loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Naman Singh Negi 1 ; Ons Jelassi 1 ; Stephan Clemencon 1 and Sebastian Fischmeister 2

Affiliations: 1 LTCI, Telecom ParisTech, Paris and France ; 2 Dept. of Elec. and Computer Eng., University of Waterloo, Waterloo and Canada

Keyword(s): Anomaly, Anomaly Detection, Recurrent Neural Networks, Long Short-term Memory.

Abstract: In the recent decades, automotive research has been focused on creating a driverless future. Autonomous vehicles are expected to take over tasks which are dull, dirty and dangerous for humans (3Ds of robotization). However, augmented autonomy increases reliance on the robustness of the system. Autonomous vehicle systems are heavily focused on data acquisition in order to perceive the driving environment accurately. In the future, a typical autonomous vehicle data ecosystem will include data from internal sensors, infrastructure, communication with nearby vehicles, and other sources. Physical faults, malicious attacks or a misbehaving vehicle can result in the incorrect perception of the environment, which can in turn lead to task failure or accidents. Anomaly detection is hence expected to play a critical role improving the security and efficiency of autonomous and connected vehicles. Anomaly detection can be defined as a way of identifying unusual or unexpected events and/or measure ments. In this paper, we focus on the specific case of malicious attack/hijacking of the system which results in unpredictable evolution of the autonomous vehicle. We use a Long Short-Term Memory (LSTM) network for anomaly/fault detection. It is, first, trained on non-abnormal data to understand the system’s baseline performance and behaviour, monitored through three vehicle control parameters namely velocity, acceleration and jerk. Then, the model is used to predict over a number of future time steps and an alarm is raised as soon as the observed behaviour of the autonomous car significantly deviates from the prediction. The relevance of this approach is supported by numerical experiments based on data produced by an autonomous car simulator, capable of generating attacks on the system. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.238.20

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Negi, N.; Jelassi, O.; Clemencon, S. and Fischmeister, S. (2019). A LSTM Approach to Detection of Autonomous Vehicle Hijacking. In Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS; ISBN 978-989-758-374-2; ISSN 2184-495X, SciTePress, pages 475-482. DOI: 10.5220/0007726004750482

@conference{vehits19,
author={Naman Singh Negi. and Ons Jelassi. and Stephan Clemencon. and Sebastian Fischmeister.},
title={A LSTM Approach to Detection of Autonomous Vehicle Hijacking},
booktitle={Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS},
year={2019},
pages={475-482},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007726004750482},
isbn={978-989-758-374-2},
issn={2184-495X},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems - VEHITS
TI - A LSTM Approach to Detection of Autonomous Vehicle Hijacking
SN - 978-989-758-374-2
IS - 2184-495X
AU - Negi, N.
AU - Jelassi, O.
AU - Clemencon, S.
AU - Fischmeister, S.
PY - 2019
SP - 475
EP - 482
DO - 10.5220/0007726004750482
PB - SciTePress