Pof: Proof-Of-Following for Vehicle Platoons

Total Page:16

File Type:pdf, Size:1020Kb

Pof: Proof-Of-Following for Vehicle Platoons Verification of Platooning using Large-Scale Fading Ziqi Xu* Jingcheng Li* Yanjun Pan University of Arizona University of Arizona University of Arizona [email protected] [email protected] [email protected] Loukas Lazos Ming Li Nirnimesh Ghose University of Arizona University of Arizona University of Nebraska–Lincoln [email protected] [email protected] [email protected] Abstract—Cooperative vehicle platooning significantly im- I am AV proves highway safety, fuel efficiency, and traffic flow. In this 2 and I follow AV model, a set of vehicles move in line formation and coordinate 1 acceleration, braking, and steering using a combination of path physical sensing and vehicle-to-vehicle (V2V) messaging. The candidate verifier authenticity and integrity of the V2V messages are paramount to platooning AV AV safety. For this reason, recent V2V and V2X standards support 2 distance 1 the integration of a PKI. However, a PKI cannot bind a vehicle’s digital identity to the vehicle’s physical state (location, velocity, Fig. 1: Platooning of AV1 and AV2: The AV1 acts as a verifier etc.). As a result, a vehicle with valid cryptographic credentials to validate AV2’s claim that it follows the platoon. can impact platoons from a remote location. In this paper, we seek to provide the missing link between the However, the complex integration of multi-modal physical physical and the digital world in the context of vehicle platooning. sensing, computation, and communication creates a particu- We propose a new access control protocol we call Proof-of- larly challenging environment to safeguard. The safety of the Following (PoF) that verifies the following distance between a platoon relies on the veracity of the V2V messages exchanged candidate and a verifier. The main idea is to draw security from the common, but constantly changing environment experienced between platoon members, as falsified messages about ac- by the closely traveling vehicles. We use the large-scale fading celeration, location, and velocity can lead to life-threatening effect of ambient RF signals as a common source of randomness accidents, damage to high-value cargo, and monetary loss [24], to construct a PoF primitive. The correlation of large-scale fading [30], [58]. The key security questions for a platooning appli- is an ideal candidate for the mobile outdoor environment because cation are: (a) who is authorized to participate in the platoon it exponentially decays with distance and time. We evaluate our PoF protocol on an experimental platoon of two vehicles in and how is the identity of the platoon members verified? (b) freeway, highway, and urban driving conditions. We demonstrate how is the integrity of the V2V messages guaranteed? (c) how that the PoF withstands both the pre-recording and following is the veracity of V2V messages validated? attacks with overwhelming probability. Whereas some of these problems can be addressed with traditional information security methods (e.g., source authen- I. INTRODUCTION tication and message integrity), others such as access con- Cyber-physical systems (CPSs) enable a plethora of tech- trol and verification of V2V messages cannot be achieved nological innovations that will dramatically improve everyday cryptographically. To demonstrate this shortcoming, consider life. One prime CPS example is autonomous driving systems the scenario of Fig. 1 where AV1 is followed by AV2: (ADSs) for coordinating a set of autonomous vehicles (AVs) Existing wireless standards, including the IEEE 1609.2 for arXiv:2107.09863v2 [cs.CR] 24 Sep 2021 safely, securely, and efficiently [49], [52]. In ADS, multi- V2V communication [20] and the more recent 3GPP TS ple connected vehicles use on-board sensors and vehicle-to- 33.185 for Cellular Vehicle-to-Everything [3] recommend the vehicle (V2V) communications to coordinate their actions and use of a public key infrastructure (PKI). Using the PKI, the improve on safety, fuel-efficiency, traffic flow, and driving two vehicles can mutually authenticate and exchange messages convenience [6]. When applied on a single lane, this coop- whose integrity and confidentiality are guaranteed. eration model is referred to as cooperative adaptive cruise However, the PKI cannot bind a vehicle’s digital identity control (CACC) and can be used to form semi-autonomous, or to the vehicle’s physical location and state. This allows AV2 autonomous vehicle platoons [25], [28], [48]. Several works to impersonate “ghost” vehicles [7], [16], inject false data have shown that the V2V messages exchanged between pla- from remote locations without following AV1, and ultimately toon members can significantly reduce the platoon following jeopardize the safety and efficiency of the platoon. Note that distance (from 2 seconds to as much as 0.5 seconds), without even if AV1 uses its physical sensors to cross-validate the compromising the platoon safety [27], [43], [51]. information contained in m, this verification cannot serve as