Automotive system consists of multiple subsystems and standalone Electronic Control Units (ECUs) overlooking functionality of each subsystem is gradually replaced by a E/E System Architecture of distributed system of ECUs networked together to fulfil the application requirement. Automotive industry is also adapting and working continuously to meet the regulatory safety standards. With the advent of futuristic innovations like Electric vehicle, Connected car, Self-driving Advanced Driver-Assistance Systems, the complexity of the system, number of ECUs and in-vehicle networking is increasing exponentially. We are working on various problems related to distributed system scheduling, networking, verification and validation with Hardware in Loop (HIL) in the automotive domain.
Automotive system consists of distributed system interconnected by an in-vehicle network with different technologies. Depending upon the routing and the traffic the messages have different latencies. To guarentee the functionality of critical software task it is essential to formally verify the latency to ensure the stability.
A contemporary vehicle can be thought of as a collection of cyber-physical systems (CPS) working together to provide (i) safety and comfort to the occupants, (ii) efficient performance in terms reduced energy consumption and (iii) entertainment as well. However, this have only been possible at cost of more attack surfaces. Ample number of literature can be found where researchers have exploited these attack surfaces to launch denial-of-service , false data injection, replay attacks. We focus on developing verification methods that analyse if automotive CPSs ensure safety in the presence of an adversary.
The safety critical control softwares (for example Vehicle Stability Control , Anti-lock Braking System , Adaptive Cruise Control etc) in a modern-day car need to operate in real time. Moreover, connectivity to internet via various open ports have made these in-vehicle control systems vulnerable to both outside and inside attackers. Due to limited communication bandwidth and light weight nature of the Electronic Control Units (ECU) of a car, it is infeasible to secure every packet transmitted among the ECUs. In such cases, light weight residue-based detectors where anomalies are detected based on some pre-defined threshold, seem a promising solution. However, they suffer from false alarms. We work on designing such light weight intelligent attack detectors leveraging the concept of residue-based detectors that would ensure identification of even small attack effort as well as reduction of false alarm (for example variable threshold-based detector) in distributed automotive CPSs.
Existing research suggests that a huge set of vulnerabilities exist in future connected car (platoon) scenarios which reduces the security of autonomous vehicular maneuvers. Protection primitives are difficult to design since a significant number of automotive engineering issues interplay with each other. To address this problem, we propose developing a multi-layer secure control and monitoring framework for connected vehicles, with the following main objectives.