Radar Data Integrity Verification Using 2D QIM-Based Data Hiding
Abstract
:1. Introduction
1.1. Watermarking Advantages
1.2. Principal Contribution
- Limited bandwidth: The communication interface from the sensor to the data processing unit is bandwidth limited in automotive applications. Most sensors use a traditional CAN interface with an 8-byte payload, that restricts the usage of traditional cryptographic methods, securing the sensor data [16]. An enhanced version of CAN called CAN-FD is introduced to increase bandwidth and payload to up-to 64 bytes. CAN-FD allows AUTOSAR secure onboard communication protocol (SecOC) implementation on the network. Apart from issues, such as key management and time synchronization, the SecOC requires the transmission of a message authentication code (MAC), which can take up to 8 bytes of the payload space. Bandwidth becomes a constraint even in high throughput interfaces such as CAN-FD. Consider a scenario where multiple sensors are connected to the same network, it takes no time to saturate the bus by adding an additional sensor to the network or by increasing the message frequency or data payload of each sensor. Legacy networks often run into these bandwidth issues given the increased data demand on the sensors to build high-resolution perception layer to support autonomous driving features.
- Real-time data integrity verification: Autonomous vehicle applications often require the sensor data to be processed in real-time. This constraint makes it difficult to use traditional data security methods based on cryptography as they require an additional step of decryption before data becomes useful.
2. Related Work
3. System and Attack Model
3.1. Sensor Fusion Data Model
3.2. Watermarking Data Model
4. Proposed Framework
- Watermark generation.
- Watermark embedding.
- Watermark decoding.
4.1. Watermark Generation
Algorithm 1: Watermark sequence generator. |
|
4.2. Watermark Embedding
4.3. Watermark Decoding
5. Security Analysis and Performance Evaluation
- Data addition;
- Data deletion;
- Data modification.
5.1. Data Addition
Algorithm 2: Find added indices. |
|
5.2. Data Deletion
Algorithm 3: Find deleted indices. |
|
5.3. Data Modification
Algorithm 4: Find modified indices. |
|
6. Experiments and Results
6.1. Impact of Embedding Distortion on Object Detection
6.2. Bit Error Rate
6.3. False-Alarm Rate Analysis
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Sarmento, A.; Garcia, B.; Coriteac, L.; Navarenho, L. The Challenges of the Autonomous Vehicle for Emergent Markets; SAE Technical Paper 2017-36-0436; SAE International: Sao Paulo, Brazil, 2018. [Google Scholar] [CrossRef] [Green Version]
- Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles. In Ground Vehicle Standard; SAE International: Warrendale, PA, USA, 2018.
- Baxter, J.A.; Merced, D.A.; Costinett, D.J.; Tolbert, L.M.; Ozpineci, B. Review of Electrical Architectures and Power Requirements for Automated Vehicles. In Proceedings of the 2018 IEEE Transportation Electrification Conference and Expo (ITEC), Long Beach, CA, USA, 13–15 June 2018; pp. 944–949. [Google Scholar]
- Cui, J.; Liew, L.; Sabaliauskaite, G.; Zhou, F. A Review on Safety Failures, Security Attacks, and Available Countermeasures for Autonomous Vehicles. Ad Hoc Netw. 2018, 90. [Google Scholar] [CrossRef]
- Liu, C.; Chen, J.; Nguyen, T.; Tomizuka, M. The Robustly-Safe Automated Driving System for Enhanced Active Safety1; SAE Technical Paper 2017-01-1406; SAE International: Detroit, MI, USA, 2017. [Google Scholar] [CrossRef] [Green Version]
- Guo, L.X.; Manglani, S.; Li, X.H.; Jia, Y.Y. Teaching Autonomous Vehicles How to Drive under Sensing Exceptions by Human Driving Demonstrations; SAE Technical Paper 2017-01-0070; SAE International: Detroit, MI, USA, 2017. [Google Scholar] [CrossRef]
- Jo, K.; Kim, J.; Kim, D.; Jang, C.; Sunwoo, M. Development of Autonomous Car—Part II: A Case Study on the Implementation of an Autonomous Driving System Based on Distributed Architecture. IEEE Trans. Ind. Electron. 2015, 62, 5119–5132. [Google Scholar] [CrossRef]
- Lin, C.; Sangiovanni-Vincentelli, A. Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In Proceedings of the 2012 International Conference on Cyber Security, Washington, DC, USA, 14–16 December 2012; pp. 1–7. [Google Scholar]
- Miller, C.; Valasek, C. Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA 2015, 2015, 91. [Google Scholar]
- Woo, S.; Jo, H.J.; Lee, D.H. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN. IEEE Trans. Intell. Transp. Syst. 2015, 16, 993–1006. [Google Scholar] [CrossRef]
- Specification of Secure Onboard Communication. Available online: https://www.autosar.org/fileadmin/user_upload standards/classic/4-3/AUTOSAR_SWS_SecureOnboardCommunication.pdf (accessed on 10 June 2020).