a valid proof. For instance, let AV2 request to form a platoon *Z. Xu and J. Li are co-first authors. with AV1 via m. Even if AV1 detects a following vehicle, AV1 has no means to bind the detected vehicle with m. Proof-of-following. In this paper, we seek to provide a new form of access control, which we call proof-of-following (PoF). A PoF aims at binding the digital identity of a candidate vehicle with the property of following a mobile verifier within typical platooning distance, referred to as the following dis- tance. PoF primitives prevent malicious vehicles that do not follow the platoon from remotely injecting messages either via long-range V2V communication or the V2I infrastructure. We emphasize that admitted platoon members that follow the Fig. 2: A platoon of three vehicles with AV3 acting as a platoon closely can still potentially inject false messages. The verifier. The candidate and the verifier execute a PoF by significance of the PoF lies in restricting access to physically sampling the ambient RF signals transmitted by the LTE eNBs. platooning members only, thus substantially increasing the adversarial effort for scaling a false injection attack. Without be standard equipment given the global momentum for the a PoF, a remote adversary could potentially join and impact adoption of the Cellular-V2X (C-V2X) 3GPP standard [2], many platoons simultaneously from a single remote location. [3], [35]. From a security perspective, RF signals decorrelate A PoF protocol provides similar access control to distance rapidly with distance and time, especially when mobility is bounding protocols [5], [8], [47] and proximity verification involved [13], [46]. Thus, predicting the instantaneous RF methods [10], [18], [29], [31], [57] with notable differences. environment other than pre-recording signals along a route A distance bounding protocol verifies that a prover is located or following at a large distance becomes impossible. within bounded distance from the verifier at one time instance Contributions. Our main contributions are as follows. without taking into account mobility and time. A PoF protocol • We define the Proof-of-Following (PoF) security primi- continuously verifies a physical distance bound over time tive for performing physical access control in the context while the involved entities are moving. Although a PoF can be of vehicle platooning. We develop a PoF protocol which implemented as a repeated application of distance bounding, enables a candidate vehicle prove to a verifier that it we are exploring a looser form of verification where the follows the verifier within the following distance. The distance bound does not need to be strictly met at every PoF protocol binds the “following” physical property time instance. This model readily corresponds to a vehicle to the candidate’s digital identity. The protocol enables platooning application where the distance between the pla- new vehicles to join a platoon and also the continuous tooning vehicles could naturally fluctuate. Moreover, distance verification of platooning for existing members. bounding protocols require UWB communications and custom • Our PoF protocol exploits the large-scale RF propagation hardware that has been optimized to minimize the modulation characteristics to correlate the motions of the candidate symbol size and any processing delays to remain secure [47]. and the verifier. We are the first to exploit the large- Main idea of PoF. The main idea of our PoF is inspired by scale fading property (mainly due to shadowing) as a a common car game called “I spy”. In I spy, one player (the new modality. It can accommodate typical platooning spy) chooses a visible object and announces it to other players distances (tens of meters [51]), and we show it is suitable with some attribute description (first letter, color, size). The for outdoor mobile settings due to the unpredictability other players have to guess the spied object. The game is ideal of the surrounding environment. Besides the RF spatial for car journeys because the visible objects are continuously correlation, we also utilize the temporal correlation. renewed. Similar to the common vision of co-travelers in • We demonstrate the security of our PoF protocol against the I spy game, if the candidate and verifier vehicles are an attacker that pre-records the RF environment along the platooning, they should see (sense) the same environment. route of the platoon, one that follows the platoon but at a Security is drawn from the rapidly changing environment longer distance, and one that partially follows the platoon. due to motion. Although several different modalities can be In addition, we show that our protocol is secure against used to sense the environment, we opt to measure ambient Man-in-the-Middle attacks when the verifier’s identity RF signals. Specifically, our PoF protocol exploits the large- is known to the candidate, and adapt our protocol to scale fading characteristics of RF propagation to correlate deal with unknown verifiers using commitments with a the moving paths of the platoon members.
