2022
DOI: 10.48550/arxiv.2205.04662
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View

Abstract: Robotic Vehicles (RVs) have gained great popularity over the past few years. Meanwhile, they are also demonstrated to be vulnerable to sensor spoofing attacks. Although a wealth of research works have presented various attacks, some key questions remain unanswered: are these existing works complete enough to cover all the sensor spoofing threats? If not, how many attacks are not explored, and how difficult is it to realize them?This paper answers the above questions by comprehensively systematizing the knowled… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 66 publications
0
5
0
Order By: Relevance
“…Navigational attacks can manifest in various forms, ranging from simple and localized disruptions to controlled, sophisticated, widespread manipulations. One of the most common forms of attack involves sensor spoofing or jamming [95], [96], where adversaries intentionally deceive the robot's sensors, such as GPS, camera, LiDAR, etc, to provide false or distorted information. Doing so can mislead the robot's perception of its environment, leading to potential collisions, misrouting, or compromised decision-making.…”
Section: ) Navigation and Planning Attacks With Security Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Navigational attacks can manifest in various forms, ranging from simple and localized disruptions to controlled, sophisticated, widespread manipulations. One of the most common forms of attack involves sensor spoofing or jamming [95], [96], where adversaries intentionally deceive the robot's sensors, such as GPS, camera, LiDAR, etc, to provide false or distorted information. Doing so can mislead the robot's perception of its environment, leading to potential collisions, misrouting, or compromised decision-making.…”
Section: ) Navigation and Planning Attacks With Security Strategiesmentioning
confidence: 99%
“…[90], [95], [109]- [111] Black-box DRL models and planners (Image Segmentation, 3-D point cloud, etc,)…”
Section: ) Navigation and Planning Attacks With Security Strategiesmentioning
confidence: 99%
“…The target could be sensors like GPS, which could be spoofed for adversarial location [56], [57]. Similarly, LiDARs and cameras could be spoofed for false detection and tracking of objects [86]. Inexpensive equipment can be used to spoof the sensors and eventually carry different types of attacks, including replay and relay attacks [61], [87].…”
Section: ) Spoofingmentioning
confidence: 99%
“…For example, researchers in [86,87] have identified over 100 sensor spoofing attack vectors for vehicles.…”
Section: Security Impact On the Av Safetymentioning
confidence: 99%