Abstract

Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor’s reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor’s reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor’s receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor’s relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area.

Highlights

  • Ultrasonic distance sensors (UDSs) are active sensors that can provide accurate distance readings for relatively large objects in the range of around two centimeters to five meters [1]

  • We present and evaluate a novel spoofing attack that enables the attacker to control the readings of the sensor by changing the amplitude or frequency of a continuous sound signal generated by the attacker

  • We present and evaluate a new and simple-to-implement spoofing attack that enables an attacker to control the readings of the sensor by changing the amplitude or frequency of a continuous sound signal generated by the attacker

Read more

Summary

Introduction

Ultrasonic distance sensors (UDSs) are active sensors that can provide accurate distance readings for relatively large objects in the range of around two centimeters to five meters [1]. The UDS operates by sending a pulse of ultrasonic sound waves and calculating the distance to a nearby object, using the time of flight of the returning signal (i.e., the echo). The UDS is characterized by its moderate refresh speed, short distance, and low-resolution sensor. It is slower than other electromagnetic-based distance sensors, as it is limited to the speed of sound. The UDS sends a pulse in the direction of the scanned area, and if the echo is strong enough, it will be interpreted as an object; these sensors can only detect relatively large objects

Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call