Recommended publications
  • THE SPY WHO FIRED ME the Human Costs of Workplace Monitoring by ESTHER KAPLAN
    Garry Wills on the u A Lost Story by u William T. Vollmann Future of Catholicism Vladimir Nabokov Visits Fukushima HARPER’S MAGAZINE/MARCH 2015 $6.99 THE SPY WHO FIRED ME The human costs of workplace monitoring BY ESTHER KAPLAN u A GRAND JUROR SPEAKS The Inside Story of How Prosecutors Always Get Their Way BY GIDEON LEWIS-KRAUS GIVING UP THE GHOST The Eternal Allure of Life After Death BY LESLIE JAMISON REPORT THE SPY WHO FIRED ME The human costs of workplace monitoring By Esther Kaplan ast March, Jim data into metrics to be Cramer,L the host of factored in to your per- CNBC’s Mad Money, formance reviews and devoted part of his decisions about how show to a company much you’ll be paid. called Cornerstone Miller’s company is OnDemand. Corner- part of an $11 billion stone, Cramer shouted industry that also at the camera, is “a includes workforce- cloud-based-software- management systems as-a-service play” in the such as Kronos and “talent- management” “enterprise social” plat- field. Companies that forms such as Micro- use its platform can soft’s Yammer, Sales- quickly assess an em- force’s Chatter, and, ployee’s performance by soon, Facebook at analyzing his or her on- Work. Every aspect of line interactions, in- an office worker’s life cluding emails, instant can now be measured, messages, and Web use. and an increasing “We’ve been manag- number of corporations ing people exactly the and institutions—from same way for the last cosmetics companies hundred and fifty to car-rental agencies— years,” Cornerstone’s are using that informa- CEO, Adam Miller, tion to make hiring told Cramer.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O
    TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O’CONNOR & PETER STRAUGHAN Based on the novel by John le Carré 1. 1 EXT. HUNGARY - BUDAPEST - 1973 - DAY 1 Budapest skyline, looking towards the Parliament building. From here the world looks serene, peaceful. Then, as we begin to PULL BACK, we hear a faint whine, increasing in volume, until it’s the roar of two MiG jet fighters, cutting across the skyline. The PULL BACK reveals a YOUNG BOY watching the jets, exclaiming excitedly in Hungarian. 2 EXT. BUDAPEST STREET - DAY 2 LATERALLY TRACKING down a bustling street, as the jets scream by overhead. Pedestrians look up. All except one man who continues walking. This is JIM PRIDEAUX. ACROSS THE STREET: More pedestrians. We’re not sure who we’re supposed to be looking at - the short stocky man? The girl in the mini skirt? The man in the checked jacket? A car driving beside Prideaux accelerates out of the frame. Across the street the girl in the mini-skirt peels off into a shop. The stocky man turns and waves to us. But it isn’t Prideaux he’s greeting but another passerby, who walks over, shakes hands. Now we’re left with Prideaux and the Magyar in the checked shirt, neither paying any attention to each other. Just as we are wondering if there is any connection, the two reach a corner and the Magyar, pausing to cross the road, collides with another passerby. He looks over and sees Prideaux has caught the moment of slight clumsiness and gives the smallest of rueful smiles.
    [Show full text]
  • Blood Bowl Rulebook 2016 with Errata Well After One and a Half Decade, Games Workshop Has Officially Re-Released Blood Bowl
    Blood Bowl 2016 October 2017 ★ BLOOD BOWL Rules Included: ● Bugman’s Star Players (May 2016) ● Rulebook (November 2016) ● Death Zone Season 1! (November 2016) ● Early Bird Special Play card (2016) ● Match Events (App December 2016) ● Winter Weather Table (Winter Pitch January 2017) ● Subterranean Stadium Conditions (Dwarf/Skaven Pitch January 2017) ● Warhammer Open Special Play card (January 2017) ● Referees (White Dwarf January 2017) ● Errata and FAQ(pdf May 2017) ● Winterbowl Inducements (January 2017) ● Savage Orcs, Human Nobility, Star Players, Inducements, Match Events (App, February 2017) ● Blitzmania Kick-off table (App update, February 2017) ● Blitzmania Special Play cards (League Event February 2017) ● Special Play Variant rules v3 (pdf, April 2017) ● Team-specific ball rules (White Dwarf March 2017) ● White Dwarf and Black Gobbo (White Dwarf May 2017) ● Death Zone Season 2! (May 2017) ● Dwarf Slayer Hold, Skaven Pestilent Vermin, Star Players, Inducements, Match Events (App, May 2017) ● Gobbo balls (White Dwarf June 2017) ● Updated Grak & Crumbleberry rules (PDF July 2017) ● Special Play Card “Gassy Eurption”, Warhammer World Exclusive (August 2017) Limitations and decisions: These rules are a collection of all new Blood Bowl rules merged together with previous Living Rulebook version 6. Please note that some of these rules are optional and have limited to no play testing. Some optional rules and play cards from the previous edition are also supplied here for reference. Minor modifications by the author: ● Added “apply to both teams” for some Blitzmania kick-off table results if a result required a roll from both players and the result would be a tie. ● Added limited duration for some match events which originally had no limit and severely affected the game.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • Gridiron Dinner” of the Sheila Weidenfeld Files at the Gerald R
    The original documents are located in Box 5, folder “3/22/75 - Gridiron Dinner” of the Sheila Weidenfeld Files at the Gerald R. Ford Presidential Library. Copyright Notice The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Gerald Ford donated to the United States of America his copyrights in all of his unpublished writings in National Archives collections. Works prepared by U.S. Government employees as part of their official duties are in the public domain. The copyrights to materials written by other individuals or organizations are presumed to remain with them. If you think any of the information displayed in the PDF is subject to a valid copyright claim, please contact the Gerald R. Ford Presidential Library. Some items in this folder were not digitized because it contains copyrighted materials. Please contact the Gerald R. Ford Presidential Library for access to these materials. Digitized from Box 5 of the Sheila Weidenfeld Files at the Gerald R. Ford Presidential Library THE WHITE HOUSE WASHINGTON THE GRIDIRON DINNER Statler Hilton Hotel SATURDAY - MARCH 22, 1975 Attire: White Tie and Long Dress Departure: 6:40 P. M. From: Terry O'Donne~ BACKGROUND: The Ninetieth Annual Dinner of the Gridiron Club will be noted for the initiation of the Club's first woman• member, Helen Thomas of UniteC: Press International. This will be the third year that women have been gues_ts at the Saturday evening dinner, but the first time in the Club's history that the First Lady has attended.
