LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Tariq Hussain , Muhammad Nawaz Khan , Bailin Yang , Razaz Waheeb Attar , Ahmed Alhomoud
{"title":"LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving","authors":"Tariq Hussain ,&nbsp;Muhammad Nawaz Khan ,&nbsp;Bailin Yang ,&nbsp;Razaz Waheeb Attar ,&nbsp;Ahmed Alhomoud","doi":"10.1016/j.cose.2025.104544","DOIUrl":null,"url":null,"abstract":"<div><div>LiDAR technology uses laser light to illuminate the surrounding area and detect 3D objects. Calculates different features such as distance, shape, height, and direction of objects, ultimately generating comprehensive 3D maps by collecting cloud points. They are frequently used in autonomous vehicles, robotics, forestry, archaeology, and environmental monitoring. LiDAR is important in autonomous vehicles for recognizing objects, pedestrians, and other vehicles, allowing them to make judgments to prevent collisions and ensure human safety. The LiDAR systems are generally robust; they are not immune to certain types of security attacks that could compromise the integrity of the signals and may affect the accuracy of the data. If the signal is compromised, the system could incorrectly interpret the environment, resulting in erroneous object recognition, incorrect obstacle avoidance decisions, or inaccurate environment mapping. As a result, it can lead to serious consequences, such as property damage, accidents, or dangerous driving conditions. To address these security challenges and establish better security mechanisms for LiDAR systems, we have proposed a novel technique for detecting and avoiding all possible spoofing attacks on LiDAR signals. Initially, the system identifies potential spoofing attacks, and as a preventive measure, it employs an optimized path strategy. This strategy ensures safe crossings and autonomous navigation while avoiding obstacles along the vehicle’s route. The main aim is to identify the spoofed objects, suitably map the 3D presentation of the objects, and properly navigate autonomous vehicles with an optimized path selection in the automatic driving system. The proposed system is validated in different scenarios, and the experimental results demonstrate a success rate of 94.57% in true positive and false positive rates, indicating the effectiveness of the system. The average precision rate of 0.95 further supports its performance. The strength of the system was confirmed by testing it with different intersection over union (IoU) rates in different situations and closely looking at the attacker’s success rate.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"157 ","pages":"Article 104544"},"PeriodicalIF":5.4000,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002330","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

LiDAR technology uses laser light to illuminate the surrounding area and detect 3D objects. Calculates different features such as distance, shape, height, and direction of objects, ultimately generating comprehensive 3D maps by collecting cloud points. They are frequently used in autonomous vehicles, robotics, forestry, archaeology, and environmental monitoring. LiDAR is important in autonomous vehicles for recognizing objects, pedestrians, and other vehicles, allowing them to make judgments to prevent collisions and ensure human safety. The LiDAR systems are generally robust; they are not immune to certain types of security attacks that could compromise the integrity of the signals and may affect the accuracy of the data. If the signal is compromised, the system could incorrectly interpret the environment, resulting in erroneous object recognition, incorrect obstacle avoidance decisions, or inaccurate environment mapping. As a result, it can lead to serious consequences, such as property damage, accidents, or dangerous driving conditions. To address these security challenges and establish better security mechanisms for LiDAR systems, we have proposed a novel technique for detecting and avoiding all possible spoofing attacks on LiDAR signals. Initially, the system identifies potential spoofing attacks, and as a preventive measure, it employs an optimized path strategy. This strategy ensures safe crossings and autonomous navigation while avoiding obstacles along the vehicle’s route. The main aim is to identify the spoofed objects, suitably map the 3D presentation of the objects, and properly navigate autonomous vehicles with an optimized path selection in the automatic driving system. The proposed system is validated in different scenarios, and the experimental results demonstrate a success rate of 94.57% in true positive and false positive rates, indicating the effectiveness of the system. The average precision rate of 0.95 further supports its performance. The strength of the system was confirmed by testing it with different intersection over union (IoU) rates in different situations and closely looking at the attacker’s success rate.
激光雷达点云传输:自动驾驶中欺骗攻击的对抗视角
激光雷达技术利用激光照亮周围区域,探测3D物体。计算物体的距离、形状、高度和方向等不同特征,最终通过收集云点生成全面的3D地图。它们经常用于自动驾驶汽车、机器人、林业、考古学和环境监测。激光雷达在自动驾驶汽车中非常重要,它可以识别物体、行人和其他车辆,使它们能够做出判断,防止碰撞,确保人身安全。激光雷达系统通常是健壮的;它们不能免受某些类型的安全攻击,这些攻击可能会损害信号的完整性,并可能影响数据的准确性。如果信号受损,系统可能会错误地解释环境,导致错误的目标识别、错误的避障决策或不准确的环境映射。因此,它会导致严重的后果,如财产损失、事故或危险的驾驶状况。为了解决这些安全挑战并为激光雷达系统建立更好的安全机制,我们提出了一种新的技术来检测和避免对激光雷达信号的所有可能的欺骗攻击。系统首先识别潜在的欺骗攻击,并采用优化路径策略作为预防措施。这一策略确保了安全通行和自主导航,同时避开了车辆行驶路线上的障碍物。其主要目的是识别被欺骗的物体,适当地映射物体的3D呈现,并在自动驾驶系统中通过优化的路径选择正确导航自动驾驶汽车。在不同场景下对系统进行了验证,实验结果表明,该系统的真阳性率和假阳性率均达到94.57%,表明了系统的有效性。平均精度为0.95,进一步支持了其性能。通过在不同情况下使用不同的交联率(IoU)对系统进行测试,并仔细观察攻击者的成功率,验证了系统的强度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信