Sensor Security: Current Progress, Research Challenges, and Future Roadmap

08/20/2022
by   Anomadarshi Barua, et al.
0

Sensors are one of the most pervasive and integral components of today's safety-critical systems. Sensors serve as a bridge between physical quantities and connected systems. The connected systems with sensors blindly believe the sensor as there is no way to authenticate the signal coming from a sensor. This could be an entry point for an attacker. An attacker can inject a fake input signal along with the legitimate signal by using a suitable spoofing technique. As the sensor's transducer is not smart enough to differentiate between a fake and legitimate signal, the injected fake signal eventually can collapse the connected system. This type of attack is known as the transduction attack. Over the last decade, several works have been published to provide a defense against the transduction attack. However, the defenses are proposed on an ad-hoc basis; hence, they are not well-structured. Our work begins to fill this gap by providing a checklist that a defense technique should always follow to be considered as an ideal defense against the transduction attack. We name this checklist as the Golden reference of sensor defense. We provide insights on how this Golden reference can be achieved and argue that sensors should be redesigned from the transducer level to the sensor electronics level. We point out that only hardware or software modification is not enough; instead, a hardware/software (HW/SW) co-design approach is required to ride on this future roadmap to the robust and resilient sensor.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2019

Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Position sensors, such as the gyroscope, the magnetometer and the accele...
research
10/13/2022

Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs

This paper studies the deployment of joint moving target defense (MTD) a...
research
05/17/2021

SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense

Autonomous vehicles (AVs), equipped with numerous sensors such as camera...
research
06/18/2020

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)

For high-level Autonomous Vehicles (AV), localization is highly security...
research
07/22/2019

Maya: Falsifying Power Sidechannels with Operating System Support

The security of computers is at risk because of information leaking thro...
research
04/30/2019

Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

Abuse of zero-permission sensors on-board mobile and wearable devices to...
research
07/29/2023

Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

For industrial control systems (ICS), many existing defense solutions fo...

Please sign up or login with your details

Forgot password? Click here to reset