Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator. ACM Trans Embed Comput Syst 20(5s):1–24

    Google Scholar 

  23. Luo Y, Xiao Y, Cheng L, Peng G, Yao D (2021) Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. ACM Comput Surv 54(5):1–36

    Article  Google Scholar 

  24. Rieth CA, Amsel BD, Tran R, Cook MB (2017) Additional Tennessee Eastman process simulation data for anomaly detection evaluation Harvard Dataverse. https://doi.org/10.7910/DVN/6C3JR1

  25. Buayai K, Chinnabutr K, Intarawong P, Kerdchuen K (2014) Applied MATPOWER for power system optimization research. Energy Procedia 56:505–509

    Article  Google Scholar 

  26. iTrust Labs (2020) Secure water treatment dataset. https://itrust.sutd.edu.sg/itrust-labs_datasets/dataset_info/

  27. Akowuah F, Kong F (2021) Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In: 2021 IEEE 27th real-time and embedded technology and applications symposium (RTAS), pp 237–250

    Google Scholar 

  28. Kaiser C, Stocker A, Festl A (2019) Automotive CAN bus data: an example dataset from the AEGIS big data project. Zenodo. https://doi.org/10.5281/zenodo.3267184

  29. Ganesan A, Rao J, Shin K (2017) Exploiting consistency among heterogeneous sensors for vehicle anomaly detection. Technical report, SAE Technical Paper

    Google Scholar 

  30. Giraldo J, Urbina D, Cardenas A, Valente J, Faisal M, Ruths J, Tippenhauer NO, Sandberg H, Candell R (2018) A survey of physics-based attack detection in cyber-physical systems. ACM Comput Surv 51(4):1–36

    Article  Google Scholar 

  31. Lai G, Chang W-C, Yang Y, Liu H (2018) Modeling long-and short-term temporal patterns with deep neural networks. In: The 41st International ACM SIGIR conference on research & development in information retrieval, pp 95–104

    Google Scholar 

  32. Zhang L, Chen X, Kong F, Cardenas AA (2020) Real-time recovery for cyber-physical systems using linear approximations. In: 41st IEEE real-time systems symposium (RTSS). IEEE

    Google Scholar 

Download references

Acknowledgements

This work will not be possible without the excellent discussions with and support from many of our collaborators and colleagues. In Particular, we would like to thank (in alphabetical order) Prof. Francis Akowuah, Tianjia He, and Prof. Asif Salekin. We would also like to thank our editors and anonymous reviewers for their constructive criticism of the earlier manuscript. This work was supported in part by NSF CNS-2333980.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fanxin Kong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, L., Liu, M., Kong, F. (2023). AI-enabled Real-Time Sensor Attack Detection for Cyber-Physical Systems. In: Wang, C., Iyengar, S., Sun, K. (eds) AI Embedded Assurance for Cyber Systems. Springer, Cham. https://doi.org/10.1007/978-3-031-42637-7_6

Download citation

Publish with us

Policies and ethics