Show simple item record

Verifying RADAR Data Using Two-Dimensional QIM-based Data Hiding

dc.contributor.authorFedoruk, Brandon
dc.contributor.advisorHafiz Malik
dc.date.accessioned2021-05-04T15:45:05Z
dc.date.available2021-05-04T15:45:05Z
dc.date.issued2021-05-01
dc.identifier.urihttps://hdl.handle.net/2027.42/167354
dc.description.abstractModern vehicles have evolved into supporting advanced internal networks and connecting System Based Chips (SBC), System in a Package (SiP) solutions or traditional micro controllers to foster an electronic ecosystem for high speed data transfers, precision and real-time control. The use of Controller Area Networks (CAN) is widely adopted as the backbone of internal vehicle communication infrastructure. Automotive applications such as ADAS, autonomous driving, battery management systems, power train systems, telematics and infotainment, all utilize CAN transmissions directly or through gateway management. The network transmissions lack robust integrity verification mechanisms to validate authentic data payloads, making it vulnerable to packet replay, spoofing, insertion, deletion and denial of service attacks. Additional methods exist to secure network data such as traditional cryptography. Utilizing this method will increase the computational complexity, processing latency and increase overall system cost. This thesis proposes a robust, light and adaptive solution to validate the authenticity of automotive sensor data using CAN network protocol. We propose using a two-dimensional Quantization Index Modulation (QIM) data hiding technique, to create a means of verification. Analysis of the proposed framework will be conducted in a sensor transmission scenario for RADAR sensors in an autonomous vehicle setting. The detection and effects of distortion on the application are tested through the implementation of sensor fusion algorithms and the results are observed and analyzed. The proposed framework offers a needed capability to maintain transmission integrity without the compromise of data quality and low design complexity. This framework could also be applied to different network architectures, as well as its operational scope could be modified to operate with more abstract types of data.
dc.languageEnglish
dc.subjectSensor networks
dc.subjectRADAR
dc.subjectData integrity
dc.subjectData security
dc.subjectADAS
dc.subjectDigital watermarking
dc.subjectConnected vehicle
dc.titleVerifying RADAR Data Using Two-Dimensional QIM-based Data Hiding
dc.typeThesis
dc.description.thesisdegreenameMaster of Science in Engineering (MSE)en_US
dc.description.thesisdegreedisciplineElectrical Engineering, College of Engineering & Computer Science
dc.description.thesisdegreegrantorUniversity of Michigan-Dearborn
dc.subject.hlbsecondlevelElectrical Engineering
dc.subject.hlbtoplevelEngineering
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/167354/1/Brandon Fedoruk - Final Thesis.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/1029
dc.identifier.orcid0000-0001-8076-4091
dc.identifier.name-orcidFedoruk, Brandon; 0000-0001-8076-4091en_US
dc.working.doi10.7302/1029en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.