Refine Your Search

Topic

Author

Affiliation

Search Results

Research Report

Automated Vehicles and Infrastructure Enablers: Cybersecurity

2024-08-26
EPR2024018
Automated Vehicles and Infrastructure Enablers: Cybersecurity focuses on considerations regarding cybersecurity and AVs from the perspective of V2X infrastructure, including electric charging infrastructure. ...While weaponizing automated vehicles (AVs) seems unlikely, cybersecurity breaches may disrupt automated driving systems’ navigation, operation, and safety—especially with the proliferation of vehicle-to-everything (V2X) technologies. ...Effective cybersecurity standards, physical and digital security practices, and well-thought-out design can provide a layered approach to avoiding and mitigating cyber breaches for advanced driver assistance systems and AVs alike.
Magazine

SAE Truck & Off-Highway Engineering: August 2024

2024-08-15
America's first high-volume, fast-fill H2 station for HD trucks FirstElement's station at the Port of Oakland can put 100 kg of hydrogen in up to 200 trucks a day in less than 10 minutes each. Realizing software-defined commercial vehicles Continental's Georg Fässler, executive chair of the 2024 SAE COMVEC, details efforts to future-proof forthcoming vehicles. Euro NCAP details new testing for heavy-truck safety rating New tests for a Truck Safe rating scheme aim to emulate real-world collisions and encourage OEMs to fit collision avoidance technologies and improve driver vision. Gearing up a new electrified truck Eaton and BAE Systems have collaborated to create an electric powertrain featuring BAE electronics and an Eaton four-speed transmission.
Magazine

Aerospace & Defense Technology: August 2024

2024-08-08
Beyond Boundaries: Elevating Aerospace Design With Fluorosilicones MEMS-Based Accelerometer to Measure Microgravity for In-Orbit Manufacturing Optimizing IoMT Device Battery Life With Emulation and Profiling Software Improving Battery Design for eVTOL Aircraft With Simulation Embedded Processing Advancements Enable Smarter, SWAP-Optimized Avionics Displays and Computers Space Lasers: Aiming Towards Next Leap in Global Communications To 6G and Beyond: Penn Engineers Unlock the Next Generation of Wireless Communications Testing Military-Grade Adhesive in Extreme Loading Conditions Military performance requirements for adhesives have been traditionally derived to fulfill niche defense needs in harsh operational environments with little consideration for dual-use commercial potential. Streamlined Microcomb Design Provides Control With The Flip of a Switch Lasers developed at the University of Rochester offer a new path for on-chip frequency comb generators.
Journal Article

Efficient Smart Contract Mechanism for New Energy Vehicle Supply Chain Based on Alliance Chain

2024-07-11
Abstract Supply chain management is key to industry efficiency, while information security and transparency are at the core of operations management. Blockchain technology shows great potential in this regard and can effectively make up for existing shortcomings. This article deeply explores the application of blockchain in new energy vehicle supply chain management, focusing on enhancing the systematization and collaboration of the supply chain through smart contract mechanisms. We established a collaborative contract model for the three-level supply chain. Especially from the perspective of the intermediate supply chain, we designed a smart contract mechanism to optimize key links such as order processing, payment, and logistics tracking, and used the alliance chain to ensure the safe sharing and sharing of information.
Technical Paper

Cybersecurity Approval Criteria: Application of UN R155

2024-07-02
2024-01-2983
The UN R155 regulation is the first automotive cybersecurity regulation and has made security a mandatory approval criterion for new vehicle types. ...These recommendations aim to enhance the comprehensiveness of the security assessment associated with UN R155, fostering a more uniform approach to evaluating cybersecurity in the context of vehicle type approvals.
Magazine

