Skip to feedback

Award Abstract # 2035770
SaTC: CORE: Small: Linking2Source: Security of In-Vehicle Networks via Source Identification

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: REGENTS OF THE UNIVERSITY OF MICHIGAN
Initial Amendment Date: February 22, 2021
Latest Amendment Date: May 8, 2023
Award Number: 2035770
Award Instrument: Standard Grant
Program Manager: Phillip Regalia
pregalia@nsf.gov
 (703)292-2981
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: March 1, 2021
End Date: February 28, 2025 (Estimated)
Total Intended Award Amount: $476,490.00
Total Awarded Amount to Date: $524,490.00
Funds Obligated to Date: FY 2021 = $492,490.00
FY 2022 = $16,000.00

FY 2023 = $16,000.00
History of Investigator:
  • Hafiz Malik (Principal Investigator)
    hafiz@umich.edu
  • Alireza Mohammadi (Co-Principal Investigator)
Recipient Sponsored Research Office: Regents of the University of Michigan - Ann Arbor
1109 GEDDES AVE STE 3300
ANN ARBOR
MI  US  48109-1015
(734)763-6438
Sponsor Congressional District: 06
Primary Place of Performance: University of Michigan-Dearborn
4901 Evergreen
Dearborn
MI  US  48128-2406
Primary Place of Performance
Congressional District:
12
Unique Entity Identifier (UEI): GNJ7BBP73WE9
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01002324DB NSF RESEARCH & RELATED ACTIVIT
01002122DB NSF RESEARCH & RELATED ACTIVIT

01002223DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 9251, 9178, 7923
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Connected autonomous vehicles (AVs) may offer new mobility options to millions of people. Integration of connectivity features into modern vehicles is a main driving force behind the ever-expanding attack surface of connected AVs, rendering them vulnerable to hacking and data theft. Key vulnerabilities arise from the increased coupling of unsecured automotive control networks with multimedia networks and the integration of wireless interfaces such as Bluetooth and Wi-Fi networks. As such, developing robust and reliable solutions to identify, localize, and mitigate cybersecurity threats to connected AVs is of societal importance. Existing solutions, however, are limited in their ability and scope as they are unable to reliably link the received data to the transmitting devices. The goal of this project is to safeguard AVs against growing attack surfaces and vectors by developing a holistic solution called the Linking2Source framework through three seamlessly integrated layers of defense, with each layer aiming to mitigate a specific set of attacks. The project also has a significant educational component, consisting of a set of inquisitive hands-on activities involving vehicle data acquisition, decoding, and data analytics, network packet injection, and intrusion detection aimed at outreach and broadening participation in STEM disciplines, including automotive cybersecurity, cyber-physical system security, statistical data analysis and digital forensics.

