Refine Your Search

Topic

Search Results

Technical Paper

A Zero Trust Architecture for Automotive Networks

2024-04-09
2024-01-2793
Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to secure intra-vehicle networks. ...This research successfully met the four requirements and demonstrated that using ZT principles in an on-vehicle network greatly improved the cybersecurity posture with manageable impact to system performance and deployment.
Best Practice

AVSC Information Report for Change Risk Management

2023-04-12
CURRENT
AVSC00010202304
AVSC Information Report for Change Risk Management AVSC00010202304 provides a process for change risk management for fleet-operated ADS-DVs using level 4 or 5 automation. The document addresses risks resulting from planned and unplanned changes in an ADS-DV design and/or operation. This information report is based on the concept of risk-informed decision-making. Making risk management decisions such as safety and change management, safety analysis, and safety assurance are especially applicable when moving from concept to production intent for the ADS-DV. Change Risk Management (CRM) does not replace best practices or other methods for managing safety anomalies or change management processes. It may instead be viewed as an additional resource that elaborates on how safety anomaly management and change management can be performed.
Best Practice

CSPR Framework Technical Report

2023-01-04
CURRENT
SMSOLUTIONS0123
SMSOLUTIONS0123 represents the work of a team of policy and technical leaders from over a dozen forward-leaning organizations in the ground vehicle industry and government. When asked where Sustainable Mobility Solutions could best apply the capabilities SAE has developed over a century, the SMS group responded without hesitation: address EV charging system failure. The group determined to aggregate charging session data with the view to create a consistent data dictionary and analysis practice. Adopting agile work practices, it studied these data, vetting and iterating its solution with the objective of producing a technical report in approximately half the time required in normal standardization. The resulting document, EV Charging Infrastructure: Charging System Performance Reporting, is informing work by the U.S. Department of Energy and Departments of Energy and Transportation Joint Office, as well as OEMs and suppliers.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-01-14
HISTORICAL
J3061_201601
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. ...Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. ...This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. This includes: Defining a complete lifecycle process framework that can be tailored and utilized within each organization’s development processes to incorporate Cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning.
Training / Education

Cybersecurity in the Energy Sector

Anytime
Anatomy and examples of cyberattacks on industrial control systems (ICS) and critical infrastructures (CI): In this course you will understand the importance of cybersecurity for Critical Infrastructure and you will know typical attack vectors, vulnerabilities and defense strategies. ...Decentralized Energy Systems Security: In this course you will know relevant technical countermeasures for cybersecurity. You will understand threats and solutions concerning data communication and network security in the energy systems.
Event

Digital Summit - WCX™ World Congress Experience

2024-04-18
If you are not able to attend WCX 2022 in-person, you will have the opportunity to join a selected number of live technical and executive discussions online that will advance your skill set in propulsion, connectivity security and safety as well as the business of technology.
Event

Digital Summit - WCX™ World Congress Experience

2024-04-18
If you are not able to attend WCX 2022 in-person, you will have the opportunity to join a selected number of live technical and executive discussions online that will advance your skill set in propulsion, connectivity security and safety as well as the business of technology.
Book

Energy in the 21st Century (2nd Edition)

2004-01-01
This book, in its second edition, examines the energy sources that play a vital role in society today, as well as those that may be the primary energy sources of tomorrow. From our reliance on fossil fuels to the quest for energy independence, and the environmental issues that follow each decision, this book delves into the most prominent energy issues of our time. Armed with this information, the reader can think critically about the direction they want this world to take. Contents: Brief History of Energy Consumption Fossil Energy - Coal Fossil Energy - Oil and Gas Peak Oil Nuclear Energy Renewable Energy - Solar Energy Renewable Energy - Wind Energy Renewable Energy - Energy from Water Renewable Energy - Bioenergy and Synfuels Energy Carrier, Energy Storage and Hybrid Energy Systems Electricity Generation and Distribution Energy Economics Future Issues - Geopolitics of Energy Future Issues - Energy Forecasts
Journal Article

Ensuring Fuel Economy Performance of Commercial Vehicle Fleets Using Blockchain Technology