Aerospace & Defense Technology: June 2024

2024-06-06
Digital Twinning and Protecting Controlled Unclassified Information Aitiip Integrates Freeform Injection Molding to Lower Weight and Reduce Production Costs Image Sensors and Cameras Based on Colloidal Quantum Dots for Defense Applications How SpaceVPX is Influencing the Design of Next Generation Spacecraft Avionics Pioneering Space Communication with Terrestrial Know-How NASA's Optical Communications Demo Transmits Data Over 140 Million Miles NRL Research Physicists Explore Fiber Optic Computing Using Distributed Feedback Researchers introduce a fiber-optic computing architecture based on temporal multiplexing and distributed feedback that performs multiple convolutions on the input data in a single layer A New Approach to Assessing the Quality of Aerospace Components A sensing technology that can assess the quality of components in fields such as aerospace could transform UK industry New Research on Noise Reduction for Next Generation Aircraft Engines The mystery of how futuristic aircraft embedded engines, featuring an energy-conserving arrangement, make noise has been solved by researchers at the University of Bristol.
Best Practice

AVSC Best Practice for Core Automated Vehicle Safety Information

2024-05-14
CURRENT
AVSC-D-02-2024
Automated driving system (ADS) manufacturers, developers, and operators need to provide clear information on their safety approach to relevant stakeholders. Explainability to diverse audiences helps build trust in statements from these organizations towards the shared value of safety. A defined list of core safety topics can help set expectations when communicating deployment and use-case-specific automated vehicle (AV) safety information. The topics listed in this best practice are implementation-agnostic and broadly applicable. This best practice describes how safety is continuous and connected throughout lifecycle stages and highlights considerations when including safety metrics as part of the communicated information. It lists topics that are considered core, provides a rationale, illustrative examples where applicable, suggestions of content that could be included for the example, and lists references and industry examples for further information.
Magazine

Aerospace & Defense Technology: May 2024

2024-05-09
Explaining MOSA from the Team that Led the Army Aviation Mission Computing Environment Task Order What's the Best DC Motor for Your Commercial Aerospace Application? Aerospace Production: Overcoming Challenges in Composite Machining Understanding the Limits of Artificial Intelligence for Predictive Maintenance Pushing the Limits: Engineering Advanced RF Interconnects to Meet the Challenges of Hypersonic Missile Development Expanding Possibilities for Superconducting Qubits With Niobium Researchers Help Robots Navigate Efficiently in Uncertain Environments A new algorithm reduces travel time by identifying shortcuts a robot could take on the way to its destination.
Magazine

Automotive Engineering: May 2024

2024-05-02
Editorial What we do is exciting Supplier Eye We've been here before Cybersecurity firm enlists AI in battle as threats increase AI, digital twins reshaping advertising and car creation at JLR Volvo EX90 uses AI, NVIDIA SoC to make automated driving safer Mapping out future vehicle cockpits NXP S32 CoreRide Platform simplifies development of software-defined vehicles 2024 Lincoln Nautilus: The brand's first global SUV Kia's PBV concepts expand commercial possibilities Q&A Kia takes aim at commercial vans with PBV concepts
Research Report

Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

2024-04-22
EPR2024009
On the other hand, the potential risks associated with CAV deployment related to technical vulnerabilities are safety and cybersecurity issues that may arise from flawed hardware and software. Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. ...Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. ...This report also highlights the importance of establishing robust cybersecurity protocols and fostering digital trust in these vehicles to ensure safe and secure deployment in our modern transportation system.
Book

The New Future of Public Transportation

2024-04-11
From hydrogen-fueled buses to AI-driven advancements and cybersecurity, this book offers an unparalleled glimpse into the future of transit. Navigate the complexities of transit planning in a post-COVID world, where innovative solutions are essential to tackle infrastructure challenges and workforce shortages.
Technical Paper

