Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, Israel.
Rafael Advanced Defense Systems Ltd., Haifa 3102102, Israel.
Sensors (Basel). 2020 Oct 29;20(21):6157. doi: 10.3390/s20216157.
Ultrasonic distance sensors use an ultrasonic pulse's time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor's reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor's reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor's receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor's relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area.
超声波距离传感器利用超声波脉冲的飞行时间来计算到反射物体的距离。这些传感器在工业中得到广泛应用,是自动驾驶车辆中的重要组成部分,用于避免物体碰撞和测量高度等任务。自动驾驶车辆的正常运行依赖于传感器的测量值,因此,能够破坏传感器可靠性的对手可能会对车辆构成重大风险。以前曾尝试使用外部信号来改变传感器的测量值,成功地进行了拒绝服务 (DoS) 攻击,在这种攻击中,传感器的读数显示为一个恒定值,以及欺骗攻击,攻击者可以在一定程度上控制测量值。然而,这些攻击需要对传感器及其操作有精确的了解(例如,传感器发送超声波脉冲的时间)。在本文中,我们提出了一种针对超声波距离传感器的攻击,这种攻击可以改变测量距离(即欺骗攻击)。该攻击利用了超声波传感器接收器中发现的一个漏洞,该漏洞会导致一个虚假脉冲,该脉冲由输入中的恒定噪声产生。与以前的攻击相比,所提出的攻击具有一个主要优势,即它使用恒定信号,因此不需要传感器的相对位置或其定时行为的先验知识。我们在实验室设置(测试平台)和涉及无人机的真实设置中演示了该攻击,以证明其可行性。我们的实验表明,该攻击可以干扰车辆的正常运行。除了对自动驾驶车辆构成的风险外,该攻击还可以用作限制未经授权的自动驾驶车辆在保护区内移动的有效防御工具。