    [Show full text]
  • Axiomatic Design of a Football Play-Calling Strategy
    Axiomatic Design of a Football Play-Calling Strategy A Major Qualifying Project Report Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science in Mechanical Engineering by _____________________________________________________________ Liam Koenen _____________________________________________________________ Camden Lariviere April 28th, 2016 Approved By: Prof. Christopher A. Brown, Advisor _____________________________________________________________ 1 Abstract The purpose of this MQP was to design an effective play-calling strategy for a football game. An Axiomatic Design approach was used to establish a list of functional requirements and corresponding design parameters and functional metrics. The two axioms to maintain independence and minimize information content were used to generate a final design in the form of a football play card. The primary focus was to develop a successful play-calling strategy that could be consistently repeatable by any user, while also being adaptable over time. Testing of the design solution was conducted using a statistical-based computer simulator. 2 Acknowledgements We would like to extend our sincere gratitude to the following people, as they were influential in the successful completion of our project. We would like to thank Professor Christopher A. Brown for his advice and guidance throughout the yearlong project and Richard Henley for sharing his intellect and thought process about Axiomatic Design and the role
    [Show full text]
  • The Setauket Gang: the American Revolutionary Spy Ring You've Never Heard About
    University of Puget Sound Sound Ideas Summer Research Summer 2019 The Setauket Gang: The American Revolutionary Spy Ring you've never heard about Fran Leskovar University of Puget Sound Follow this and additional works at: https://soundideas.pugetsound.edu/summer_research Part of the Military History Commons, Political History Commons, and the United States History Commons Recommended Citation Leskovar, Fran, "The Setauket Gang: The American Revolutionary Spy Ring you've never heard about" (2019). Summer Research. 340. https://soundideas.pugetsound.edu/summer_research/340 This Article is brought to you for free and open access by Sound Ideas. It has been accepted for inclusion in Summer Research by an authorized administrator of Sound Ideas. For more information, please contact [email protected]. The Setauket Gang: The American Revolutionary War Spy Ring You’ve never heard about Fran Leskovar University of Puget Sound 2019 Summer Research I would like to express my appreciation to the Chism Award for funding this research. 1 A 21-year old Yale Graduate with a diploma in his hand set up on a dangerous expedition to British controlled Long Island. No man except the bravest of the brave would be bold enough to depart on that journey. Merciless smugglers, deserters, and gunrunners, both rebels and redcoats or just acting for themselves, controlled the pond and the land surrounding it. Their monopoly often challenged by the British Royal Navy that was scouting for the rebel privateers and sometimes, but very rarely, for British refugees crossing the Sound under the flag of truce. From all these British sailors and officers, the rebels were particularly afraid of a notorious captain William Quarme who was in charge of the sixteen-gun brig Halifax and was very often accompanied on his voyages by the ruthless Queens Rangers.
