Refine Your Search

Topic

Search Results

Journal Article

A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems

2021-11-16
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
Technical Paper

Access Control Requirements for Autonomous Robotic Fleets

2023-04-11
2023-01-0104
Access control enforces security policies for controlling critical resources. For V2X (Vehicle to Everything) autonomous military vehicle fleets, network middleware systems such as ROS (Robotic Operating System) expose system resources through networked publisher/subscriber and client/server paradigms. Without proper access control, these systems are vulnerable to attacks from compromised network nodes, which may perform data poisoning attacks, flood packets on a network, or attempt to gain lateral control of other resources. Access control for robotic middleware systems has been investigated in both ROS1 and ROS2. Still, these implementations do not have mechanisms for evaluating a policy's consistency and completeness or writing expressive policies for distributed fleets. We explore an RBAC (Role-Based Access Control) mechanism layered onto ROS environments that uses local permission caches with precomputed truth tables for fast policy evaluation.
Book

Aerospace Standards Index - 2024

2024-02-12
This valuable resource lists all Aerospace Standards (AS), Aerospace Recommended Practices (ARP), Aerospace Information Reports (AIR), and Aerospace Resource Documents (ARD) published by SAE. Each listing includes title, subject, document number, key words, new and revised documents, and DODISS-adopted documents. AMS Index - Now Available!
Journal Article

Assuring Vehicle Update Integrity Using Asymmetric Public Key Infrastructure (PKI) and Public Key Cryptography (PKC)

2020-08-24
Abstract Over the past forty years, the Electronic Control Unit (ECU) technology has grown in both sophistication and volume in the automotive sector, and modern vehicles may comprise hundreds of ECUs. ECUs typically communicate via a bus-based network architecture to collectively support a broad range of safety-critical capabilities, such as obstacle avoidance, lane management, and adaptive cruise control. However, this technology evolution has also brought about risks: if ECU firmware is compromised, then vehicle safety may be compromised. Recent experiments and demonstrations have shown that ECU firmware is not only poorly protected but also that compromised firmware may pose safety risks to occupants and bystanders.
Magazine

Automotive Engineering: April 2023

2023-04-06
Steer-by-wire stars on the new Lexus RZ 450e Lexus' first BEV arrives with innovative touches, dual-axle propulsion and less-than-spectacular range. Rethinking the grid for EVs Interoperability and 'smart' energy management are vital for meeting EV charging demand. Designing for 200 BMEP and 22,000 RPM How Honda's Grand Prix motorcycle program in the 1960s created the world's most-advanced IC engines. Spelling Ford with an 'e' Ford Motor Co.'s new Model e team aims to transform the 120-year-old auto giant. Meet some of its new technology leaders. Chamber made to protect EV batteries With the ACS Dust Chamber, testing to ISO 20653 helps ensure EV battery housing designs will keep out dust and small particulates.
Magazine

Automotive Engineering: August 2023

2023-08-03
3D, no waiting! Two companies' latest techniques take additive manufacturing to the next level. Reducing the battery materials supply risk "Adjacent" strategies such as improving vehicle efficiency and advancing promising chemistries can mitigate the risks associated with today's favored battery materials. A formula for real-world experience Student engineers soak up the lessons from an army of auto-industry and racing volunteers at Formula SAE Michigan. Editorial It's about more than a connector Supplier Eye The New Wild West SAE to standardize Tesla's NACS charging connector Report: Suppliers need more info sooner on OEM EV plans Mazda again producing rotary engines Toyota to build new battery lab in Michigan New Lexus SUVs: GX for show, TX for dough? VW introduces seminal ID.Buzz in three-row layout Spotlight: 3D Printing/Additive Manufacturing Equipment & Software
Magazine

Automotive Engineering: July/August 2022

2022-08-01
R1T Exposed! A comprehensive teardown of Rivian's pioneering electric pickup reveals praiseworthy build quality, innovative thinking…and some lapses in manufacturability. EVs drive NVH materials innovation Skateboard platforms, high-frequency motor noise push lower dB thresholds and new countermeasure solutions. Optimizing design for additive manufacturing Avoiding the pitfalls of 3D printing requires knowing the process limitations - and how to work around them. An expert at a leading AM specialist shares insights on getting it right. Real-time processors help drive the zonal E/E revolution With its new generation of software-compatible processors, NXP aims to accelerate systems consolidation and performance.
Magazine

Automotive Engineering: October 6, 2015

2015-10-06
2016 Malibu sheds 300 lb, adds new hybrid system More wheelbase, style, fuel economy, and comfort aim to move GM's volume midsize sedan from the sidelines to the fast lane. Lighter, more powerful 2016 Honda Pilot The third-generation SUV gets a sleek new look and plenty of slick technology for enhanced performance and safety. 2016 Mazda MX-5 stays true to its roots Mazda engineers give the industry a lesson in getting more from less. 2016 Land Rover Discovery Sport spearheads more efficient Land Rovers JLR's space-efficient, flexible SUV moves to JLR's new Ingenium modular engines. Audi chooses high technology, cautious design evolution for new A4 In addition to lighter weight and significant improvements in efficiency, the new car employs plenty of technology and driver support.
Magazine

