Cargando…

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal

Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The prop...

Descripción completa

Detalles Bibliográficos
Autores principales: Gluck, Tomer, Kravchik, Moshe, Chocron, Samuel, Elovici, Yuval, Shabtai, Asaf
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7663762/
https://www.ncbi.nlm.nih.gov/pubmed/33138009
http://dx.doi.org/10.3390/s20216157
_version_ 1783609702737772544
author Gluck, Tomer
Kravchik, Moshe
Chocron, Samuel
Elovici, Yuval
Shabtai, Asaf
author_facet Gluck, Tomer
Kravchik, Moshe
Chocron, Samuel
Elovici, Yuval
Shabtai, Asaf
author_sort Gluck, Tomer
collection PubMed
description Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor’s reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor’s reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor’s receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor’s relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area.
format Online
Article
Text
id pubmed-7663762
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-76637622020-11-14 Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal Gluck, Tomer Kravchik, Moshe Chocron, Samuel Elovici, Yuval Shabtai, Asaf Sensors (Basel) Article Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor’s reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor’s reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor’s receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor’s relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area. MDPI 2020-10-29 /pmc/articles/PMC7663762/ /pubmed/33138009 http://dx.doi.org/10.3390/s20216157 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Gluck, Tomer
Kravchik, Moshe
Chocron, Samuel
Elovici, Yuval
Shabtai, Asaf
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_full Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_fullStr Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_full_unstemmed Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_short Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_sort spoofing attack on ultrasonic distance sensors using a continuous signal
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7663762/
https://www.ncbi.nlm.nih.gov/pubmed/33138009
http://dx.doi.org/10.3390/s20216157
work_keys_str_mv AT glucktomer spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT kravchikmoshe spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT chocronsamuel spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT eloviciyuval spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT shabtaiasaf spoofingattackonultrasonicdistancesensorsusingacontinuoussignal