
NSF Org: |
ECCS Division of Electrical, Communications and Cyber Systems |
Recipient: |
|
Initial Amendment Date: | July 27, 2020 |
Latest Amendment Date: | July 27, 2020 |
Award Number: | 2028406 |
Award Instrument: | Standard Grant |
Program Manager: |
Ale Lukaszew
rlukasze@nsf.gov (703)292-8103 ECCS Division of Electrical, Communications and Cyber Systems ENG Directorate for Engineering |
Start Date: | September 1, 2020 |
End Date: | August 31, 2023 (Estimated) |
Total Intended Award Amount: | $300,000.00 |
Total Awarded Amount to Date: | $300,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
4333 BROOKLYN AVE NE SEATTLE WA US 98195-1016 (206)543-4043 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
4333 Brooklyn Ave NE Seattle WA US 98195-2500 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | CCSS-Comms Circuits & Sens Sys |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.041 |
ABSTRACT
Today?s smart devices, robots, and vehicles are becoming ever more autonomous and this places utmost importance on their reliability and safety. To meet these safety demands, light detection and ranging (LiDAR) systems have been used to make a 3D map of environment in order to navigate the autonomous agent and avoid collisions. A LiDAR measures the distance by illuminating a target with laser light and detects the reflection with a sensor. They are becoming an inevitable part of autonomous vehicles, drones, and robots by providing this vital sensing and imaging capability. However, today?s LiDARs also impose potential human and public safety threats due to their security vulnerabilities. For instance, an attacker can deliberately send a spoofing signal to the victim?s LiDAR which cannot differentiate the spoofing signal from the actual reflected signal. In doing so, attacker can overwrite the actual reflected signal. Eventually, the attacker can trick the victim by hiding or misrepresenting its actual location, leading to serious security and safety issues. While LiDAR systems are on the verge of commercialization, these scenarios are unavoidable and the prevention techniques have not been well studied and researched. This project aims at investigating these issues and proposing a new secure scheme based on frequency encryption. In addition to LiDAR, this approach will have significant broader impacts on securing various types of wireless optical systems and satellite communications as well. Furthermore, this research involving electro-optical system design offers many exciting opportunities to incorporate new materials and paradigms into the curriculums and STEM-related K-12 outreach programs.
Investigating the hardware-level security issues of complex electro-optical systems such as a LiDAR requires new unified electronic-photonic modeling and co-simulation frameworks. This work develops such a platform by utilizing Verilog-A and MATLAB behavioral models and incorporating all relevant electro-optical dynamics. This platform enables simultaneously studying the performance and security vulnerabilities including jamming and spoofing of LiDAR systems. In particular, this project focuses on beam steering frequency modulated continuous wave (FMCW) LiDARs since they are the most promising and robust LiDAR technology as of today. Additionally, the results will be experimentally verified using a benchtop lab setup. Finally, a novel ranging approach called frequency encrypted FMCW (FE-FMCW) will be developed and implemented which can protect the state-of-the-art FMCW LiDAR systems from malicious attacks with minimal compromise on performance. In order to do so, a holistic design methodology based on mixed-signal electronic and photonic circuit design and signal processing will be deployed to realize and implement the newly proposed FE-FMCW LiDAR. This technique relies on a new optical phase-locked loop (OPLL) design which can encrypt the frequency chirp-rate of the laser while maintaining required linearity and bandwidth for FMCW signals. The frequency encryption code is generated on the integrated-circuit chip and it will be unique to each LiDAR hardware system. This new technique will transform the system architecture of future LiDAR systems and many other emerging electronic-photonic systems as well as ensuring their security and safety.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
Throughout this project, we comprehensively modeled and simulated Frequency Modulated Continuous Wave (FMCW) LiDAR systems, investigating their security vulnerabilities. Beam-steering FMCW LiDARs have traditionally been considered spatially and temporally secure due to coherent detection using highly directional optical antennas or lenses. Despite this, we discovered that the risks of spoofing in FMCW ranging systems, previously explored for mmWave Radars, are applicable. Our MATLAB Simulink results demonstrated that these systems can be spoofed using a custom electro-optical system with realistic component parameters.
To address this vulnerability, we proposed a counterattack method called Frequency Encrypted FMCW (FE-FMCW), which involves randomly changing the signal chirp-rate frame by frame. This approach contrasts with conventional FMCW systems where the transmitted signal has a fixed chirp-rate.
To validate the feasibility of the proposed FE-FMCW LiDAR in actual hardware, we designed and taped out a chip in TSMC 180nm CMOS process. This chip, equipped with an electro-optical synthesizer, generates FMCW signals with randomly changing chirp rates per frame using an on-chip SRAM-based Physically Unclonable Function (PUF) block. The design of this electro-optical synthesizer was optimized using a custom MATLAB Simulink framework, now publicly available on our lab's GitHub. This pioneering design introduces a random change in chirp rate for a secure FMCW LiDAR system against spoofing attacks, with potential applications in ranging/sensing and RF-photonics. Our lab utilized this chip to measure LiDAR ranging for targets up to 30 meters and over 1,000 measurement frames per second, employing off-the-shelf optical components as a proof of concept.
Throughout the project, we provided training to two Ph.D. students on topics such as electro-optical system modeling, mixed-signal integrated circuit design, and hardware testing. Some of the results and developed frameworks have been incorporated into a graduate-level course developed by the Principal Investigator at the University of Washington.
Last Modified: 12/28/2023
Modified by: Sajjad Moazeni
Please report errors in award information by writing to: awardsearch@nsf.gov.