    [Show full text]
  • Defensive Back Manual
    SECONDARY MANUAL SECONDARY PLAY Objective: WIN Purpose: 1. Prevent Long ball/big plays (+15) 2. Create turnovers - dictate field position 3. Minimize opponent’s passing game 4. Defend the Perimeter Run Responsibilities: 1. Defend against opponents passing attack 2. Defend against opponent’s runs. 3. Defend against opponent’s inside plays by converging 4. Be great tacklers ! The team that makes the fewest mistakes will win football games. However, the mistakes we make over the course of a game can be analyzed by their degrees of impact on its outcome. To eliminate mistakes we must maintain a high degree of focus and concentration throughout each and every contest. To be a great secondary, we must eliminate the big plays - through the air and on the ground. Our goal is to be the best in the AFL. However, to be the best we must believe in our abilities to be successful. The way to success is through preparation. Don’t settle for mediocrity. Anyone can be average. ! Successful teams overachieve; but more importantly, they never settle for less. To be successful we must give the extra effort. Winning teams know how to give that second and third effort - which must be us. In our effort to achieve greatness, we must work hard and work with a common togetherness having the same goals in mind. To get to that next level we must mentally prepare ourselves to deal with the pressures and adversities of the game. TO PERFORM LIKE A CHAMPION...YOU MUST PRACTICE LIKE ONE!! SIX IMPORTANT FACTORS FOR DEFENSIVE BACKS FOR PASS DEFENSE 1.
    [Show full text]
  • FM 3-98. Reconnaissance and Security Operations
    FM 3-98 Reconnaissance and Security Operations JULY 2015 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp FM 3-98 Field Manual Headquarters No. 3-98 Department of the Army Washington, DC, -XO\ Reconnaissance and Security Operations Contents Page PREFACE............................................................................................................... v INTRODUCTION ................................................................................................... vi Chapter 1 IMPORTANCE OF RECONNAISSANCE AND SECURITY AND ROLES OF CAVALRY ORGANIZATIONS ........................................................................... 1-1 Section I – Role of the Cavalry Formation in Unified Land Operations ...... 1-1 Section II – Cavalry Employment in Unified Land Operations ..................... 1-5 Cavalry in Unified Land Operations ....................................................................1-5 General Employment of Cavalry Units ............................................................... 1-6 Reconnaissance Considerations at Echelons Above Brigade ........................... 1-7 Brigade Operations Officer and Squadron Employment within the BCT ......... 1-10 Section III – Organizations............................................................................
    [Show full text]
  • Control Summary
    ENHANCED ONLINE MANUAL Playstation 2™ Version ”The spirit, the will to win, and the will to excel are the things that endure. These qualities are so much more important than the events that occur.” --Vince Lombardi 2 Table of Contents CONTROL SUMMARY.................................................................................................. 6 MENU NAVIGATION................................................................................................... 6 IN THE HUDDLE................................................................................................................ 6 OFFENSE ........................................................................................................................ 10 AFTER THE SNAP............................................................................................................ 11 DEFENSE ........................................................................................................................ 12 SPECIAL TEAMS ............................................................................................................. 16 QUICK GAME................................................................................................................ 17 COACH MATCHUP.......................................................................................................... 17 IN-GAME PAUSE MENU............................................................................................. 19 THE CRIB™ ..................................................................................................................
    [Show full text]
  • Four County Career Center Adult Workforce Education 22-900 SR 34
    Four County Career Center Adult Workforce Education 22-900 SR 34 Archbold, OH 43502 Consumer Information, Public Safety, STNA, Annual Campus Safety & Security & Fire Safety Report July 1, 2019 – June 30, 2020 1 TABLE OF CONTENTS Institutional Information Welcome 4 About Four County Career Center 4 Geography of Four County Career Center 4 Mission/Vision Statement 4 Approvals and Accreditation 5 Non-Discrimination Policy 5 Accommodations for Students with Disabilities 5 Job Placement Assistance 5 ASPIRE: Adult Basic & Literacy Education Classes 5 Staff Directory 5 Office Hours 7 Policies and Procedures Admissions Policy 8 Inclement Weather Policy 8 High School Evaluation/Foreign Diplomas 8 Transfer Credit 8 Misrepresentation Policy 8 Copyright Protection Policies 9 Educational Costs/Cost of Attendance 10 Graduation Requirements 11 Graduation Rate 11 Retention Rate 11 Placement Rate 11 Types of Employment 11 Financial Aid 11 Eligible Programs 11 Academic Year 11 FCCC Federal School Code 12 Student Eligibility Requirements/Student Responsibilities 12 Confirmation of Citizenship 12 Dependency Status 13 Dependency Override 13 Verifications/Corrections 13 Professional Judgement 14 Types of Financial Aid Available 14 Federal Pell Grant/Lifetime Eligibility 14 Federal Student Loans/Deferment or Forbearance 14 Other Sources of Assistance 14 Grading Scale 15 Attendance Policy 15 Tardiness/Early Leave Policy 15 Satisfactory Academic Progress 15 Maximum Time Frame 16 Warning Status 16 Loss of Eligibility/Appeal Process 16 Special Grading Circumstances
    [Show full text]