Cargando…

Radar Data Integrity Verification Using 2D QIM-Based Data Hiding

The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers. From the traditional core vehicle functions, such as vehicle controls, infotainment, and power-train management, to the latest...

Descripción completa

Detalles Bibliográficos
Autores principales: Changalvala, Raghu, Fedoruk, Brandon, Malik, Hafiz
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7583854/
https://www.ncbi.nlm.nih.gov/pubmed/32992543
http://dx.doi.org/10.3390/s20195530
_version_ 1783599472337485824
author Changalvala, Raghu
Fedoruk, Brandon
Malik, Hafiz
author_facet Changalvala, Raghu
Fedoruk, Brandon
Malik, Hafiz
author_sort Changalvala, Raghu
collection PubMed
description The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers. From the traditional core vehicle functions, such as vehicle controls, infotainment, and power-train management, to the latest developments, such as advanced driver assistance systems (ADAS) and automated driving features, each one of them uses CAN as their communication network backbone. Automated driving and ADAS features rely on data transferred over the CAN network from multiple sensors mounted on the vehicle. Verifying the integrity of the sensor data is essential for the safety and security of occupants and the proper functionality of these applications. Though the CAN interface ensures reliable data transfer, it lacks basic security features, including message authentication, which makes it vulnerable to a wide array of attacks, including spoofing, replay, DoS, etc. Using traditional cryptography-based methods to verify the integrity of data transmitted over CAN interfaces is expected to increase the computational complexity, latency, and overall cost of the system. In this paper, we propose a light-weight alternative to verify the sensor data’s integrity for vehicle applications that use CAN networks for data transfers. To this end, a framework for 2-dimensional quantization index modulation (2D QIM)-based data hiding is proposed to achieve this goal. Using a typical radar sensor data transmission scenario in an autonomous vehicle application, we analyzed the performance of the proposed framework regarding detecting and localizing the sensor data tampering. The effects of embedding-induced distortion on the applications using the radar data were studied through a sensor fusion algorithm. It was observed that the proposed framework offers the much-needed data integrity verification without compromising on the quality of sensor fusion data and is implemented with low overall design complexity. This proposed framework can also be used on any physical network interface other than CAN, and it offers traceability to in-vehicle data beyond the scope of the in-vehicle applications.
format Online
Article
Text
id pubmed-7583854
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75838542020-10-28 Radar Data Integrity Verification Using 2D QIM-Based Data Hiding Changalvala, Raghu Fedoruk, Brandon Malik, Hafiz Sensors (Basel) Article The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers. From the traditional core vehicle functions, such as vehicle controls, infotainment, and power-train management, to the latest developments, such as advanced driver assistance systems (ADAS) and automated driving features, each one of them uses CAN as their communication network backbone. Automated driving and ADAS features rely on data transferred over the CAN network from multiple sensors mounted on the vehicle. Verifying the integrity of the sensor data is essential for the safety and security of occupants and the proper functionality of these applications. Though the CAN interface ensures reliable data transfer, it lacks basic security features, including message authentication, which makes it vulnerable to a wide array of attacks, including spoofing, replay, DoS, etc. Using traditional cryptography-based methods to verify the integrity of data transmitted over CAN interfaces is expected to increase the computational complexity, latency, and overall cost of the system. In this paper, we propose a light-weight alternative to verify the sensor data’s integrity for vehicle applications that use CAN networks for data transfers. To this end, a framework for 2-dimensional quantization index modulation (2D QIM)-based data hiding is proposed to achieve this goal. Using a typical radar sensor data transmission scenario in an autonomous vehicle application, we analyzed the performance of the proposed framework regarding detecting and localizing the sensor data tampering. The effects of embedding-induced distortion on the applications using the radar data were studied through a sensor fusion algorithm. It was observed that the proposed framework offers the much-needed data integrity verification without compromising on the quality of sensor fusion data and is implemented with low overall design complexity. This proposed framework can also be used on any physical network interface other than CAN, and it offers traceability to in-vehicle data beyond the scope of the in-vehicle applications. MDPI 2020-09-27 /pmc/articles/PMC7583854/ /pubmed/32992543 http://dx.doi.org/10.3390/s20195530 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Changalvala, Raghu
Fedoruk, Brandon
Malik, Hafiz
Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title_full Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title_fullStr Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title_full_unstemmed Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title_short Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
title_sort radar data integrity verification using 2d qim-based data hiding
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7583854/
https://www.ncbi.nlm.nih.gov/pubmed/32992543
http://dx.doi.org/10.3390/s20195530
work_keys_str_mv AT changalvalaraghu radardataintegrityverificationusing2dqimbaseddatahiding
AT fedorukbrandon radardataintegrityverificationusing2dqimbaseddatahiding
AT malikhafiz radardataintegrityverificationusing2dqimbaseddatahiding