Repository logo
 

SAE J1939-specific cyber security for medium and heavy-duty vehicles

dc.contributor.authorMukherjee, Subhojeet, author
dc.contributor.authorPartridge, Craig, advisor
dc.contributor.authorDaily, Jeremy, advisor
dc.contributor.authorGersch, Joseph, committee member
dc.contributor.authorBradley, Thomas, committee member
dc.date.accessioned2023-06-01T23:55:45Z
dc.date.available2023-06-01T23:55:45Z
dc.date.issued2023
dc.description.abstractMedium and heavy-duty (MHD) vehicles are part of the US critical infrastructure. In modern MHD vehicles, mechanical operations are regularly controlled by interconnected networks of electronic control units (ECU). Communication within and across these networks is typically governed by the SAE J1939 standards. It has been established that similar to their lighter counterparts (passenger vehicles), MHD vehicles expose remote and physically accessible interfaces through which arbitrary messages can be sent to ECUs with the intent to control and/or disrupt the vehicle's functions. For physical transport of information between ECUs, SAE J1939 utilizes the Controller Area Network (CAN) protocol. CAN is used extensively for in-passenger vehicle communication and its security features have been analyzed frequently. Albeit, the same cannot be said about SAE J1939. As such, in this dissertation, we investigate security methods for MHD vehicles that utilize specifics of SAE J1939. First, we research cyber-attacks that exploit weaknesses in the SAE J1939 standards. Along with the known attacks from related literature, these help in enhancing the current threatscape. Next, we research network-based security solutions that make use of SAE J1939 specifications. Prior work on in-vehicle security identifies the necessity for a multi-layered security solution that can raise alarms even if the attack cannot be completely prevented. As such, we provide security in two layers. In the first layer, we try to detect an ongoing attack and raise alarms. The method is designed to function in an online manner in the dynamic networking environment within an MHD vehicle. In the second layer, we try to identify attacker-injected messages using user-provided rules in real time as the message is being transmitted. The method is designed to classify a message (e.g. a command to unlock a door) as benign or malicious based on features other than its content (e.g. whether the vehicle is in motion).
dc.format.mediumborn digital
dc.format.mediumdoctoral dissertations
dc.identifierMukherjee_colostate_0053A_17597.pdf
dc.identifier.urihttps://hdl.handle.net/10217/236641
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2020-
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectdenial-of-service attack
dc.subjectintrusion prevention system
dc.subjectSAE J1939
dc.subjectintrusion detection system
dc.subjectcontroller area network
dc.subjectmedium and heavy duty vehicles
dc.titleSAE J1939-specific cyber security for medium and heavy-duty vehicles
dc.typeText
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy (Ph.D.)

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mukherjee_colostate_0053A_17597.pdf
Size:
21.15 MB
Format:
Adobe Portable Document Format