Secure data collection in telemonitoring autonomous vehicle

In an autonomous vehicle system, a secure communication between vehicles and instruments is critical. Particularly, in a metro or underground communication system, the communication is done through a Supervisory Control and Data Acquisition (SCADA) network system which is purely wired system. This w...

Full description

Saved in:
Bibliographic Details
Main Author: Wibowo, Marcellinus Hendro Adi
Other Authors: Goh Wang Ling
Format: Final Year Project
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/71249
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-71249
record_format dspace
spelling sg-ntu-dr.10356-712492023-07-07T17:04:32Z Secure data collection in telemonitoring autonomous vehicle Wibowo, Marcellinus Hendro Adi Goh Wang Ling School of Electrical and Electronic Engineering A*STAR Institute for Infocomm Research Guo Huaqun DRNTU::Engineering::Electrical and electronic engineering In an autonomous vehicle system, a secure communication between vehicles and instruments is critical. Particularly, in a metro or underground communication system, the communication is done through a Supervisory Control and Data Acquisition (SCADA) network system which is purely wired system. This wired system does not include any wireless connections; hence an outsider attack is very unlikely to happen. Then Gin, this does not imply that the system is safe from attack as an attack could come from insider by sending more command or less command. This attack can be detected by comparing the features extracted from the traffic happening to the heuristic and proper data set. The comparison done is not only by comparing the distribution of the data transferred but also as looking at the correlation between each instrument. The correlation is needed since several instruments might work dependently while others might work independently. Data that are compared in the analysis are the features from of each instrument from the traffic which are number of command transfer, number of handshake transfer, and the ratio of command transferred to the command transfer median from the samples. These three features are then analyzed and the results will show whether there’s an anomaly in certain period. Bachelor of Engineering 2017-05-15T08:44:31Z 2017-05-15T08:44:31Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/71249 en Nanyang Technological University 79 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Wibowo, Marcellinus Hendro Adi
Secure data collection in telemonitoring autonomous vehicle
description In an autonomous vehicle system, a secure communication between vehicles and instruments is critical. Particularly, in a metro or underground communication system, the communication is done through a Supervisory Control and Data Acquisition (SCADA) network system which is purely wired system. This wired system does not include any wireless connections; hence an outsider attack is very unlikely to happen. Then Gin, this does not imply that the system is safe from attack as an attack could come from insider by sending more command or less command. This attack can be detected by comparing the features extracted from the traffic happening to the heuristic and proper data set. The comparison done is not only by comparing the distribution of the data transferred but also as looking at the correlation between each instrument. The correlation is needed since several instruments might work dependently while others might work independently. Data that are compared in the analysis are the features from of each instrument from the traffic which are number of command transfer, number of handshake transfer, and the ratio of command transferred to the command transfer median from the samples. These three features are then analyzed and the results will show whether there’s an anomaly in certain period.
author2 Goh Wang Ling
author_facet Goh Wang Ling
Wibowo, Marcellinus Hendro Adi
format Final Year Project
author Wibowo, Marcellinus Hendro Adi
author_sort Wibowo, Marcellinus Hendro Adi
title Secure data collection in telemonitoring autonomous vehicle
title_short Secure data collection in telemonitoring autonomous vehicle
title_full Secure data collection in telemonitoring autonomous vehicle
title_fullStr Secure data collection in telemonitoring autonomous vehicle
title_full_unstemmed Secure data collection in telemonitoring autonomous vehicle
title_sort secure data collection in telemonitoring autonomous vehicle
publishDate 2017
url http://hdl.handle.net/10356/71249
_version_ 1772826949220040704