Autonomous Vehicle Engineering: March 2019

2019-03-07
Editorial It's more than just a magazine The Navigator Needed: a step beyond STEM SAE AV Activities A listing of SAE International's autonomous vehicle-related offerings across the organization. Autonomy for the Masses Ford Autonomous Vehicles LLC aims to do for AVs what the Model T did for just about everyone. CEO Sherif Marakby explains. Speeding Thermal Analysis for Autonomous EVs Solving thermal challenges is vital to AEV development. Siemens PLM's new Simcenter integrated simulation package offers a high-fidelity, easy-to-use solution. New Mobility's Mega-Mappers Most believe ultrahigh-definition mapping is crucial to make high-level automated driving possible. Developing these maps is a huge undertaking-one that's enjoying a massive investment of money and talent. From a Blip to a Boom Automotive radar rides the 77-GHz technology wave toward greater capability and vehicle safety.
Magazine

Autonomous Vehicle Engineering: May 2019

2019-05-02
Editorial AVs, data and 'surveillance capitalism' SAE AV Activities SAE launches Office of Automation The Navigator Lessons from the 737 Max-8 debacle Scorecard Waymo, GM and Ford pegged as autonomous leaders Designs to Dye for: Autonomy's New-Materials Revolution From pineapples to bacteria, Envisage's research is focused on new-mobility's 'inside' story. Dining on Data Processing, in real-time, the enormous data stream that's flowing through AVs is increasingly the job of NVIDIA's mighty GPUs. Danny Shapiro relishes the feast. New Performance Metrics for Lidar Frame-rate measurement is so yesterday.
Best Practice

CSPR Framework Technical Report

2023-01-04
CURRENT
SMSOLUTIONS0123
SMSOLUTIONS0123 represents the work of a team of policy and technical leaders from over a dozen forward-leaning organizations in the ground vehicle industry and government. When asked where Sustainable Mobility Solutions could best apply the capabilities SAE has developed over a century, the SMS group responded without hesitation: address EV charging system failure. The group determined to aggregate charging session data with the view to create a consistent data dictionary and analysis practice. Adopting agile work practices, it studied these data, vetting and iterating its solution with the objective of producing a technical report in approximately half the time required in normal standardization. The resulting document, EV Charging Infrastructure: Charging System Performance Reporting, is informing work by the U.S. Department of Energy and Departments of Energy and Transportation Joint Office, as well as OEMs and suppliers.
Technical Paper

Challenges in Integrating Cybersecurity into Existing Development Processes

2020-04-14
2020-01-0144
Strategies designed to deal with these challenges differ in the way in which added duties are assigned and cybersecurity topics are integrated into the already existing process steps. Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. ...Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. A cybersecurity development approach is frequently perceived as introducing impediments, that bear the risk of cybersecurity measures receiving a lower priority to reduce inconvenience. ...For an established development process and a team accustomed to this process, adding cybersecurity features to the product initially means inconvenience and reduced productivity without perceivable benefits.
Technical Paper

Communication Requirements for Plug-In Electric Vehicles

2011-04-12
2011-01-0866
This paper is the second in the series of documents designed to record the progress of a series of SAE documents - SAE J2836™, J2847, J2931, & J2953 - within the Plug-In Electric Vehicle (PEV) Communication Task Force. This follows the initial paper number 2010-01-0837, and continues with the test and modeling of the various PLC types for utility programs described in J2836/1™ & J2847/1. This also extends the communication to an off-board charger, described in J2836/2™ & J2847/2 and includes reverse energy flow described in J2836/3™ and J2847/3. The initial versions of J2836/1™ and J2847/1 were published early 2010. J2847/1 has now been re-opened to include updates from comments from the National Institute of Standards Technology (NIST) Smart Grid Interoperability Panel (SGIP), Smart Grid Architectural Committee (SGAC) and Cyber Security Working Group committee (SCWG).
Technical Paper

Consequence-Driven Cybersecurity for High-Power Electric Vehicle Charging Infrastructure

2023-04-11
2023-01-0047
Cybersecurity of high-power charging infrastructure for electric vehicles (EVs) is critical to the safety, reliability, and consumer confidence in this publicly accessible technology. ...Cybersecurity of high-power charging infrastructure for electric vehicles (EVs) is critical to the safety, reliability, and consumer confidence in this publicly accessible technology. Cybersecurity vulnerabilities in high-power EV charging infrastructure may also present risks to broader transportation and energy-infrastructure systems. ...This paper details a methodology used to analyze and prioritize high-consequence events that could result from cybersecurity sabotage to high-power charging infrastructure. The highest prioritized events are evaluated under laboratory conditions for the severity of impact and the complexity of cybersecurity manipulation.
X