Refine Your Search

Topic

Author

Affiliation

Search Results

Technical Paper

An Adaptable Security-By-Design Approach for Addressing Secured Remote Monitoring Teleoperation (RMTO) of an Autonomous Vehicle

2023-04-11
2023-01-0579
The separation of cybersecurity consideration in RMTO in comparison to AV has barely been touched upon, as most available research and consideration has mainly been focused on AV. ...Though security-by-design is still in the infant state within the automotive cybersecurity. For our development, an adaptable security-by-design approach for RMTO will cover Security Engineering Lifecycle, Logical Security Layered Concept, and Security Architecture. ...A Threat Analysis and Risk Assessment (TARA) of the RMTO as defined in the international automotive cybersecurity standard ISO/SAE 21434 and UNECE WP29 would be carried out and a formalization of the highest level of threats discovered in the RMTO system with a corresponding mitigation action.
Technical Paper

Consequence-Driven Cybersecurity for High Power Electric Vehicle Charging Infrastructure

2023-04-11
2023-01-0047
Cybersecurity of high-power charging infrastructure for electric vehicles (EVs) is critical to the safety and re-liability of and consumer confidence in this publicly accessible technology. ...Cybersecurity of high-power charging infrastructure for electric vehicles (EVs) is critical to the safety and re-liability of and consumer confidence in this publicly accessible technology. Cybersecurity vulnerabilities of high-power EV charging infrastructure may also present risks to broader transportation and energy-infrastructure systems. ...This paper details a methodology used to analyze and prioritize high-consequence events that could result from cybersecurity sabotage to high-power charging infrastructure. The highest prioritized events are evaluated under laboratory conditions for severity of impact and complexity of cybersecurity manipulation.
Technical Paper

Cybersecurity in EV's: Approach for Systematic Secured SW Development through ISO21434 & ASPICE

2023-04-11
2023-01-0046
Cybersecurity (CS) is crucial and significantly important in every product that is connected to the network/internet. ...Hence making it very important to guarantee that every single connected device shall have cybersecurity measures implemented to ensure the safety of the entire system. Looking into the forecasted worldwide growth in the Electric Vehicles (EV's) segment , CS researchers have recently identified several vulnerabilities that exist in EV's, EVSE devices, communications to electric vehicles (EVs), and upstream services, such as EVSE vendor cloud services, third party systems, and grid operators. ...Additional Processes have been defined in the Process Reference and Assessment Model for the CS Engineering in order to incorporate the cybersecurity related processes in the ASPICE scope. This paper aims at providing a model & brief overview to establish a correlation between the ASPICE, ISO/SAE 21434 and the ISO26262 functional safety standards for development of a secured Cybersecurity Software with all the considerations that an organization can undertake.
Technical Paper

Digital-Twin-Based Approaches and Applications for Improving Automotive Cybersecurity in Different Lifecycle Stages

2023-04-11
2023-01-0036
With the increasing connectivity and complexity of modern automobiles, cybersecurity has become one of the most important properties of a vehicle. Various strategies have been proposed to enhance automotive cybersecurity. ...Various strategies have been proposed to enhance automotive cybersecurity. Digital twin (DT), regarded as one of the top 10 strategic technology trends by Gartner in 2018 and 2019, establishes digital representations in a virtual world and raises new ideas to benefit real-life objects. ...In this paper, we explored the possibility of using digital twin technology to improve automotive cybersecurity. We designed two kinds of digital twin models, named mirror DT and autonomous DT, and corresponding environments to support cybersecurity design, development, and maintenance in an auto's lifecycle, as well as technique training.
Technical Paper

Hardware-Based Cyber Security for Connected Vehicles

2023-04-11
2023-01-0038
This paper will outline the project progress over its initial two-year lifetime, including: • Development of hardware-based monitoring solutions and supporting software to demonstrate the ability to perform on-chip cyber threat identification and mitigation • Construction of a multi-component testbed representing a flexible and functional in-vehicle architecture for real environment trials to train, test, validate and demonstrate automotive cybersecurity solutions • A vision of what the future will hold when deploying this type of cyber security detection and mitigation solution within connected and autonomous vehicles.
Technical Paper

Access Control Requirements for Autonomous Robotic Fleets

2023-04-11
2023-01-0104
Access control enforces security policies for controlling critical resources. For V2X (Vehicle to Everything) autonomous military vehicle fleets, network middleware systems such as ROS (Robotic Operating System) expose system resources through networked publisher/subscriber and client/server paradigms. Without proper access control, these systems are vulnerable to attacks from compromised network nodes, which may perform data poisoning attacks, flood packets on a network, or attempt to gain lateral control of other resources. Access control for robotic middleware systems has been investigated in both ROS1 and ROS2. Still, these implementations do not have mechanisms for evaluating a policy's consistency and completeness or writing expressive policies for distributed fleets. We explore an RBAC (Role-Based Access Control) mechanism layered onto ROS environments that uses local permission caches with precomputed truth tables for fast policy evaluation.
Technical Paper

