Joint Sensing and Communications and Timing-based Attacks for HATS
This initial project will seek to understand the formulation for timing security in highly automated transportation systems (HATS). Position and Navigation security, both from the perspective of attack modeling and defense mechanism are farther along in the research community than Timing security in HATS. The research team's goal is to tackle the grand objective of closing this gap. Specifically, the team will consider timing attacks that can render state estimation and communication in HATS that can potentially result in safety incidents in addition to loss of reliability and data privacy. The research team will take a foundational approach to this problem, considering outside and insider attacks towards capturing and manipulating timing information in state estimation and communication. This will provide guidance on communication and coding policies that then will be applied to use cases relevant in CARMEN+. Brief specifics follow. Timing information is crucial in HATs, in a variety of enabling technologies, methodologies and use cases including in localization and situation awareness in cooperative autonomous driving. This project will define the cybersecurity attack surface created by the crucial timing information. The identification and classification of attacks are comprehensive, though we shall focus safety in connected vehicular networks. In this project, research team will investigate the use of timing signals and timing information to enable safe connected highly automated vehicular networks. These networks have to utilize timing information in wide ranging scales from incorporating situational awareness into autonomous/automated driving actions (eg for accident prevention) (micro or millisecond time scale) to cooperative routing (seconds or more). the research team will tabulate the new attack surfaces that can results in these scenarios due to: external unintended factors (eg interference on communication signals); malicious external attackers (eg jamming timing signals, poisoning timing signals); internal (eg a vehicle in a platoon) attacks.
- Record URL:
Language
- English
Project
- Status: Active
- Funding: $123612
-
Contract Numbers:
69A3552348327
-
Sponsor Organizations:
Office of the Assistant Secretary for Research and Technology
University Transportation Centers Program
Department of Transportation
Washington, DC United States 20590 -
Managing Organizations:
Center for Automated Vehicle Research with Multimodal Assured Navigation
Ohio State University
Columbus, OH United States 43210 -
Project Managers:
Kline, Robin
-
Performing Organizations:
Ohio State University, Columbus
Center for Automotive Research
Columbus, OH United States 43210 -
Principal Investigators:
Yener, Aylin
- Start Date: 20240801
- Expected Completion Date: 20250831
- Actual Completion Date: 0
- USDOT Program: University Transportation Centers
Subject/Index Terms
- TRT Terms: Autonomous vehicles; Computer security; Information infrastructure and data; Integrated systems; Mobile communication systems; Safety and security; Sensors
- Subject Areas: Data and Information Technology; Highways; Vehicles and Equipment;
Filing Info
- Accession Number: 01937745
- Record Type: Research project
- Source Agency: Center for Automated Vehicle Research with Multimodal Assured Navigation
- Contract Numbers: 69A3552348327
- Files: UTC, RIP
- Created Date: Nov 21 2024 4:27PM