2019-04-02
2019-01-1078
In the past, research on blockchain technology has addressed security and privacy concerns within intelligent transportation systems for critical V2I and V2V communications that form the backbone of Internet of Vehicles. Within trucking industry, a recent trend has been observed towards the use of blockchain technology for operations. Industry stakeholders are particularly looking forward to refining status quo contract management and vehicle maintenance processes through blockchains. However, the use of blockchain technology for enhancing vehicle performance in fleets, especially while considering the fact that modern-day intelligent vehicles are prone to cyber security threats, is an area that has attracted less attention. In this paper, we demonstrate a case study that makes use of blockchains to securely optimize the fuel economy of fleets that do package pickup and delivery (P&D) in urban areas.
Article

Europe’s blockchain-based Smart E-Mobility Challenge will conclude this May in Germany

2019-05-07
TIoTA, an open software consortium of over 50 members organized to support the creation of a secure, scalable, interoperable, and trusted IoT ecosystem, began the E-Mobility Challenge to link IoT devices with consumers and stakeholder companies such as operators and service, communication, and payment providers within the preexisting European electric vehicle ecosystem.
Standard

Hardware Protected Security for Ground Vehicles

2020-02-10
CURRENT
J3101_202002
Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section is a generalization of such use cases in an attempt to extract common requirements for the hardware protected security environment that enable it to be a gatekeeper. Examples are: Creating a new key fob Re-flashing ECU firmware Reading/exporting PII out of the ECU Using a subscription-based feature Performing some service on an ECU Transferring ownership of the vehicle Some of these examples are discussed later in this section and some have detailed sections of their own. This list is by no means comprehensive.
Magazine

MOBILITY ENGINEERING

2016-12-01
Focus on advanced safety systems and human-factor interventions The impact of REACH on the aviation sector Considered the most comprehensive chemical-regulation legislation to date, REACH presents serious ramifications for the aircraft industry. Lightweighting: What's Next? Experts weigh in on the challenges and future enablers in the battle to reduce vehicle mass. The best of COMVEC 2016 Autonomous vehicles and improved fuel efficiency via advanced powertrain solutions are pressing topics detailed in this select group of technical papers from the SAE Commercial Vehicle Engineering Congress. Optimizing waste heat recovery for long-haul trucks Autonomous solutions in agriculture Downsizing a HD diesel engine for off-highway applications Zero-emissions electric aircraft: Theory vs. reality
Magazine

MOBILITY ENGINEERING: December 2017

2017-12-01
Rockets re-engineered-a step further into the cosmos Powertrain design for reliability Ice breaker Mazda's Skyactiv-X beats the big companies to market with a promising new engine that marries Otto and Diesel attributes. Advances for off-highway engine design As manufacturers continue to drive out cost and meet a worldwide patchwork of regulatory frameworks, the tools for developing those engines are advancing. From showcase prototypes to advanced analytical techniques, suppliers are helping the cause. Aeroacoustic simulation delivers breakthroughs in aircraft noise reduction Autonomy testing: Simulation to the rescue Autonomous technology development injects new rigors on vehicle-development testing.
Magazine

MOBILITY ENGINEERING: June 2016

2016-06-01
Base-engine value engineering for higher fuel efficiency and enhanced performance Continuous improvement in existing engines can be efficiently achieved with a value engineering approach. The integration of product development with value engineering ensures the achievement of specified targets in a systematic manner and within a defined timeframe. Integrated system engineering for valvetrain design and development of a high-speed diesel engine The lead time for engine development has reduced significantly with the advent of advanced simulation techniques. Cars poised to become 'a thing' Making automobiles part of the Internet of Things brings both risks and rewards. Agility training for cars Chassis component suppliers refine vehicle dynamics at the high end and entry level with four-wheel steering and adaptive damping.
Magazine

MOBILITY ENGINEERING: March 2017

2017-03-01
A greener future for two-wheelers New BS VI emissions standards for two-wheelers are an enviro-opportunity. Additive manufacturing How 3D printing will transform the A&D support chain. Autonomous plows ahead Agriculture, construction, mining-even marine-are advancing autonomous technology to improve the productivity and safety of vehicles on the job. Bridging the power gap with 48 volts New 48-V technologies are poised to arrive in volume to help meet CO2 regulations and satisfy the "vampire" power demands of new electrical subsystems and accessories. Advances in lightweight electronics protection Conformal coatings increase reliability of aerospace and military assemblies.
X