Show simple item record

An Integrated Approach to Securing In-Vehicle CAN Bus Network Using ECU Fingerprinting and Image Classification Techniques

dc.contributor.authorMohan, Janani
dc.contributor.advisorAzeem Hafeez
dc.contributor.advisorSelim S. Awad
dc.date.accessioned2023-05-02T14:27:52Z
dc.date.available2023-05-02T14:27:52Z
dc.date.issued2023-04-30
dc.identifier.urihttps://hdl.handle.net/2027.42/176344
dc.description.abstractThis paper presents two novel techniques for securing electronic control units (ECUs) in the controller area network (CAN) bus network of autonomous vehicles (AVs). Method 1 proposes an ECU fingerprinting technique to detect malicious ECUs in the in-vehicle CAN bus network. The technique extracts unique digital signatures based on intrinsic characteristics of the ECUs to identify the ECU responsible for broadcasting counterfeit messages received on the CAN bus. The proposed work employs three machine learning (ML) algorithms, namely k-Nearest Neighbors (k-NN), Support Vector Machine (SVM), and Logistic Regression (LR), to analyze the data from seven distinct ECUs. The performance of the proposed cybersecurity framework is evaluated and compared using these algorithms. Method 2 proposes a solution for efficient ECU classification to protect against multiple threats and attacks, including hacking and spoofing attacks, that can be perilous for the vehicle and its occupants. This technique visualizes signal loss and distortion in the ECU voltage signals caused by the ECU position in the CAN bus and utilizes Euclidean distance-based image classification on the principal components. This methodology is based on the commercially feasible eigenface-based algorithm, which has found extensive application in real-time scenarios like face recognition, fingerprint recognition, image recognition in photo-based applications, and real-time object identification. By profiling the ECU using this method, we can make the signal analyzer commercially viable. In this paper, we analyze different ECU configurations in the daisy chain network to evaluate the effectiveness of our proposed method. Our approach achieves a high accuracy rate of 97.14%. The proposed techniques address the security concerns related to the CAN bus network of AVs and provide efficient and effective ways to secure ECUs against malicious activities. The use of machine learning algorithms and visualization techniques in these methods not only enhances the accuracy of ECU detection and classification but also provides a better understanding of the underlying data. These techniques can be implemented in AVs to improve the security of the CAN bus network and ensure safe and secure operation of the vehicles.
dc.languageEnglish
dc.subjectAutomotive cybersecurity
dc.subjectCAN bus
dc.subjectECU fingerprinting
dc.subjectMachine learning
dc.subjectDaisy chain CAN configuration
dc.subjectInfotainment system security
dc.subjectPCA-Based
dc.titleAn Integrated Approach to Securing In-Vehicle CAN Bus Network Using ECU Fingerprinting and Image Classification Techniques
dc.typeThesis
dc.description.thesisdegreenameMaster of Science (MS)en_US
dc.description.thesisdegreedisciplineComputer and Information Science, College of Engineering & Computer Science
dc.description.thesisdegreegrantorUniversity of Michigan-Dearborn
dc.contributor.committeememberXuan Zhou
dc.subject.hlbtoplevelComputer Science
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/176344/1/Janani Mohan Final Thesis.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/7194
dc.identifier.orcid0009-0009-5503-1967
dc.identifier.name-orcidMohan, Janani; 0009-0009-5503-1967en_US
dc.working.doi10.7302/7194en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.