<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<table align="center" style="width: 600px; color: rgb(0, 0, 0); border-collapse: collapse; border-spacing: 0px; box-sizing: border-box;">
<tbody>
<tr>
<td><span style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);"><img alt="Dissertation Defense Announcement at the Cullen College of Engineering" width="600" height="171" style="width: 600px; height: 171px;" src="https://www.egr.uh.edu/sites/www.egr.uh.edu/files/enews/2024/images/dissertation.png"></span>
<table align="center" style="border-collapse: collapse; border-spacing: 0px; box-sizing: border-box;">
<tbody>
<tr>
<td align="center" style="padding: 40px 20px 10px;">
<div style="line-height: 28px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>CANBUS and Ethernet Switching Data Communication Security in Future Smart Cars</b></div>
<div style="line-height: 22px; margin-top: 5px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>USING THE ASCON HASHING TECHNOLOGY FOR SENSOR ID AUTHENTICATION</b></div>
<div style="margin: 30px 0px;">
<div style="line-height: 20px; margin-bottom: 5px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Olugbenga Bamidele Olumuyiwa</b></div>
<div style="line-height: 22px; margin: 0px 0px 5px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
December 4, 2024; 9:00 AM - 11:00 AM (CST)<br>
Location: Zoom<br>
Zoom: <a href="https://urldefense.com/v3/__https://uh-edu-cougarnet.zoom.us/j/91275322202?pwd=akhuU1hncVFsZWFYUVRWTEZXOTZZQT09__;!!LkSTlj0I!CGkF3B3QDoSv-v5OG9cQKQtYuMyPO15QKVouIoVWvetbyUonfPB14D1-vECBxPsnpQceZzBFjn1y2yDbI8Si_3-T$" target="_blank" id="OWAd257098b-992b-0c8c-a112-51466362205f" class="OWAAutoLink" style="color: rgb(200, 16, 46);">https://uh-edu-cougarnet.zoom.us/j/91275322202?pwd=akhuU1hncVFsZWFYUVRWTEZXOTZZQT09</a></div>
</div>
<div style="line-height: 22px; margin: 0px 0px 5px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Committee Chair:</b><br>
Yuhua Chen Ph.D.</div>
<div style="line-height: 22px; margin: 0px 0px 20px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Committee Members:</b><br>
JingHong Chen, Ph.D. | Harry Le, Ph.D. | Yi-Lung Mo, Ph.D. | Abu Baker, Ph.D.</div>
</td>
</tr>
<tr>
<td style="padding-right: 20px; padding-bottom: 20px; padding-left: 20px;">
<div style="line-height: 22px; margin: 15px 0px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Abstract</b></div>
<div style="line-height: 22px; margin: 15px 0px; font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Data communication within a smart vehicular environment has become a major area of focus. This is due to the number of traffic created as a result of the increase in the number of sensors operating inside smart vehicles. Several research works have been carried
out in different areas with respect to data response time and data security focusing on two of the most popular data transportation platforms for passing data from a source to destination in vehicles - the Controller Area Network Bus (CANBUS) and Ethernet
data platforms. These are not only prone to data message attacks, but are limited in data security as they provide little data security while data is being transferred. This research proposes the usage of the ASCON Lightweight Crytographic (LWC) algorithm
which is a post-quantum cryptography architecture that ensures data being passed across are not only properly encrypted and authenticated but ensure that they are post-quantum secured which ensures that the data sensor ID is hashed before being forwarded for
processing while encrypting the data message itself. This further ensures the integrity of the source and destination of the data. The cryptography nature of the post-quantum architecture further ensures the credibility, and the integrity of the data message
passed within a vehicle thereby increasing the level of security of the data and making this more difficult to hack if a quantum computer is used.</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td><span style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);"><img alt="Engineered For What's Next" width="600" height="82" style="width: 600px; height: 82px;" src="https://www.egr.uh.edu/sites/www.egr.uh.edu/files/enews/2022/images/dissertation2.png"></span></td>
</tr>
</tbody>
</table>
<div class="elementToProof" style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div id="Signature" class="elementToProof"></div>
</body>
</html>