Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

You searched for +publisher:"Rochester Institute of Technology" +contributor:("Hrishikesh Acharya"). One record found.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Rochester Institute of Technology

1. Ameri, Aidin. Adding Security to Control Area Network of Vehicles by Using SHA-3.

Degree: MS, Department of Computing Security (GCCIS), 2017, Rochester Institute of Technology

The lack of security in the vehicles on the road is real and should be taken seriously. Since the lifespan of vehicles has average of eleven years, this means if we start to implement new changes to vehicles today, it would takes eleven years to make sure most vehicles on the road support our implementation. This is important as the number of lines of codes in vehicles are ever increasing and becoming more autonomous with the ability for vehicles to drive themselves. But there is no security implemented in their low level systems such as the Control Area Network which is being used to transfer real time critical information and commands such as engine speed and the brake control. This project attempts to solve the lack of secruity by using SHA3 hashing algorithm based on the Keceak algorithm. The reason Keceak was chosen to be the SHA3 algorithm because it is hardware friendly and fast. Vehicle's manufacturers do not share information about the electrical parts used in the vehicles and their specification, this project presents the lowest hardware specification required to use SHA3 on the Control Area Network which is a process with a clock frequency of approximately 400 MHz. It is important to have a real-time communication network for the Control Area Network which also known as CAN. SHA3 is used to create a hash of the CAN message along with a node specific key and an IV to provide authentication and semantic security respectively; The digest will be transferred along with the message. To use the mechanism proposed in this project, all CAN nodes communicate with each other required to support CAN FD and also have the minimum hardware specification. Advisors/Committee Members: Sumita Mishra, Hrishikesh Acharya.

Subjects/Keywords: Vehicles; Computing security; Control area network; CAN FD; SHA3; Keccak

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ameri, A. (2017). Adding Security to Control Area Network of Vehicles by Using SHA-3. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9421

Chicago Manual of Style (16th Edition):

Ameri, Aidin. “Adding Security to Control Area Network of Vehicles by Using SHA-3.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed October 15, 2019. https://scholarworks.rit.edu/theses/9421.

MLA Handbook (7th Edition):

Ameri, Aidin. “Adding Security to Control Area Network of Vehicles by Using SHA-3.” 2017. Web. 15 Oct 2019.

Vancouver:

Ameri A. Adding Security to Control Area Network of Vehicles by Using SHA-3. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2019 Oct 15]. Available from: https://scholarworks.rit.edu/theses/9421.

Council of Science Editors:

Ameri A. Adding Security to Control Area Network of Vehicles by Using SHA-3. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9421

.