RADAR ANTI-SPOOFING SYSTEM FOR IDENTIFYING GHOST OBJECTS CREATED BY RECIPROCITY-BASED SENSOR SPOOFING
20230184926 · 2023-06-15
Inventors
Cpc classification
G06V10/762
PHYSICS
G01S13/9011
PHYSICS
G01S13/87
PHYSICS
G01S7/36
PHYSICS
G01S7/415
PHYSICS
G06V10/62
PHYSICS
G01S13/505
PHYSICS
G06V10/809
PHYSICS
International classification
G01S13/90
PHYSICS
G01S13/50
PHYSICS
G06V10/62
PHYSICS
G06V10/74
PHYSICS
G06V10/762
PHYSICS
Abstract
A radar anti-spoofing system for an autonomous vehicle includes a plurality of radar sensors that generate a plurality of input detection points representing radio frequency (RF) signals reflected from objects and a controller in electronic communication with the plurality of radar sensors. The controller executes instructions to determine time-matched clusters that represent objects located in an environment surrounding the autonomous vehicle based on the input detection points from the plurality of radar sensors. The controller determines an adjusted signal to noise (SNR) measure for a specific time-matched cluster by dividing an SNR of the specific time-matched cluster by a range measurement of the specific time-matched cluster. The controller determines a velocity-ratio measure of the time-matched cluster by dividing a motion-based velocity by a Doppler-frequency velocity, and identifies the time-matched cluster as either a ghost object or a real object.
Claims
1. A radar anti-spoofing system for an autonomous vehicle, the radar anti-spoofing system comprising: a plurality of radar sensors that generate a plurality of input detection points representing radio frequency (RF) signals reflected from objects; and one or more controllers in electronic communication with the plurality of radar sensors, wherein the one or more controllers execute instructions to: determine time-matched clusters that represent objects located in an environment surrounding the autonomous vehicle based on the plurality of input detection points from the plurality of radar sensors; determine an adjusted signal to noise (SNR) measure for a specific time-matched cluster by dividing an SNR of the specific time-matched cluster by a range measurement of the specific time-matched cluster; determine a motion-based velocity of the time-matched cluster based on a motion vector of the time-matched cluster; determine a Doppler-frequency velocity of the time-matched cluster; determine a velocity-ratio measure of the time-matched cluster by dividing the motion-based velocity by the Doppler-frequency velocity; and identify the time-matched cluster as either a ghost object or a real object by a thresholding technique based on the values of the adjusted SNR measure and the velocity-ratio measure.
2. The radar anti-spoofing system of claim 1, wherein the controller executes instructions to: execute a clustering algorithm to divide the plurality of input detection points from the plurality of radar sensors into a plurality of clusters.
3. The radar anti-spoofing system of claim 2, wherein the clustering algorithm is a fuzzy c-mean clustering algorithm.
4. The radar anti-spoofing system of claim 2, wherein the controller executes instructions to: merge close clusters of the plurality of clusters together with one another to create a plurality of merged clusters, wherein a close cluster is determined based on a minimum distance between the plurality of clusters.
5. The radar anti-spoofing system of claim 4, wherein the minimum distance is based on a resolution of the plurality of radar sensors and an application domain.
6. The radar anti-spoofing system of claim 4, wherein the controller executes instructions to: match cluster centers in one detection frame with cluster centers in a next detection frame for the plurality of merged clusters based on a nearest neighbor technique to determine the time-matched clusters.
7. The radar anti-spoofing system of claim 1, wherein the motion-based velocity is determined by:
8. The radar anti-spoofing system of claim 1, wherein the Doppler-frequency velocity is determined by:
9. The radar anti-spoofing system of claim 1, wherein the thresholding technique includes selecting a threshold range of values for the adjusted SNR measure that capture a mismatch between an SNR and the range measurement that is created by the ghost object.
10. The radar anti-spoofing system of claim 1, wherein the thresholding technique includes selecting a threshold range of values for the velocity-ratio measure to capture a mismatch between the motion-based velocity and the Doppler-frequency velocity created by the ghost object.
