The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.33)
pp: 80-86
Alexander M. Wyglinski , Worcester Polytechnic Institute
Xinming Huang , Worcester Polytechnic Institute
Taskin Padir , Worcester Polytechnic Institute
Lifeng Lai , Worcester Polytechnic Institute
Thomas R. Eisenbarth , Worcester Polytechnic Institute
Krishna Venkatasubramanian , Worcester Polytechnic Institute
ABSTRACT
Embedded computing and sensor systems are increasingly becoming an integral part of today's infrastructure. From jet engines to vending machines, our society relies on embedded computing and sensor systems to support numerous applications seamlessly and reliably. This is especially true with respect to autonomous systems such as unmanned aircraft, unmanned ground vehicles, robotics, medical operations, and industrial automation. However, given society's increasing reliance on embedded computing and sensor systems as well as the applications they support, this introduces a new form of vulnerability into this critical infrastructure that is only now beginning to be recognized as a significant threat with potentially serious consequences. This column presents the latest insights on the technical challenges and opportunities associated with the security of autonomous systems from an embedded computing and sensors perspective.
INDEX TERMS
Embedded systems, Sensors, Autonomic systems, Network security, autonomous systems, embedded computing, sensor systems
CITATION
Alexander M. Wyglinski, Xinming Huang, Taskin Padir, Lifeng Lai, Thomas R. Eisenbarth, Krishna Venkatasubramanian, "Security of Autonomous Systems Employing Embedded Computing and Sensors", IEEE Micro, vol.33, no. 1, pp. 80-86, Jan.-Feb. 2013, doi:10.1109/MM.2013.18
REFERENCES
1. E. Guizzo, "How Google's Self-Driving Car Works," IEEE Spectrum Automation blog, 18 Oct. 2011; http://smart-machines.blogspot.com/2007/ 10reinforcement-learning-is-cool.html.
2. A. Barari, "GM Promises Autonomous Vehicles by End of Decade," Motorward,17 Oct. 2011; http://www.motorward.com/2011/10gm-promises- autonomous-vehicles-by-end-of-decade .
3. K. Koscher et al., "Experimental Security Analysis of a Modern Automobile," Proc. IEEE Symp. Security and Privacy, IEEE, 2010, pp. 447-462.
4. P. Kocher et al., "Security as a New Dimension in Embedded System Design," Proc. 41st Ann. Design Automation Conf. (DAC 04), ACM, 2004, pp. 753-760.
5. D.K. Nilsson and U.E. Larson, "Secure Firmware Updates over the Air in Intelligent Vehicles," Proc. IEEE Int'l Conf. Communications, IEEE CS, 2008, pp. 380-384.
6. D.K. Nilsson and U.E. Larson, "Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks," Proc. 1st Int'l Conf. Forensic Applications and Techniques in Telecommunications, Information, and Multimedia, ICST, 2008, no. 8.
7. U.E. Larson and D.K. Nilsson, "Securing Vehicles Against Cyber Attacks," Proc. 4th Ann. Workshop Cyber Security and Information Intelligence Research, ACM, 2008, no. 30.
8. A. Francillon, B. Danev, and S. Capkun, "Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars," Proc. 18th Network and Distributed System Security Symp., The Internet Soc., 2011.
9. D.K. Nilsson, P.H. Phung, and U.E. Larson, "Vehicle ECU Classification Based on Safety-Security Characteristics," Proc. IET Road Transport Information and Control Conf., IEEE CS, 2008, pp. 1-7.
10. M. Mixon, "Todd Humphreys' Research Team Demonstrates First Successful GPS Spoofing of UAV," 2012, http://www.ae.utexas.edu/news/ archive/2012 todd-humphreys-research- team-demonstrates-first-successful- gps-spoofing-of-uav .
11. C. Kwan, "Two Global Hawk Unmanned Aircraft Fly in Close Formation, Move AHR Program Closer to Autonomous Aerial Refueling,"5 Oct. 2012; http://globenewswire.com/news- release/2012/ 10/05/495475/10007491/enMultimedia-Release-Two-Global- Hawk-Unmanned-Aircraft-Fly-in-Close- Formation-Move-AHR-Program-Closer- to-Autonomous-Aerial-Refueling.html .
12. U. Drolia et al., Autoplug: An Automotive Test-Bed for Electronic Controller Unit Testing and Verification, tech. report, School of Eng. and Applied Science, Univ. of Pennsylvania, 2011.
13. D. Lemp, S. Köhl, and M. Plöger, ECU Network Testing by Hardware-in-the- Loop Simulation, tech. report, dSPACE GmbH, 2004.
14. M. Aoyama, "Computing for the Next Generation Automobile," Computer, June 2012, pp. 32-37.
15. CAN Specification: Version 2.0, tech. report, Robert Bosch GmbH, 1991.
16. S. Lorenz, "The FlexRay Electrical Physical Layer Evolution," Automotive, 2010, pp. 1-6.
17. K. Akdemir et al., "An Emerging Threat: Eve Meets a Robot," Proc. 2nd Int'l Conf. Trusted Systems, LNCS 6802, Springer, 2011, pp. 271-289.
18. S. Chen et al., "Feasibility Analysis of Vehicular Dynamic Spectrum Access via Queueing Theory Model," IEEE Comm. Magazine, Nov. 2011, pp. 156-163.
19. D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. IEEE Symp. Security and Privacy, IEEE, 2007, pp. 296-310.
20. S. Kinney, Trusted Platform Module Basics: Using TPM in Embedded Systems, Elsevier, 2006.
21. C. Hu, Solving Today's Design Security Concerns, tech. report, Xilinx, 2010.
22. C. Gorog, "Protect Firmware from Counterfeiting," 2011; http://www.embeddedintel.comspecialfeatures.php?article=126 .
23. L.K. Shade, "Implementing Secure Remote Firmware Updates," Proc. Embedded Systems Conf., UBM Electronics, 2011.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool