Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWibowo, Marcellinus Hendro Adi
dc.description.abstractIn an autonomous vehicle system, a secure communication between vehicles and instruments is critical. Particularly, in a metro or underground communication system, the communication is done through a Supervisory Control and Data Acquisition (SCADA) network system which is purely wired system. This wired system does not include any wireless connections; hence an outsider attack is very unlikely to happen. Then Gin, this does not imply that the system is safe from attack as an attack could come from insider by sending more command or less command. This attack can be detected by comparing the features extracted from the traffic happening to the heuristic and proper data set. The comparison done is not only by comparing the distribution of the data transferred but also as looking at the correlation between each instrument. The correlation is needed since several instruments might work dependently while others might work independently. Data that are compared in the analysis are the features from of each instrument from the traffic which are number of command transfer, number of handshake transfer, and the ratio of command transferred to the command transfer median from the samples. These three features are then analyzed and the results will show whether there’s an anomaly in certain period.en_US
dc.format.extent79 p.en_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Electrical and electronic engineeringen_US
dc.titleSecure data collection in telemonitoring autonomous vehicleen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorGoh Wang Lingen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
dc.contributor.organizationA*STAR Institute for Infocomm Researchen_US
dc.contributor.supervisor2Guo Huaqunen_US
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
FYP Report.pdf
  Restricted Access
1.93 MBAdobe PDFView/Open

Page view(s)

Updated on Jun 23, 2021

Download(s) 50

Updated on Jun 23, 2021

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.