Cyber-physical Security Analysis of Teleoperated Autonomous Road Vehicles
dc.contributor.author | Ghosh, Subhadip | |
dc.contributor.advisor | Hong, Junho | |
dc.date.accessioned | 2024-07-09T20:14:51Z | |
dc.date.issued | 2024-12-20 | |
dc.date.submitted | 2024-04-25 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/194073 | |
dc.description.abstract | Automated road vehicles, commonly known as autonomous vehicles (AV) is a revolutionary step for next generation mobility services on public roads. The primary mission of AV is to improve safety and convenience in road transportation by deploying automated technology for the vehicle-driving tasks. Such automated technology comprises of various sensors, software, and hardware to receive vehicleâs mission, perceive the surrounding road environment, localize the vehicleâs position, plan the route, make decision on driving maneuvers and finally performing the driving actions. Teleoperated driving (ToD) for road vehicles, also known as remotely operated road vehicles (RORV) has originated to handle the corner case of AV with a driver-in-loop from a remote operating station. For such a system, the teleoperator can remotely control the steering, acceleration, and braking action of the vehicle. To perform these tasks, teleoperated vehicles require interaction with the operating environment using perception sensors, localization sensors and cellular communication. Though AV and ToD are considered promising technologies to reshape the mobility landscape for public roads, they also transform the road vehicles from physical systems to cyber-physical systems and introduce new categories of challenges. Cyber-physical threats of AV and ToD is one of the critical areas as it can compromise safety and operational capability of future mobility.Therefore, research on methods for security analysis specific to AV and ToD is necessary. This dissertation conducts the research focusing on this area by analyzing threat models, attack model and detection model by following systems theory approach, knowledge of the context and physical system and machine learning (ML) algorithm.⢠First, threat modeling of AV perception system is created using two approaches. First approach follows the standard 21434, jointly developed by International Organization for Standardization (ISO) and Society of Automotive Engineers (SAE). The second approach follows the method of systems theoretic process analysis for security known as STPA-Sec. Next, a comparative study is done between the output of aforementioned ISO/SAE 21434 and STPA-Sec based threat models. In the final step, an integrated approach is proposed for object-focused impact rating and feasibility analysis of artificial intelligence (AI) based perception system for AV.⢠Second, a threat model for ToD is created with the attack-tree based approach. Based on high-risk attacks, an attack model with false data injection on steering control command is created.⢠Third, to detect such attack Physics-based Context-aware Anomaly Detection System (PCADS) is proposed and presented with results.The outcome of this research highlights the importance of developing a cyber-physical security framework for teleoperated AVs. Moreover, with thorough analysis of the experimental results, this dissertation recommends potential future steps to assist in fostering research direction for cyber-physical security of such systems. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Cyber-physical security | en_US |
dc.subject | Teleoperated vehicle | en_US |
dc.subject | Autonomous vehicle | en_US |
dc.subject | Threat model | en_US |
dc.subject | ISO21434 | en_US |
dc.subject | Physics-based | en_US |
dc.subject | Context-aware | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | AI robustness | en_US |
dc.subject | LSTM | en_US |
dc.subject.other | Automtive Systems and Mobility | en_US |
dc.title | Cyber-physical Security Analysis of Teleoperated Autonomous Road Vehicles | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | Doctor of Engineering (DEng) | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Kwon, Jaerock | |
dc.contributor.committeemember | Kim, Youngki | |
dc.contributor.committeemember | Lee, Hyojong | |
dc.identifier.uniqname | subhagh | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/194073/1/Ghosh_Dissertation_Cyber_Physical_Security.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/23518 | |
dc.description.mapping | 7ac3971d-80a3-46ec-9b3a-ce127eb82b2c | en_US |
dc.identifier.orcid | 0000-0001-5668-565X | en_US |
dc.description.filedescription | Description of Ghosh_Dissertation_Cyber_Physical_Security.pdf : Dissertation | |
dc.working.doi | 10.7302/23518 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.