The first layer of the proposed Linking2Source framework aims to protect in-vehicle networks by developing real-time message authentication, intrusion detection, and localization tools based on unclonable signal attributes for physical fingerprinting of electronic control units (ECUs). The approach exploits uniqueness in physical signal attributes, leverages statistical signal processing and parameter modeling techniques for physical fingerprint estimation, and uses statistical machine learning methods for transmitting ECU identification and localization. The second layer aims to protect in-vehicle networks against firmware/software-level attacks using ECU behavioral fingerprinting through data-driven statistical graph analytics. The approach targeted by the research team here is the transformation of sequential in-vehicle network data into a directed-graph to leverage statistical graph analytics for ECU behavior modeling and intrusion detection. The third layer of defense aims to protect AVs against attacks at the sensing and actuation layer by using dynamical observers that rely on vehicle-physics-based modeling for fault detection and isolation. The faulty signals such as incorrect steering angle commands that are issued by the rogue ECUs and are not in agreement with the vehicle physics could cause unsafe maneuvers such as excessive yaw motions. The project exploits the physics-based vehicle model for verifying the correctness of the issued ECU signals over the in-vehicle network bus. By leveraging the Dempster-Shafer evidence theory, the decisions from these layers of defense are optimally fused to integrate the three defense solutions in the Linking2Source framework. A key component of this project is to use in-vehicle network data both at the physical and datalink layers for modeling physical, behavioral, and vehicle-state fingerprints and using them for attack detection and localization and mitigation of the impact of malicious ECUs using a proactive cancellation policy. The research team will prototype the proposed solutions and evaluate them on the University of Michigan-Dearborn shuttle, on the University of Michigan MCity Test Facility, and on commercial tools, in addition to collecting large-scale data from a network testbed and from a real vehicle driving and sharing it with the research community.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 11)
Mohammadi, Alireza and Malik, Hafiz and Abbaszadeh, Masoud "Generation of Wheel Lockup Attacks on Nonlinear Dynamics of Vehicle Traction" 2022 American Control Conference (ACC) , 2022 https://doi.org/10.23919/ACC53348.2022.9867828 Citation Details
Mohammadi, Alireza and Malik, Hafiz and Abbaszadeh, Masoud "Generation of CAN-based Wheel Lockup Attacks on the Dynamics of Vehicle Traction" Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022 , 2022 Citation Details
Mohammadi, Alireza and Malik, Hafiz "Vehicle Lateral Motion Stability Under Wheel Lockup Attacks" Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022 , 2022 Citation Details
Mohammadi, Alireza and Malik, Hafiz "Generation of Time-Varying Impedance Attacks Against Haptic Shared Control Steering Systems" 2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) , 2023 https://doi.org/10.1109/IROS55552.2023.10342459 Citation Details
Elkhail, Abdulrahman Abu and Refat, Rafi Ud Daula and Habre, Ricardo and Hafeez, Azeem and Bacha, Anys and Malik, Hafiz "Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses" IEEE Access , v.9 , 2021 https://doi.org/10.1109/ACCESS.2021.3130495 Citation Details
Elkhail, Abdulrahman Abu and Lachtar, Nada and Ibdah, Duha and Aslam, Rustam and Khan, Hamza and Bacha, Anys and Malik, Hafiz "Seamlessly Safeguarding Data Against Ransomware Attacks" IEEE Transactions on Dependable and Secure Computing , v.20 , 2023 https://doi.org/10.1109/TDSC.2022.3214781 Citation Details
Bellaire, S. and Bayer, M. and Hafeez, A. and Ud Daula Refat, R. and Malik, H. "Fingerprinting ECUs to Implement Vehicular Security for Passenger Safety Using Machine Learning Techniques" IntelliSys 2022: Intelligent Systems and Applications , 2022 https://doi.org/10.1007/978-3-031-16075-2_2 Citation Details
Bellaire, Samuel and Bayer, Matthew and Hafeez, Azeem and Refat, Rafi Ud and Malik, Hafiz "Fingerprinting ECUs to Implement Vehicular Security for Passenger Safety Using Machine Learning Techniques" Intelligence Systems (IntelliSys'22) , 2022 https://doi.org/10.1007/978-3-031-16075-2_2 Citation Details
Refat, R.U.D. and Elkhail, A.A. and Hafeez, A. and Malik, H. "Detecting CAN Bus Intrusion by Applying Machine Learning Method to Graph Based Features" Proceedings of SAI Intelligent Systems Conference , 2021 https://doi.org/10.1007/978-3-030-82199-9_49 Citation Details
Mohammadi, Alirezal and Malik, Hafiz "Vehicle lateral motion stability under wheel lockup attacks" In the Fourth International Workshop on Automotive and Autonomous Vehicle Security (AutoSec@NDSS22) , 2022 Citation Details
Mohammadi, Alireza and Malik, Hafiz and Abbaszadeh, Masoud "Vehicle Lateral Motion Dynamics Under Braking/ABS Cyber-Physical Attacks" IEEE Transactions on Information Forensics and Security , v.18 , 2023 https://doi.org/10.1109/TIFS.2023.3293424 Citation Details
(Showing: 1 - 10 of 11)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page