Attack-resilient sensor fusion

Conference Paper

This work considers the problem of attack-resilient sensor fusion in an autonomous system where multiple sensors measure the same physical variable. A malicious attacker may corrupt a subset of these sensors and send wrong measurements to the controller on their behalf, potentially compromising the safety of the system. We formalize the goals and constraints of such an attacker who also wants to avoid detection by the system. We argue that the attacker’s capabilities depend on the amount of information she has about the correct sensors’ measurements. In the presence of a shared bus where messages are broadcast to all components connected to the network, the attacker may consider all other measurements before sending her own in order to achieve maximal impact. Consequently, we investigate effects of communication schedules on sensor fusion performance. We provide worst- and average-case results in support of the Ascending schedule, where sensors send their measurements in a fixed succession based on their precision, starting from the most precise sensors. Finally, we provide a case study to illustrate the use of this approach.

Full Text

Duke Authors

Cited Authors

  • Ivanov, R; Pajic, M; Lee, I

Published Date

  • March 2014

Published In

  • Design, Automation and Test in Europe Conference and Exhibition (Date), 2014

Start / End Page

  • 1 - 6

Digital Object Identifier (DOI)

  • 10.7873/DATE.2014.067