차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안

Vol. 34, No. 2, pp. 217-228, 4월. 2024
10.13089/JKIISC.2024.34.2.217, Full Text:
Keywords: LIDAR, Autonomous, Jamming, Security Threats
Abstract

LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
황지웅, 윤요섭, 오인수, 임강빈, "Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 2, pp. 217-228, 2024. DOI: 10.13089/JKIISC.2024.34.2.217.

[ACM Style]
황지웅, 윤요섭, 오인수, and 임강빈. 2024. Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures. Journal of The Korea Institute of Information Security and Cryptology, 34, 2, (2024), 217-228. DOI: 10.13089/JKIISC.2024.34.2.217.