A Unified Anomaly Detection Methodology for
Lane-Following of Autonomous Driving Systems
Xingshuo Han
∗
, Kangjie Chen
∗
, Yuan Zhou
∗‡
, Meikang Qiu
†
, Chun Fan
§
, Yang Liu
∗
, Tianwei Zhang
∗
∗
Nanyang Technological University, Singapore 639798
Email: {xingshuo001,kangjie001}@e.ntu.edu.sg, {y.zhou, yangliu, tianwei.zhang}@ntu.edu.sg
†
Texas A&M University Commerce, TX, USA 75428
Email: meikang.qiu@tamuc.edu
§
Peng Cheng Laboratory & Peking University, China
Email: fanchun@pku.edu.cn
‡
Corresponding author
Abstract—Autonomous Vehicles (AVs) are equipped with var-
ious sensors and controlled by Autonomous Driving Systems
(ADSs) to provide high-level autonomy. When interacting with
the environment, AVs suffer from a broad attack surface, and the
sensory data are susceptible to anomalies caused by faults, sensor
malfunctions, or attacks, which may jeopardize traffic safety
and result in serious accidents. Most of the current works focus
on anomaly detection of specific attacks, such as GPS spoofing
or traffic sign attacks. There are no works on scenario-aware
anomaly detection for ADSs. In this paper, focusing on the lane-
following scenario, we introduce a novel transformer-based one-
class classification model to identify time series anomalies and
adversarial image examples. It can detect GPS spoofing, traffic
sign recognition and lane detection attacks with high efficiency
and accuracy. We further design a Swin-transformer model to
enhance the detection performance. Experiments on Baidu Apollo
and two public data sets (GTSRB and Tusimple) show that
compared with the state-of-the-art methods, our method, on
average, improves the detection performance by 9.7%, 14.7%
and 15.7% for GPS spoofing, traffic sign recognition and lane
detection attacks, respectively.
Index Terms—One-Class Classification, Autonomous Driving
Systems, Transformer, Multi-source Anomaly Detection
I. I NTRODUCTION
Autonomous Vehicles (AVs) will play an essential role
in modern intelligent transportation systems to reduce traffic
accidents and congestion [1], [2]. Recent advances in the tech-
nologies of computing, automation and artificial intelligence
inspire many companies to devote themselves to this promising
domain and accelerate the commercialization of autonomous
driving, e.g., Baidu Apollo [3], Google Waymo [4].
To guarantee high-level automation, Autonomous Driving
Systems (ADSs) serve as the brain of AVs, which com-
municate with the external environment and internal vehicle
components, and make driving decisions. Due to the complex
environment and requirements, most of the current ADSs are
scenario-sensitive, i.e., they have different tasks to complete
under different scenarios (lane following, lane changing, over-
taking, and intersections, etc.) based on the information from
different sensors. For example, in the lane following scenario,
an AV is required to move along the central lines of lanes.
So the preliminary task for an ADS is to recognize the lane
boundaries and locate the central lines. Cameras and GPS are
required to achieve this function. In the overtaking scenario, an
ADS needs to recognize surrounding obstacles and determine
whether it is safe to perform overtaking. The decision is made
from the data in Lidar and GPS.
The high complexity of ADSs inevitably brings a broad
attack surface [5]. For example, an adversary can launch GPS
spoofing attacks to mislead AVs to navigate to a dangerous
position [6]. The attack cost is only $200 for a low-end “GPS
spoofing” device. By adding malicious patches [7], paint [8]
or stickers [9] on the road or traffic signs, an adversary can
make ADSs perceive the environment mistakenly and make
wrong decisions [10], [11]. Attacks on Lidar can deceive
ADSs into ignoring the surrounding obstacles, resulting in
collisions [12], [13]. Different attacks may cause different
damages under different scenarios. For instance, adversarial
attacks against Lidars target obstacle avoidance rather than
lane following, which mainly depends on AV’s localization
and lane detection; GPS spoofing focuses on the lane following
and change scenarios.
In this paper, we consider the security protection of the
lane following mechanism, which is the most common and
fundamental scenario in not only ADSs but also state-of-the-
art Advanced Driver-Assistance Systems (ADASs) and Lane
Keeping Assist Systems (LKASs). We aim to introduce a
unified methodology to detect any anomalies during lane fol-
lowing, and mitigate different types of security vulnerabilities,
i.e., localization attacks, lane detection attacks, and traffic
sign recognition attacks. They have significant impacts on the
functionality of ADSs, and it is important for vehicles to be
immune to them for secure and safe driving. Although prior
studies proposed some solutions to defeat sensor attacks for
AVs [13]–[16], they only focus on one specific kind of threats.
It is challenging to design a unified and comprehensive method
to cover different attack vectors, as they have distinct behaviors
and techniques.
We develop a novel detection methodology, called T-GP
(Transformer with Gradient Penalty), to analyze and identify
time series anomalies (localization attacks) and adversarial
images (i.e., lane detection attacks and traffic sign recognition
836
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable
Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)
978-1-6654-3574-1/21/$31.00 ©2021 IEEE
DOI 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00119
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) | 978-1-6654-3574-1/21/$31.00 ©2021 IEEE | DOI: 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00119
Authorized licensed use limited to: Nanyang Technological University. Downloaded on January 23,2022 at 09:22:47 UTC from IEEE Xplore. Restrictions apply.