Label Hijacking in Track Consensus-Based Distributed Multi-Target Tracking

This paper identifies and formalizes a new "label hijacking" vulnerability in track-consensus-based distributed multi-target tracking systems, where adversaries can exploit spoofed tracks to corrupt target identities across the network, thereby highlighting the critical need for enhanced robustness at the consensus layer.

Helena Calatrava, Shuo Tang, Pau Closas

Published 2026-03-06
📖 4 min read☕ Coffee break read

Imagine a group of friends (sensors) trying to keep track of a busy party. They are all standing in different corners of a large room, and they can only see a small slice of the room in front of them. To know where everyone is, they constantly shout updates to each other: "I see a guy in a red shirt near the door!" or "There's a woman in a blue dress by the window!"

They use a special rulebook to agree on who is who. If two friends see someone close to each other, they assume it's the same person and give them a shared name tag (a "label"). This is how Distributed Multi-Target Tracking (DMTT) works in the real world, used by everything from air traffic control to self-driving cars.

The Problem: The "Name Tag" Mix-up

The paper explains that this system has a hidden weakness. Because the friends can't see the whole room, they sometimes disagree on who is who. To fix this, they recently started using a "Track Consensus" system. This system says: "If two tracks look close enough physically, we must agree they are the same person and give them the same name."

The researchers discovered that a hacker can exploit this rule to perform a "Label Hijacking" attack.

The Attack: The Great Identity Theft

Think of the attack like a masterful case of identity theft at a party, involving three characters:

  1. The Victim: A real person the group is tracking (e.g., a VIP guest).
  2. The Impostor: A bad guy (or a drone) the hacker controls.
  3. The Spy: A corrupted sensor that the hacker has taken over.

Here is how the hacker pulls off the heist in three smooth moves:

Stage 1: The "Look-Alike" (Mimicry)

The hacker watches the VIP (the Victim) and the Impostor. The hacker uses the Spy sensor to send a fake report about a "ghost" person. This ghost person walks exactly like the VIP for a few seconds. Because they are so close, the group's rulebook says, "Oh, that's the VIP!" and gives the ghost the VIP's name tag.

Stage 2: The "Disappearing Act" (The Pull-Off)

Now, the VIP walks into a blind spot (a dark corner no one can see). The hacker stops sending updates about the VIP. But the "ghost" person (the fake track) is still out in the open.
Since the VIP is gone, the group has no one else to compare the ghost to. The ghost is now the only person with the VIP's name tag. The hacker can now make the ghost walk anywhere—maybe even toward the Impostor—while still wearing the VIP's name tag.

Stage 3: The "Handover" (Injection)

The Impostor (the bad guy) walks into the room. The hacker guides the ghost to walk right up next to the Impostor. Because they are close, the group's rulebook says, "These two are the same person!"
Since the ghost has been wearing the VIP's name tag for a while, the group decides the Impostor is now the VIP.
Result: The real VIP is now tracked as a stranger with a new name, and the bad guy (Impostor) is now being tracked as the VIP. The group thinks they are protecting the VIP, but they are actually following the bad guy.

The "Stealth" Version

The paper shows two ways to do this:

  1. The "Hard Switch": The ghost suddenly vanishes and reappears next to the Impostor. It's like a magician popping out of a box. It works, but it looks suspicious because people don't teleport.
  2. The "Stealth" Attack (The Paper's Main Contribution): The hacker uses a smart computer algorithm (called Model Predictive Control) to make the ghost move smoothly. The ghost glides from the VIP's path to the Impostor's path, making a perfect, smooth curve. It looks so natural that even if someone checks, "Does this movement make sense?" the answer is yes. It's like a spy smoothly blending into a crowd rather than jumping over a fence.

Why This Matters

The researchers found that current security systems check if the data is correct, but they don't check if the identity is being stolen. They rely too much on "Are these two people close enough to be the same?" without asking, "Is this person moving in a way that makes sense?"

The Takeaway:
In a world where self-driving cars and drones talk to each other to avoid crashes, a hacker doesn't need to break the car's engine. They just need to trick the group into thinking the bad guy is the good guy. This paper warns us that we need to build better "identity guards" into these systems so that even if a hacker tries to swap name tags, the system catches the switch.