Sensor Data Integrity Verification for Real-time and Resource Constrained Systems
dc.contributor.author | Changalvala, Raghavendar | |
dc.contributor.advisor | Malik, Hafiz | |
dc.date.accessioned | 2021-05-10T20:27:05Z | |
dc.date.issued | 2021-08 | |
dc.date.submitted | 2021-04-08 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/167387 | |
dc.description.abstract | Sensors are used in multiple applications that touch our lives and have become an integral part of modern life. They are used in building intelligent control systems in various industries like healthcare, transportation, consumer electronics, military, etc. Many mission-critical applications require sensor data to be secure and authentic. Sensor data security can be achieved using traditional solutions like cryptography and digital signatures, but these techniques are computationally intensive and cannot be easily applied to resource constrained systems. Low complexity data hiding techniques, on the contrary, are easy to implement and do not need substantial processing power or memory. In this applied research, we use and configure the established low complexity data hiding techniques from the multimedia forensics domain. These techniques are used to secure the sensor data transmissions in resource constrained and real-time environments such as an autonomous vehicle. We identify the areas in an autonomous vehicle that require sensor data integrity and propose suitable water-marking techniques to verify the integrity of the data and evaluate the performance of the proposed method against different attack vectors. In our proposed method, sensor data is embedded with application specific metadata and this process introduces some distortion. We analyze this embedding induced distortion and its impact on the overall sensor data quality to conclude that watermarking techniques, when properly configured, can solve sensor data integrity verification problems in an autonomous vehicle. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Autonomous driving sensor data integrity | en_US |
dc.subject | QIM | en_US |
dc.subject | LiDAR data watermarking | en_US |
dc.subject | RADAR data watermarking | en_US |
dc.subject | Sensor fingerprinting | en_US |
dc.subject.other | Electrical Engineering | en_US |
dc.title | Sensor Data Integrity Verification for Real-time and Resource Constrained Systems | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Bacha, Anys | |
dc.contributor.committeemember | Prajapati, Ashok | |
dc.contributor.committeemember | Rawashdeh, Samir | |
dc.contributor.committeemember | Xiang, Weidong | |
dc.identifier.uniqname | rchangal | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/167387/3/Raghavendar Changalvala Final Dissertation.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/1062 | |
dc.identifier.orcid | 0000-0001-5665-2401 | en_US |
dc.description.filedescription | Description of Raghavendar Changalvala Final Dissertation.pdf : Dissertation | |
dc.identifier.name-orcid | Changalvala, Raghu; 0000-0001-5665-2401 | en_US |
dc.working.doi | 10.7302/1062 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.