On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures

Qingzhao Zhang,Shuowei Jin,Ruiyang Zhu,Jiachen Sun,Xumiao Zhang,Qi Alfred Chen,Z. Morley Mao
2023-10-04
Abstract:Collaborative perception, which greatly enhances the sensing capability of connected and autonomous vehicles (CAVs) by incorporating data from external resources, also brings forth potential security risks. CAVs' driving decisions rely on remote untrusted data, making them susceptible to attacks carried out by malicious participants in the collaborative perception system. However, security analysis and countermeasures for such threats are absent. To understand the impact of the vulnerability, we break the ground by proposing various real-time data fabrication attacks in which the attacker delivers crafted malicious data to victims in order to perturb their perception results, leading to hard brakes or increased collision risks. Our attacks demonstrate a high success rate of over 86% on high-fidelity simulated scenarios and are realizable in real-world experiments. To mitigate the vulnerability, we present a systematic anomaly detection approach that enables benign vehicles to jointly reveal malicious fabrication. It detects 91.5% of attacks with a false positive rate of 3% in simulated scenarios and significantly mitigates attack impacts in real-world scenarios.
Cryptography and Security,Computer Vision and Pattern Recognition
What problem does this paper attempt to address?
### What problem does this paper attempt to solve? This paper primarily focuses on the security issues of Collaborative Perception in Connected and Autonomous Vehicles (CAVs). Specifically: 1. **Proposing Attack Methods**: - The paper proposes various real-time data spoofing attacks. These attacks interfere with the perception results by providing the victim with carefully crafted malicious data during LiDAR-based collaborative perception, leading to emergency braking or increased collision risk. - The attack methods include different strategies targeting Early-Fusion systems and Intermediate-Fusion systems. 2. **Evaluating Attack Effectiveness**: - On the simulated dataset Adv-OPV2V and the real-world dataset Adv-MCity, all proposed attacks achieved a success rate of over 86% and can be implemented in practical experiments. 3. **Proposing Defense Mechanisms**: - The paper proposes a method called "Collaborative Anomaly Detection" (CAD), which detects data spoofing attacks by sharing Occupancy Maps from different vehicles. This method can detect 91.5% of attacks in simulated scenarios with a false positive rate of less than 3%. 4. **Comprehensive Analysis and Open Source Contribution**: - The paper provides a comprehensive analysis of factors affecting the effectiveness of attacks (such as attack methods, fusion schemes, and scenarios) and open-sources all attack/defense practices as benchmark tools to promote future research. In summary, this paper aims to reveal and address new security threats in collaborative perception systems and propose effective defense measures.