Cybersecurity in the Context of Fail-Operational Systems

2024-04-09
2024-01-2808
The development of highly automated driving functions (AD) recently rises the demand for so called Fail-Operational systems for native driving functions like steering and braking of vehicles. Fail-Operational systems shall guarantee the availability of driving functions even in presence of failures. This can also mean a degradation of system performance or limiting a system’s remaining operating period. In either case, the goal is independency from a human driver as a permanently situation-aware safety fallback solution to provide a certain level of autonomy. In parallel, the connectivity of modern vehicles is increasing rapidly and especially in vehicles with highly automated functions, there is a high demand for connected functions, Infotainment (web conference, Internet, Shopping) and Entertainment (Streaming, Gaming) to entertain the passengers, who should no longer occupied with driving tasks.
Technical Paper

Vehicle Cyber Engineering (VCE) Testbed with CLaaS (Cyber-Security Labs as a Service)

2024-04-09
2024-01-2796
The VCE Laboratory testbeds are connected with an Amazon Web Services (AWS) cloud-based Cyber-security Labs as a Service (CLaaS) system, which allows students and researchers to access the testbeds from any place that has a secure internet connection. ...VCE students are assigned predefined virtual machines to perform designated cyber-security experiments. The CLaaS system has low administrative overhead associated with experiment setup and management. ...VCE Laboratory CLaaS experiments have been developed for demonstrating man-in-the-middle cyber-security attacks from actual compromised hardware or software connected with the TestCube.
Technical Paper

Applying Concolic Testing to the Automotive Domain

2024-04-09
2024-01-2802
Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. ...Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. This is achieved through a Satisfiability Modulo Theory (SMT) solver, which operates on symbolic values for program inputs instead of using their concrete counterparts.
Technical Paper

A Comprehensive Training Approach for Automotive Cybersecurity Engineering

2024-04-09
2024-01-2800
A significant milestone in advancing cybersecurity within the automotive industry is the release of the first international standard for automotive cybersecurity ISO/SAE 21434:2021 ‘Road Vehicles — Cybersecurity Engineering’. A recently published type approval regulation for automotive cybersecurity (UN R155) is also tailored for member countries of the UNECE WP.29 alliance. ...Thus, the challenges for embedded automotive systems engineers are increasing while frameworks, tools and shared concepts for cybersecurity engineering and training are scarce. Hence, cybersecurity training in the automotive domain necessitates an understanding of domain-specific intricacies and the unique challenges at the intersection of cybersecurity and embedded systems engineering, elevating the need for improving the skill set and knowledge of automotive cybersecurity engineers. ...Hence, cybersecurity training in the automotive domain necessitates an understanding of domain-specific intricacies and the unique challenges at the intersection of cybersecurity and embedded systems engineering, elevating the need for improving the skill set and knowledge of automotive cybersecurity engineers. This paper delves into an automotive cybersecurity training concept aimed at enhancing the proficiency of development engineers.
Technical Paper

A Zero Trust Architecture for Automotive Networks

2024-04-09
2024-01-2793
Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to secure intra-vehicle networks. ...This research successfully met the four requirements and demonstrated that using ZT principles in an on-vehicle network greatly improved the cybersecurity posture with manageable impact to system performance and deployment.
Technical Paper

Integrating Functional and Component-Level Threat Analyses in Automotive Systems: A Holistic Approach to Risk Assessment

2024-04-09
2024-01-2797
This method's detailed approach ensures that cybersecurity requirements can be readily implemented as a part of feature design, addressing the concerns of feature owners directly. ...This paper will discuss the merits of asset based approach to cybersecurity over attack based recognizing the inherent strengths and limitations of both methods and underscores the need for a unified approach.
Technical Paper

Vehicle E/E Architecture and Key Technologies Enabling Software-Defined Vehicle

2024-04-09
2024-01-2035
This paper gives a definition of the SDV concept, provides views from different aspects, discusses the progress in vehicle E/E architecture, especially zone-based architecture with centralized computation, and various technologies including High-Performance Computing (HPC) platform, standardized vehicle software architecture, advanced onboard communication, Over-The-Air (OTA) update, and cybersecurity etc. that collectively enable the realization of SDV.
X