Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal

Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The prop...

Full description

Bibliographic Details
Main Authors: Tomer Gluck, Moshe Kravchik, Samuel Chocron, Yuval Elovici, Asaf Shabtai
Format: Article
Language:English
Published: MDPI AG 2020-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/21/6157
_version_ 1797549439753125888
author Tomer Gluck
Moshe Kravchik
Samuel Chocron
Yuval Elovici
Asaf Shabtai
author_facet Tomer Gluck
Moshe Kravchik
Samuel Chocron
Yuval Elovici
Asaf Shabtai
author_sort Tomer Gluck
collection DOAJ
description Ultrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor’s reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor’s reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor’s receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor’s relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area.
first_indexed 2024-03-10T15:15:22Z
format Article
id doaj.art-4514b8c38abb44d8b8033c934336f411
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T15:15:22Z
publishDate 2020-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-4514b8c38abb44d8b8033c934336f4112023-11-20T18:58:51ZengMDPI AGSensors1424-82202020-10-012021615710.3390/s20216157Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous SignalTomer Gluck0Moshe Kravchik1Samuel Chocron2Yuval Elovici3Asaf Shabtai4Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, IsraelDepartment of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, IsraelRafael Advanced Defense Systems Ltd., Haifa 3102102, IsraelDepartment of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, IsraelDepartment of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 8410501, IsraelUltrasonic distance sensors use an ultrasonic pulse’s time of flight to calculate the distance to the reflecting object. Widely used in industry, these sensors are an important component in autonomous vehicles, where they are used for such tasks as object avoidance and altitude measurement. The proper operation of such autonomous vehicles relies on sensor measurements; therefore, an adversary that has the ability to undermine the sensor’s reliability can pose a major risk to the vehicle. Previous attempts to alter the measurements of this sensor using an external signal succeeded in performing a denial-of-service (DoS) attack, in which the sensor’s reading showed a constant value, and a spoofing attack, in which the attacker could control the measurement to some extent. However, these attacks require precise knowledge of the sensor and its operation (e.g., timing of the ultrasonic pulse sent by the sensor). In this paper, we present an attack on ultrasonic distance sensors in which the measured distance can be altered (i.e., spoofing attack). The attack exploits a vulnerability discovered in the ultrasonic sensor’s receiver that results in a fake pulse that is produced by a constant noise in the input. A major advantage of the proposed attack is that, unlike previous attacks, a constant signal is used, and therefore, no prior knowledge of the sensor’s relative location or its timing behavior is required. We demonstrate the attack in both a lab setup (testbed) and a real setup involving a drone to demonstrate its feasibility. Our experiments show that the attack can interfere with the proper operation of the vehicle. In addition to the risk that the attack poses to autonomous vehicles, it can also be used as an effective defensive tool for restricting the movement of unauthorized autonomous vehicles within a protected area.https://www.mdpi.com/1424-8220/20/21/6157autonomous vehiclesdronessensorsultrasonic sensorsensors attackspoofing
spellingShingle Tomer Gluck
Moshe Kravchik
Samuel Chocron
Yuval Elovici
Asaf Shabtai
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
Sensors
autonomous vehicles
drones
sensors
ultrasonic sensor
sensors attack
spoofing
title Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_full Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_fullStr Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_full_unstemmed Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_short Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
title_sort spoofing attack on ultrasonic distance sensors using a continuous signal
topic autonomous vehicles
drones
sensors
ultrasonic sensor
sensors attack
spoofing
url https://www.mdpi.com/1424-8220/20/21/6157
work_keys_str_mv AT tomergluck spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT moshekravchik spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT samuelchocron spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT yuvalelovici spoofingattackonultrasonicdistancesensorsusingacontinuoussignal
AT asafshabtai spoofingattackonultrasonicdistancesensorsusingacontinuoussignal