11. The radar anti-spoofing system of claim 1, wherein the ghost objects are produced by reciprocity-based spoofing.
12. A method for identifying ghost objects produced by reciprocity-based spoofing by a radar anti-spoofing system for an autonomous vehicle, the method comprising: determining, by a controller, time-matched clusters that represent objects located in an environment surrounding the autonomous vehicle based on a plurality of input detection points generated by a plurality of radar sensors; determining, by the controller, an adjusted SNR measure for a specific time-matched cluster by dividing an SNR of the specific time-matched cluster by a range measurement of the specific time-matched cluster; determining a motion-based velocity of the time-matched cluster based on a motion vector of the time-matched cluster; determining a Doppler-frequency velocity of the time-matched cluster; determining a velocity-ratio measure of the time-matched cluster by dividing the motion-based velocity by the Doppler-frequency velocity; and identifying the time-matched cluster as either a ghost object or a real object by a thresholding technique based on the values of the adjusted SNR measure and the velocity-ratio measure.
13. The method of claim 12, wherein the method further comprises: executing a clustering algorithm to divide the plurality of input detection points from the plurality of radar sensors into a plurality of clusters.
14. The method of claim 13, wherein the clustering algorithm is a fuzzy c-mean clustering algorithm.
15. The method of claim 13, wherein the method further comprises: merging close clusters of the plurality of clusters together with one another to create a plurality of merged clusters, wherein a close cluster is determined based on a minimum distance between the plurality of clusters.
16. The method of claim 15, wherein the method further comprises: matching cluster centers in one detection frame with cluster centers in a next detection frame for the plurality of merged clusters based on a nearest neighbor technique to determine the time-matched clusters.
17. The method of claim 12, wherein the method further comprises determining the motion-based velocity by:
18. The method of claim 12, wherein the method further comprises determining the Doppler-frequency velocity by:
19. The method of claim 12, wherein the thresholding technique includes selecting a threshold range of values for the adjusted SNR measure that capture a mismatch between an SNR and the range measurement that is created by the ghost object.
20. The method of claim 12, wherein the thresholding technique includes selecting a threshold range of values for the velocity-ratio measure to capture a mismatch between the motion-based velocity and the Doppler-frequency velocity created by the ghost object.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0027] The drawings described herein are for illustration purposes only and are not intended to limit the scope of the present disclosure in any way.
[0028]
[0029]
[0030]
[0031]
DETAILED DESCRIPTION
[0032] The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses.
[0033] Referring to
[0034] As seen in
[0035]
[0036]
[0037] where w.sub.ij represents the degree that a single detection point p.sub.i is in a cluster c.sub.j and m is a hyper-parameter that controls a degree of fuzziness of the cluster. The value of w.sub.ij is in the range of [0, 1] and the hyper-parameter m is greater than 1.0, and in embodiments is set to 2.0.
[0038] It is to be appreciated that the set of input detection points P is created by randomly partitioning the input detection points 44, and an objective function is executed by the clustering module 70 to optimize the clustering of the input detection points P. In one embodiment, the objective function is expressed in Equations 2 and 3 as:
[0039] Continuing to refer to
[0040] The matching module 74 receives the merged clusters 82 as input and matches cluster centers in one detection frame with cluster centers in a next detection frame based on a nearest neighbor technique to determine the time-matched clusters 84 that represent objects in the environment. In an embodiment, the matching module 74 determines matching candidate clusters for a set of clusters C.sub.t with respect to time for a given size of a neighborhood nb_sz based on Equation 4, which is:
nb.sub.i={c.sub.t-1(j)∈C.sub.t-1:∥c.sub.t(i)−c.sub.t-1(j)∥≤nb_sz} Equation 4
where C.sub.t={c.sub.t(i)}.sub.i=1.sup.n and C.sub.t-1={C.sub.t-1(j)}.sub.j=1.sup.m are two sets of clusters computed from the detection frames at time t and time t−1, respectively. The time-matched clusters 84 are based on determining an argument of the minimum value between the SNR between the two sets of clusters computed from the detection frames at time t and time t−1, respectively, and is expressed in Equation 5 as
where SNR.sub.c.sub.
[0041] Referring back to
where M.sub.snr (i) is the adjusted SNR measure 62, sNR.sub.c.sub.
[0042] The first velocity computation block 54 determines the motion-based velocity 64 of the time-matched cluster 84 based on a motion vector of the time-matched cluster 84. In an embodiment, the motion vector of the cluster c.sub.t(i) is expressed as mv(i)=(m.sub.x(i), m.sub.y(i), m.sub.z(i)), and the motion-based velocity 64 is determined by Equation 7:
where V.sub.mt(i) represents the motion-based velocity and dt is the time difference between two adjacent detection frames.
