Repository logo
 

Towards cybersecurity countermeasures for SAE J1708/1587 network protocol in heavy-duty vehicles

dc.contributor.authorNnaji, David C., author
dc.contributor.authorDaily, Jeremy, advisor
dc.contributor.authorSimske, Steve, committee member
dc.contributor.authorPasricha, Sudeep, committee member
dc.contributor.authorRay, Indrajit, committee member
dc.date.accessioned2022-08-29T10:15:51Z
dc.date.available2024-08-22T10:15:51Z
dc.date.issued2022
dc.description.abstractHeavy vehicles are crucial to a functioning economy and society since they are responsible for delivering people and goods across the country. These systems rely on various forms of in-vehicle communication between electronic control units (ECU) for reliable operation. In recent years, numerous vulnerabilities inherent to unauthenticated in-vehicle communication have been identified in academia, industry, sponsored events, and real-world attacks. Current defensive cybersecurity research is primarily aimed at securing the controller area network (CAN) and other conventional systems. However, little to no defensive research has been conducted on legacy systems, and only recently have state-of-the-art attacks been identified in public disclosures or discussed in published works. Despite the age of the technology, the associated vulnerabilities from legacy networks are likely to persist for many years due to long equipment service life, cost-reluctance from fleets, and powerline bridge standardization. If system-wide security is desired by the industry, proportional research in this field is warranted. In this thesis, I examine the application of simple signature-based and anomaly-based intrusion detection on legacy serial data communication between ECUs in heavy-duty (HD) applications defined in SAE J1708 and J1587 building on previously published work. This is accomplished through the design and development of a prototype network gateway tailored to the requirements defined within the two protocols. Additionally, this thesis contributes the embedded software utility developed for the prototype gateway for open use and validates its functionality through robust unit testing. Ultimately, the intrusion detection system is deployed, tested, and evaluated on a retrofitted dual air brake system simulator (DABSS) managed by Dr. Jeremy Daily at the Powerhouse Energy Institute. An assessment of the effectiveness of the mitigation against four attack scenarios followed by recommendations for improvements and future work are provided in the final chapters.
dc.format.mediumborn digital
dc.format.mediummasters theses
dc.identifierNnaji_colostate_0053N_17253.pdf
dc.identifier.urihttps://hdl.handle.net/10217/235573
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2020-
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.rights.accessEmbargo Expires: 08/22/2024
dc.subjectautomotive cybersecurity
dc.subjectJ1708
dc.subjectPLC4TRUCKS
dc.subjectintrusion detection system
dc.subjectautomotive communication
dc.subjectJ2497
dc.titleTowards cybersecurity countermeasures for SAE J1708/1587 network protocol in heavy-duty vehicles
dc.typeText
dcterms.embargo.expires2024-08-22
dcterms.embargo.terms2024-08-22
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineSystems Engineering
thesis.degree.grantorColorado State University
thesis.degree.levelMasters
thesis.degree.nameMaster of Science (M.S.)

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Nnaji_colostate_0053N_17253.pdf
Size:
8.93 MB
Format:
Adobe Portable Document Format