ATTACKS ON SENSORS FOR AUTONOMOUS VEHICLES: DETECTION AND ISOLATION

Authors

  • DR. P. Sunil Kumar Assistant professor, Department of Electronics and Communication Engineering, Sri devi Women’s Engineering College, Hyderabad, India. Author

Keywords:

Cyberattack, anomaly detection, autonomous vehicle, and sensor assault

Abstract

This research looks on the cyber security threat posed by sensor assaults to autonomous cars. Specifically, a
model-based strategy is proposed to allow safe localization of autonomous vehicles by identifying the origins of sensor
assaults. As a countermeasure against cyberattacks, we propose sensor redundant work, or the use of many sensors to
monitor the vehicle's position in real time. Banks of attack detectors are constructed using a Kalman filter with an extension
(EKF) and an overall sum (CUSUM) distinction to identify outliers in sensor readings. The recursive EKFs are used
CUSUM discriminators are built to analyse the remaining energy produced by their combined EKF in order to spot any
deviation of the sensor's output from the projected ask derived from a numerical model of the vehicle, allowing for more
accurate position and orientation estimates. To keep an eye on the discrepancy between various sensors' readings, a new type
of detector is devised that combines information from many sensors. On the basis of these rules, an isolation strategy is
developed to identify the offending sensor. results from each and every detector. Our proposed framework has been shown
to be useful based on data from actual automobiles.

Downloads

Published

2023-04-23

Issue

Section

Articles

How to Cite

ATTACKS ON SENSORS FOR AUTONOMOUS VEHICLES: DETECTION AND ISOLATION. (2023). INTERNATIONAL JOURNAL OF MANAGEMENT RESEARCH AND REVIEW, 13(2), 1-10. https://ijmrr.com/index.php/ijmrr/article/view/333