Show simple item record

Multilayered Framework for Securing Connected Autonomous Vehicle

dc.contributor.authorRefat, Rafi Ud Daula
dc.contributor.advisorMalik, Hafiz
dc.date.accessioned2023-08-02T18:34:38Z
dc.date.issued2023-08-22
dc.date.submitted2023-07-19
dc.identifier.urihttps://hdl.handle.net/2027.42/177443
dc.description.abstractConnected autonomous vehicles (CAVs) hold the promise of not only enhancing functional safety but also improving mobility and the efficiency of transportation systems. The CAV is a cyber-physical system (CPS) that contains many networked electronic control units (ECUs), sensors, actuators, wireless interfaces, and an advanced driver assistant system (ADAS). Just like other CPS, CAVs rely on data gathered from the sensors, actuators, and software for critical decisionmaking to enhance efficiency, reliability, safety, and functionality. Besides, CAVs utilize connectivity to improve drivers’ and passengers’ experience by integrating built-in wireless interfaces like WiFi, Bluetooth, etc. The growing connectivity feature of modern vehicles is marking them more vulnerable to cyberattacks. Many researchers have successfully exploited the remote connectivityinduced attack surface. According to the recent industry report (1) on cyberattacks on CAVs indicated that more than 700 incidents were reported targeting vehicular systems between 2010-2020. Among them, in 27.63% of these incidents, attackers tried to control or manipulate the vehicle which could jeopardize passenger safety. Based on the literature, several intrusion detection-based solutions have been proposed to detect attacks on CAVs. While the solutions are effective against a certain range of attack vectors, they are limited in scope and effectiveness. For instance, existing solutions are unable to localize the attack. In addition, existing state-of-the-art require thousands of in-vehicular network (IVN) packets for intrusion detection. It is therefore important to develop reliable, robust, and real-time security solutions to safeguard CAVs by mitigating emerging cyber threats. This dissertation aims to address the aforementioned cybersecurity challenges of CAVs by developing a robust and reliable framework to safeguard against attacks at different points through a multi-layered framework. Each layer of the proposed solution aims at neutralizing cyberattacks on in-vehicle networks by breaking some critical links in the attack chain. The first layer of the proposed framework aims to protect IVNs by developing a sender identification algorithm that utilizes the unclonable signal attributes to fingerprint transmitting ECUs. The proposed framework is novel and efficient that leverages the uniqueness of physical signals to create images and uses a deep learning algorithm for attack detection and localization. The second layer aims to protect IVNs against firmware attacks using ECU behavioral fingerprinting through a data-driven graph theory-based approach. The proposed methodology takes advantage of a huge amount of IVN data to model the normal behavior of the network by using graph analytics and develops a network monitoring system to detect unusual behavior created by attackers. The effectiveness of the proposed multilayered framework is evaluated by conducting a series of experiments using bench testing and as well on vehicular public data. The experimental results suggest that the proposed multilayered framework is capable of detecting IVN message injection attacks with higher accuracy and can reliably localize the attacker on the network. Additionally, the thesis hypothesis and solution were validated by conducting market research through active participation in both the regional and final programs of the National Science Foundation (NSF) I-Corps. In the future, I plan to build a prototype of the proposed framework and deploy it in actual vehicles for rigorous field-testing.en_US
dc.language.isoen_USen_US
dc.subjectAutomotive cybersecurityen_US
dc.subjectArtificial intelligenceen_US
dc.subjectMachine learningen_US
dc.subjectIn-vehicle network securityen_US
dc.subjectDeep learningen_US
dc.subject.otherElectrical, Electronics, and Computer Engineeringen_US
dc.titleMultilayered Framework for Securing Connected Autonomous Vehicleen_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineCollege of Engineering & Computer Scienceen_US
dc.description.thesisdegreegrantorUniversity of Michigan-Dearbornen_US
dc.contributor.committeememberBacha, Anys
dc.contributor.committeememberMohammadi, Alireza
dc.contributor.committeememberRawashdeh, Samie
dc.identifier.uniqname0353 0940en_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/177443/1/Rafi Ud Daula Refat Final Dissertation.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/7997
dc.identifier.orcid0000-0003-3812-3244en_US
dc.description.filedescriptionDescription of Rafi Ud Daula Refat Final Dissertation.pdf : Dissertation
dc.identifier.name-orcidRefat, Rafi Ud Daula; 0000-0003-3812-3244en_US
dc.working.doi10.7302/7997en_US
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.