- Woo, S.; Jo, H.J.; Kim, I.S.; Lee, D.H. A Practical Security Architecture for In-Vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2248–2261. [Google Scholar] [CrossRef]
- Changalvala, R.; Malik, H. LiDAR Data Integrity Verification for Autonomous Vehicle. IEEE Access 2019, 7, 138018–138031. [Google Scholar] [CrossRef]
- Jo, K.; Kim, J.; Kim, D.; Jang, C.; Sunwoo, M. Development of Autonomous Car—Part I: Distributed System Architecture and Development Process. IEEE Trans. Ind. Electron. 2014, 61, 7131–7140. [Google Scholar] [CrossRef]
- Lu, Z.M.; Guo, S.Z. Chapter 1—Introduction. In Lossless Information Hiding in Images; Lu, Z.M., Guo, S.Z., Eds.; Syngress: Hingham St. Rockland, MA, USA, 2017; pp. 1–68. [Google Scholar] [CrossRef]
- Zou, Q.; Chan, W.K.; Gui, K.C.; Chen, Q.; Scheibert, K.; Heidt, L.; Seow, E. The Study of Secure CAN Communication for Automotive Applications. In Proceedings of the WCX™ 17: SAE World Congress Experience, Detroit, MI, USA, 4–6 April 2017. [Google Scholar] [CrossRef]
- Feng, J.; Potkonjak, M. Real-Time Watermarking Techniques for Sensor Networks; SPIE-The International Society for Optical Engineering: Bellingham, WA, USA, 2003; Volume 5020. [Google Scholar] [CrossRef]
- Kamel, I.; Juma, H. A lightweight data integrity scheme for sensor networks. Sensors 2011, 11, 4118–4136. [Google Scholar] [CrossRef] [PubMed]
- Ibaida, A.; Khalil, I.; van Schyndel, R. A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. In Proceedings of the 2011 Computing in Cardiology, Hangzhou, China, 18–21 September 2011; pp. 393–396. [Google Scholar]
- Tiwari, A.; Chakraborty, S.; Mishra, M. Secure Data Aggregation Using Irreversible Watermarking in WSNs. In Proceedings of the Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, India, 26–27 September 2013; 2013. [Google Scholar] [CrossRef]
- Sun, X.; Su, J.; Wang, B.; Liu, Q. Digital watermarking method for data integrity protection in wireless sensor networks. Int. J. Secur. Its Appl. 2013, 7, 407–416. [Google Scholar]
- Lalem, F. Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. In Proceedings of the Twenty-Ninth International Flairs Conference, Key Largo, FL, USA, 16–18 May 2016. [Google Scholar]
- Zhang, G.; Kou, L.; Zhang, L.; Liu, C.; Da, Q.; Sun, J. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. Secur. Commun. Netw. 2017, 2017, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Alromih, A.; Al-Rodhaan, M.; Tian, Y. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 2018, 18, 4346. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bahirat, K.; Prabhakaran, B. A Study On Lidar Data Forensics. In Proceedings of the IEEE International Conference on Multimedia and Expo, Hong Kong, China, 10–14 July 2017; pp. 679–684. [Google Scholar] [CrossRef]
- Technologies, M. CarND-Mercedes-SF-Utilities. Available online: https://github.com/udacity/CarND-Mercedes-SF-Utilities/projects (accessed on 24 July 2020).
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography, 2nd ed.; Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA, 2008. [Google Scholar]
- Chen, B.; Wornell, G.W. Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. Vlsi Signal Process. Syst. Signal Image Video Technol. 2001, 27, 7–33. [Google Scholar] [CrossRef]
- Joachim, E.; Bernd, G. Informed Watermarking; Kluwer Academic Publishers: Amsterdam, The Netherlands, 2002; Chapter 2. [Google Scholar]
- Chen, B.; Wornell, G.W. Digital watermarking and information embedding using dither modulation. In Proceedings of the 1998 IEEE 2nd Workshop on Multimedia Signal Processing, Redondo Beach, CA, USA, 7–9 December 1998; pp. 273–278. [Google Scholar] [CrossRef]
- Specification of Time Synchronization over CAN. Available online: https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_SWS_TimeSyncOverCAN.pdf (accessed on 24 July 2020).
- Jetto, L.; Longhi, S.; Venturini, G. Development and experimental validation of an adaptive extended Kalman filter for the localization of mobile robots. IEEE Trans. Robot. Autom. 1999, 15, 219–229. [Google Scholar] [CrossRef]
- Rigatos, G.G. Extended Kalman and Particle Filtering for sensor fusion in motion control of mobile robots. Math. Comput. Simul. 2010, 81, 590–607. [Google Scholar] [CrossRef]
- Madhavan, R.; Schlenoff, C. Moving Object Prediction for Off-road Autonomous Navigation. In Proceedings of the Volume 5083, Unmanned Ground Vehicle Technology V, Orlando, FL, USA, 30 September 2003; pp. 134–145. [Google Scholar] [CrossRef] [Green Version]
- Park, S.; Gil, M.S.; Im, H.; Moon, Y.S. Measurement Noise Recommendation for Efficient Kalman Filtering over a Large Amount of Sensor Data. Sensors 2019, 19, 1168. [Google Scholar] [CrossRef] [Green Version]
Noise Variance | BER % | FalseAlarm % | |
---|---|---|---|
0.0 | 8.6 | 0.0 | |
9.2 | 0.0 | ||
9.2 | 0.0 | ||
8.6 | 0.0 | ||
18.6 | 61.1 | ||
28.6 | 75.0 | ||
56.4 | 85.2 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Changalvala, R.; Fedoruk, B.; Malik, H. Radar Data Integrity Verification Using 2D QIM-Based Data Hiding. Sensors 2020, 20, 5530. https://doi.org/10.3390/s20195530
Changalvala R, Fedoruk B, Malik H. Radar Data Integrity Verification Using 2D QIM-Based Data Hiding. Sensors. 2020; 20(19):5530. https://doi.org/10.3390/s20195530
Chicago/Turabian StyleChangalvala, Raghu, Brandon Fedoruk, and Hafiz Malik. 2020. "Radar Data Integrity Verification Using 2D QIM-Based Data Hiding" Sensors 20, no. 19: 5530. https://doi.org/10.3390/s20195530
APA StyleChangalvala, R., Fedoruk, B., & Malik, H. (2020). Radar Data Integrity Verification Using 2D QIM-Based Data Hiding. Sensors, 20(19), 5530. https://doi.org/10.3390/s20195530