1. Gordian
- Author
-
Gil Lederman, Baihong Jin, Edward A. Lee, Matthew Weber, Yasser Shoukry, Alberto Sangiovanni-Vincentelli, and Sanjit A. Seshia
- Subjects
0209 industrial biotechnology ,Control and Optimization ,Theoretical computer science ,Computer Networks and Communications ,Computer science ,020206 networking & telecommunications ,Ranging ,02 engineering and technology ,Cryptographic protocol ,Human-Computer Interaction ,Range (mathematics) ,020901 industrial engineering & automation ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,Anomaly detection ,Noise (video) ,Trilateration ,Counterexample - Abstract
Accurate localization from Cyber-Physical Systems (CPS) is a critical enabling technology for context-aware applications and control. As localization plays an increasingly safety-critical role, location systems must be able to identify and eliminate faulty measurements to prevent dangerously inaccurate localization. In this article, we consider the range-based localization problem and propose a method to detect coordinated adversarial corruption on anchor positions and distance measurements. Our algorithm, G ordian , rapidly finds attacks by identifying geometric inconsistencies at the graph level without requiring assumptions about hardware, ranging mechanisms, or cryptographic protocols. We give necessary conditions for which attack detection is guaranteed to be successful in the noiseless case, and we use that intuition to extend G ordian to the noisy case where fewer guarantees are possible. In simulations generated from real-world sensor noise, we empirically show that G ordian ’s trilateration counterexample generation procedure enables rapid attack detection even for combinatorially difficult problems.
- Published
- 2020
- Full Text
- View/download PDF