SAE International Journal of Transportation Cybersecurity and Privacy
Special Issue on Heavy Vehicle Cybersecurity
Call for Papers
The heavy trucking industry is in a period of great technological shift. Computer and communication advancements continue to drive feature evolution in heavy vehicles. Some electronic control units (ECUs) have processing capabilities rivaling that of many standalone PCs, complete with full operating systems. The costs of implementing communication technologies (both old and new) such as RFID, Bluetooth, Wi-Fi, DSRC, cellular and satellite continues to fall, enabling technology integration within the vehicle, between vehicles (V2V), between vehicles and infrastructure (V2I), and the world (the Internet). In the ongoing quest for fuel economy, traffic and cargo efficiency, driver safety and comfort, more safety critical features are being computerized; and, then interconnected with secondary systems.
However, these new technologies also come with cybersecurity risks such as the ability of an attacker to access critical vehicle systems through unsecure wireless links. Heavy vehicles are especially vulnerable to internal network attacks due to the commonality of their internal network communications. The J1939 communications standard for heavy vehicles was created to allow the many components from different manufacturers found in the modern heavy truck to work together.
Therefore, the aim of this special issue is to solicit recent advances in heavy vehicle cybersecurity.
Topics of interest include but are not limited to:
- Cybersecurity of sensors and cyber-physical systems
- Design of resilient architectures and applications
- Privacy and data protection issues in motor freight systems
- Hardware security and secure hardware modules
- Security of vehicular communications (on-board, between vehicles, and between vehicles and infrastructure)
- Security of application platforms
- Intrusion and anomaly detection systems
- Forensics and analytics
- Security of Electronic Logging Devices (ELDs)
- Vehicle-related information sharing and vulnerability coordination
- Software assurance and formal methods
- Security standardization
- Supply chain integrity and traceability
- Communication of cybersecurity risks, impacts, and priorities