Publications in 2021 of type Master Thesis
Filter by Year: All, 2022, 2021, 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008,Filter by Type: All, Book, Article, Chapter, Conference Proceedings, Edited Conference Proceedings, Master Thesis, Bachelor Thesis, Technical Report, Miscellaneous,
Filter by Language: All, English, German,
2021
- Sebastian Szancer. Traffic Analysis in V2X Application-Level Gateways. Apr. 2021, Masterthesis. Hochschule für Angewandte Wissenschaften Hamburg.
[Abstract], [Fulltext Document (pdf)], [Bibtex]Future cars will communicate with a variety of entities ranging from other vehicles and infrastructure, such as traffic lights, to Internet-based services running on remote servers. This V2X communication is essential for future vehicles, since it increases traffic safety and traffic efficiency, contributes to easier vehicle maintenance and also plays an important role for the realisation of autonomous vehicles. It is necessary that V2X communication is appropriately secured, especially since it includes safety-critical communication. This can be done with a V2X Security Gateway in the vehicle, which serves as a proxy for vehicle-internal services communicating with the outside world and ensures cryptographic security as well as security on the internet-, transport- and application layer. A central component of such a V2X Security Gateway is the V2X Application-Level Gateway, which ensures security on the application layer, including a context-sensitive semantic analysis of application data, detection of application layer protocol violations and detection of application layer DoS attacks. It also realises the proxy-functionality and ensures cryptographic security. This work presents a concept and prototype implementation of such a V2X Application-Level Gateway. The implementation was evaluated with the V2X Application-Level Gateway software run on an Intel NUC integrated in a test network representing an internal vehicle network. In this network, consisting of an Edgecore SDN switch and Intel NUCs and Raspberry Pis representing vehicle ECUs, several V2X scenarios like remotely controlling the vehicle trunk via HTTP, receiving traffic updates via MQTT and a basic V2V traffic safety service using the ETSI CAM were simulated. Each scenario included realistic attacks devised for evaluating the V2X Application-Level Gateway. It was shown that with the traffic analysis in the V2X Application-Level Gateway all attacks could be detected and handled.
@MastersThesis{ s-tavag-21, author = {Sebastian Szancer}, title = {{Traffic Analysis in V2X Application-Level Gateways}}, month = apr, year = 2021, school = {Hochschule f{\"u}r Angewandte Wissenschaften Hamburg}, address = {Hamburg}, abstract = {Future cars will communicate with a variety of entities ranging from other vehicles and infrastructure, such as traffic lights, to Internet-based services running on remote servers. This V2X communication is essential for future vehicles, since it increases traffic safety and traffic efficiency, contributes to easier vehicle maintenance and also plays an important role for the realisation of autonomous vehicles. It is necessary that V2X communication is appropriately secured, especially since it includes safety-critical communication. This can be done with a V2X Security Gateway in the vehicle, which serves as a proxy for vehicle-internal services communicating with the outside world and ensures cryptographic security as well as security on the internet-, transport- and application layer. A central component of such a V2X Security Gateway is the V2X Application-Level Gateway, which ensures security on the application layer, including a context-sensitive semantic analysis of application data, detection of application layer protocol violations and detection of application layer DoS attacks. It also realises the proxy-functionality and ensures cryptographic security. This work presents a concept and prototype implementation of such a V2X Application-Level Gateway. The implementation was evaluated with the V2X Application-Level Gateway software run on an Intel NUC integrated in a test network representing an internal vehicle network. In this network, consisting of an Edgecore SDN switch and Intel NUCs and Raspberry Pis representing vehicle ECUs, several V2X scenarios like remotely controlling the vehicle trunk via HTTP, receiving traffic updates via MQTT and a basic V2V traffic safety service using the ETSI CAM were simulated. Each scenario included realistic attacks devised for evaluating the V2X Application-Level Gateway. It was shown that with the traffic analysis in the V2X Application-Level Gateway all attacks could be detected and handled.}, type = {mastersthesis}, entrysubtype = {mastersthesis}, langid = {english} }
- Jonas Schäufler. Erkennung von Cyberangriffen auf LIDAR basierte Wahrnehmungsalgorithmen im Automobil. Jan. 2021, Masterthesis. Hochschule für Angewandte Wissenschaften Hamburg.
[Abstract], [Fulltext Document (pdf)], [Bibtex]In dieser Arbeit werden Angriffe auf LiDAR basierte Wahrnehmungsalgorithmen eines Automobils anhand einer state-of-the-art Referenzarchitektur analysiert. Basierend auf dieser Analyse werden Anforderungen an Angriffserkennungssysteme abgeleitet und Konzepte zum Schutze der Integrität der Applikationsschnittstelle durch Erkennung der Angriffe vorgestellt. Ausgewählte Konzepte werden als Prototyp implementiert und hinsichtlich ihrer funktionalen Anforderungen und erreichten Qualität ausgewertet.
@MastersThesis{ s-eclwa-21, author = {Jonas Sch{\"a}ufler}, title = {{Erkennung von Cyberangriffen auf LIDAR basierte Wahrnehmungsalgorithmen im Automobil}}, month = jan, year = 2021, school = {Hochschule f{\"u}r Angewandte Wissenschaften Hamburg}, address = {Hamburg}, abstract = {In dieser Arbeit werden Angriffe auf LiDAR basierte Wahrnehmungsalgorithmen eines Automobils anhand einer state-of-the-art Referenzarchitektur analysiert. Basierend auf dieser Analyse werden Anforderungen an Angriffserkennungssysteme abgeleitet und Konzepte zum Schutze der Integrit{\"a}t der Applikationsschnittstelle durch Erkennung der Angriffe vorgestellt. Ausgew{\"a}hlte Konzepte werden als Prototyp implementiert und hinsichtlich ihrer funktionalen Anforderungen und erreichten Qualit{\"a}t ausgewertet.}, type = {mastersthesis}, entrysubtype = {mastersthesis}, groups = {own, thesis}, langid = {ngerman} }