
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | February 22, 2021 |
Latest Amendment Date: | May 8, 2023 |
Award Number: | 2035770 |
Award Instrument: | Standard Grant |
Program Manager: |
Phillip Regalia
pregalia@nsf.gov (703)292-2981 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | March 1, 2021 |
End Date: | February 28, 2025 (Estimated) |
Total Intended Award Amount: | $476,490.00 |
Total Awarded Amount to Date: | $524,490.00 |
Funds Obligated to Date: |
FY 2022 = $16,000.00 FY 2023 = $16,000.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
1109 GEDDES AVE STE 3300 ANN ARBOR MI US 48109-1015 (734)763-6438 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
4901 Evergreen Dearborn MI US 48128-2406 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
Special Projects - CNS, Secure &Trustworthy Cyberspace |
Primary Program Source: |
01002122DB NSF RESEARCH & RELATED ACTIVIT 01002223DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Connected autonomous vehicles (AVs) may offer new mobility options to millions of people. Integration of connectivity features into modern vehicles is a main driving force behind the ever-expanding attack surface of connected AVs, rendering them vulnerable to hacking and data theft. Key vulnerabilities arise from the increased coupling of unsecured automotive control networks with multimedia networks and the integration of wireless interfaces such as Bluetooth and Wi-Fi networks. As such, developing robust and reliable solutions to identify, localize, and mitigate cybersecurity threats to connected AVs is of societal importance. Existing solutions, however, are limited in their ability and scope as they are unable to reliably link the received data to the transmitting devices. The goal of this project is to safeguard AVs against growing attack surfaces and vectors by developing a holistic solution called the Linking2Source framework through three seamlessly integrated layers of defense, with each layer aiming to mitigate a specific set of attacks. The project also has a significant educational component, consisting of a set of inquisitive hands-on activities involving vehicle data acquisition, decoding, and data analytics, network packet injection, and intrusion detection aimed at outreach and broadening participation in STEM disciplines, including automotive cybersecurity, cyber-physical system security, statistical data analysis and digital forensics.
The first layer of the proposed Linking2Source framework aims to protect in-vehicle networks by developing real-time message authentication, intrusion detection, and localization tools based on unclonable signal attributes for physical fingerprinting of electronic control units (ECUs). The approach exploits uniqueness in physical signal attributes, leverages statistical signal processing and parameter modeling techniques for physical fingerprint estimation, and uses statistical machine learning methods for transmitting ECU identification and localization. The second layer aims to protect in-vehicle networks against firmware/software-level attacks using ECU behavioral fingerprinting through data-driven statistical graph analytics. The approach targeted by the research team here is the transformation of sequential in-vehicle network data into a directed-graph to leverage statistical graph analytics for ECU behavior modeling and intrusion detection. The third layer of defense aims to protect AVs against attacks at the sensing and actuation layer by using dynamical observers that rely on vehicle-physics-based modeling for fault detection and isolation. The faulty signals such as incorrect steering angle commands that are issued by the rogue ECUs and are not in agreement with the vehicle physics could cause unsafe maneuvers such as excessive yaw motions. The project exploits the physics-based vehicle model for verifying the correctness of the issued ECU signals over the in-vehicle network bus. By leveraging the Dempster-Shafer evidence theory, the decisions from these layers of defense are optimally fused to integrate the three defense solutions in the Linking2Source framework. A key component of this project is to use in-vehicle network data both at the physical and datalink layers for modeling physical, behavioral, and vehicle-state fingerprints and using them for attack detection and localization and mitigation of the impact of malicious ECUs using a proactive cancellation policy. The research team will prototype the proposed solutions and evaluate them on the University of Michigan-Dearborn shuttle, on the University of Michigan MCity Test Facility, and on commercial tools, in addition to collecting large-scale data from a network testbed and from a real vehicle driving and sharing it with the research community.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.