Implementing AES and HMAC on automotive embedded electronic units (Record no. 6473)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02395nam a22001937a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220107122849.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 190614b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | IIITMK |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Anusree K Babu (93617007) |
| 9 (RLIN) | 15757 |
| 245 ## - TITLE STATEMENT | |
| Title | Implementing AES and HMAC on automotive embedded electronic units |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | MSC CS 2017-2019 |
| 500 ## - GENERAL NOTE | |
| General note | Autonomous vehicles are becoming an emerging trend in the vehicle industry.<br/>Electronic control units (ECUs) are an embedded system which is used<br/>in vehicles to implement specic functions like braking, engine management,<br/>autonomous driving etc. These ECUs are typically networked inside the vehicle<br/>using in-vehicle wired networking protocols like Ethernet, CAN, LIN,<br/>MOST, FlexRay. Also, these ECUs have the option to communicate with the<br/>outside cellular networks wirelessly. Therefore it is very obvious that in the<br/>absence of proper security measures one can easily hack into the vehicle wired<br/>networking protocol or use the loopholes in the wireless access point to sni<br/>the data exchange between real ECUs. If an attacker gets data transmitting<br/>through the network, they can alter the messages and can take control of the<br/>vehicle. These can lead to many issues including accidents. Thus implementing<br/>a very secure encryption layer into the ECU is very critical. The<br/>proposed work mainly focuses on implementing state of the art security features<br/>inside the automotive embedded ECU. Advanced Encryption Standard<br/>(AES) shall be implemented in order to protect the data from unauthorized<br/>access. Hashed Message Authentication Code (HMAC) is also implemented<br/>in order to provide integrity and authenticity of the data. In conjunction<br/>with these cryptographic methods an intrusion detection scheme is also implemented<br/>so that an alert can be generated whenever an anomaly or intrusion<br/>is detected and thus the vehicle can enter into a safe mode. Python shall be<br/>the programming language used in this project. CAN shall be the networking<br/>protocol used and an automotive grade ECU shall be the host platform. Work<br/>shall also be done for the verication and validation of the methods which are<br/>implemented. |
| 502 ## - DISSERTATION NOTE | |
| Degree type | MSC CS |
| Name of granting institution | 2017-2019 |
| Year degree granted | INT |
| -- | K Pradeep Kumar |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | ELECTRONIC CONTROL UNITS |
| 9 (RLIN) | 15758 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | ADVANCED ENCRYPTION STANDARD |
| 9 (RLIN) | 15759 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | HASHED MESSAGE AUTHENTICATION CODE |
| 9 (RLIN) | 15760 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Non Fiction | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 14/06/2019 | R-1477 | 14/06/2019 | 14/06/2019 | Project Reports |