[0043] The second velocity computation block 56 determines a Doppler-frequency velocity 66 of the time-matched cluster 84 based on Equation 8, which is:
where V.sub.dp(i) is the Doppler-frequency velocity 66, C is the speed of light, f.sub.0 is the carrier frequency; and f.sub.d(i) is the Doppler frequency of cluster c.sub.t(i), which is calculated by the object detection block 34. Specifically, the object detection block 34 uses the amplitudes of RF signals to detect target points and frequency difference (frequency shifts) to calculate the Doppler frequency for the input detection points 44.
[0044] The velocity-ratio block 58 determines the velocity-ratio measure 68 of the time-matched cluster 84 by dividing the motion-based velocity 64 by the Doppler-frequency velocity 66, and is expressed in Equation 9 as:
where M.sub.v(i) is the motion-based velocity 64.
[0045] Continuing to refer to
where (η.sub.1,η.sub.2,β.sub.1,β.sub.2) represent threshold values that are determined based on a statistical analysis of real application data. In an embodiment, η.sub.1=0, η.sub.2=0.25, β.sub.1=0, and β.sub.2=4.0. If (c.sub.t)=1, c.sub.t is a ghost object, and if g(c.sub.t)=0, c.sub.t is a real object.
[0046]
[0047] In block 204, the adjusted SNR block 52 determines the adjusted SNR measure 62 for a specific time-matched cluster 84 by dividing the SNR of the specific time-matched cluster 84 by the range measurement of the time-matched cluster 84. The method 200 may then proceed to block 206.
[0048] In block 206, the first velocity computation block 54 determines the motion-based velocity 64 of the time-matched cluster 84 based on a motion vector of the time-matched cluster as described in Equation 7 above. The method 200 may then proceed to block 208.
[0049] In block 208, the second velocity computation block 56 determines the Doppler-frequency velocity 66 of the time-matched cluster 84 based on Equation 8, which is described above. It is to be appreciated that although block 204, 206, and 208 are shown in sequential order, the blocks 204, 206, and 208 may be computed at the same time based on parallel computation. The method 200 may then proceed to block 210.
[0050] In block 210, the velocity-ratio block 58 determines the velocity-ratio measure 68 of the time-matched cluster 84 by dividing the motion-based velocity 64 by the Doppler-frequency velocity 66. The method 200 may then proceed to block 212.
[0051] In block 212, the identification block 60 identifies each time-matched cluster 84 as either a ghost object 88 or a real object 90 by a thresholding technique based on the values of the adjusted SNR measure 62 and the velocity-ratio measure. The method 200 may then terminate or return to block 202.
[0052] Referring generally to the figures, the disclosed radar anti-spoofing system provides various technical effects and benefits for mitigating reciprocity-based sensor spoofing using real-time computation. Specifically, the radar anti-spoofing system provides an effective approach for identifying ghost objects by computing two identification measures for detected object, namely the adjusted SNR measure and the velocity-ratio measure. When simulating reciprocity-based sensor spoofing, the disclosed radar anti-spoofing system produced an average classification accuracy of 92.3% in identifying ghost objects over 760 detection frames. Thus, the disclosed radar anti-spoofing system is effective in identifying ghost objects using reciprocity-based sensor spoofing.
[0053] The controllers may refer to, or be part of an electronic circuit, a combinational logic circuit, a field programmable gate array (FPGA), a processor (shared, dedicated, or group) that executes code, or a combination of some or all of the above, such as in a system-on-chip. Additionally, the controllers may be microprocessor-based such as a computer having a at least one processor, memory (RAM and/or ROM), and associated input and output buses. The processor may operate under the control of an operating system that resides in memory. The operating system may manage computer resources so that computer program code embodied as one or more computer software applications, such as an application residing in memory, may have instructions executed by the processor. In an alternative embodiment, the processor may execute the application directly, in which case the operating system may be omitted.
[0054] The description of the present disclosure is merely exemplary in nature and variations that do not depart from the gist of the present disclosure are intended to be within the scope of the present disclosure. Such variations are not to be regarded as a departure from the spirit and scope of the present disclosure.