

- Description
-
This Riipen "Company" profile was created to allow WMich faculty members to create Riipen projects for their students.
- Number of employees
- 2 - 10 employees
- Company website
- https://wmich.edu/
- Industries
- Education
Recent projects
Mixed Reality Application for Emergency Medical Services with HoloLens
The goal of this project is to work with teams of students to create a project plan, analyze and specify requirements for their project and develop a design. Prototype demonstrations and periodic oral and written progress reports are required from the students to help assure steady progress.
Smart Home IOT Testbed
The main goal for the project is to build and deploy a smart home IoT testbed, launch cyber attacks, collect network data of attack and benign traffic, and optionally develop a pattern recognition/machine learning based technique to detect attacks.
Privacy Preserving Analytics
The main goal for the project is to develop a fully homomorphic encryption technique that can perform simple data analytics over encrypted data, ensuring privacy-preserving data science. This will involve several different steps for the students, including: - Researching and understanding fully homomorphic encryption techniques. - Developing a method to perform data analytics over encrypted data. - Testing the developed technique to ensure its effectiveness in preserving privacy.
CAN BUS attacks on electric vehicles security
Project background: There is general concern over security as new technologies develop, especially technologies that are safety-critical and that involve networks which are prone to hacking. These technologies include electric vehicles, planes, city traffic control, etc. One such network used in all of these examples is the CAN or Controller Area Network bus protocol. This is a linear bus topology that links multiple ECUs (electronic control units) in a chain within an electronic system. For our project, we are specifically focusing on the CANvas network inside electric vehicles, and how they might be vulnerable to attacks through charging stations. When charging, a physical link is created between the charging station and the EV so that they can exchange information. The charging station needs input info from the EV, and vice versa. This info is sent in packets containing an identifier and the 8 byte payload data. Hackers can delete or modify the payload data. As an example, if the charging capacity or voltage requirements are altered, it might damage the vehicle. Depending on how the vehicle’s bus topology is set up, other ECUs may also be compromised. As an example, one such way to hack a charging station is to do the equivalent of a DOS attack over a CAN network. A hacker can deliberately change the identifier in the header so that its frames are received before the legitimate packets. There are several charging modes, both AC and DC. We will explore a DC charging mode called CHAdeMO, or System A. This will be the simplest one to work with, so that’s what we will be using.