Cybersecurity by Agile Design

2023-04-11
2023-01-0035
ISO/SAE 21434 Final International Standard was released September 2021 to great fanfare and is the most prominent standard in Automotive Cybersecurity. As members of the Joint Working Group (JWG) we spent 5 years developing the 84 pages of precise wording acceptable to hundreds of contributors, during which time the auto industry had been undergoing a metamorphosis probably unmatched in its hundred-year history. ...The application to an Agile method may require interpreting the standard from another angle, which could involve reordering the sequence of activities and work products, breaking down the acceptable criteria of some work products to allow rapid iterations, and verifications of meta data or intermediate work products. In cybersecurity engineering, the Agile method has its unique strength comparing to the V-model method, as its cyclical nature is better aligned with best practices for Cybersecurity Frameworks ...In cybersecurity engineering, the Agile method has its unique strength comparing to the V-model method, as its cyclical nature is better aligned with best practices for Cybersecurity Frameworks
Technical Paper

Evaluation of Vehicle System Performance of an SAE J1939-91C Network Security Implementation

2023-04-11
2023-01-0041
CAN bus network proved to be efficient and dynamic for small compact cars as well as heavy-duty vehicles (HDV). However, HDVs are more susceptible to malicious attacks due to lack of security in their intra-vehicle communication protocols. SAE proposed a new standard named J1939-91C for CAN-FD networks which provides methods for establishing trust and securing mutual messages with optional encryption. J1939-91C ensures message authenticity, integrity, and confidentiality by implementing complex cryptographic operations including hash functions and random key generation. In this paper, the three main phases of the proposed standard, i.e., Network Formation, Rekeying, and Message Exchange, are simulated and tested on Electronic Control Units (ECUs) supporting CAN-FD network to evaluate the vehicle system performance such as security overhead (i.e. processing time and network bandwidth).
Technical Paper

Challenges with Introduction of X-by-Wire Technologies to Passenger Vehicles and Light Trucks with Respect to Functional Safety, Cybersecurity and Availability

2023-04-11
2023-01-0581
Classical vehicle production had over a long period limitation in bringing the driving commands to the actuators for vehicle motion (Engine, Steering, Braking). Steering columns, hydraulic tubes or steel cables needed to be placed between driver and actuator. Change begun with introduction of e-gas systems. Mechanical cables were replaced by thin electric signal wires. For addressing the steering and braking systems, the technical solutions and legal standardizations were not given at this point of time. Nowadays the OEM are starting huge EE-Architecture transformation for manifold reasons and they have the chance to get rid of long hydraulic tubes for braking and solid metal columns for steering. X-by-wire is the keyword, also driven by the plans for higher AD (Autonomous Driving) levels for automated driving vehicles. Driven by new requirement (AD) it also offers new opportunities to design the vehicle in-cabin room.
Technical Paper

Using Ethernet or A Wireless Harness and Named Data Networking in Autonomous Tractor-Trailer Communication

2023-04-11
2023-01-0924
Autonomous truck and trailer configurations face challenges when operating in reverse due to the lack of sensing on the trailer. It is anticipated that sensor packages will be installed on existing trailers to extend autonomous operations while operating in reverse in uncontrolled environments, like a customer's loading dock. The SAE J2497 power line communications (PLC) between the trailer and the tractor cannot support high bandwidth and low latency communication. This paper explores the impact of using Ethernet or a wireless medium for commercial trailer-tractor communication on the lifecycle and operation of trailer electronic control units (ECUs) from a Systems Engineering perspective to address integration, interoperability, scalability, security, and the updates. Additionally, content-based and host-based networking approaches for in-vehicle communication, such as Named Data Networking (NDN) and IP-based networking are compared.
Technical Paper

Review on CAN Bus Protocol: Attacks, Difficulties, and Potential Solutions

2023-04-11
2023-01-0926
The new generation vehicles these days are managed by networked controllers. A large portion of the networks were planned with little worry about security which has recently roused reserchers to exhibit different sorts of attacks against the system. this paper is talking about the liabilities of the Controller Area Network (CAN) inside invehicle communication protocol alongside a few potential goes after that could be taken advantage of against it. Moreover, this paper present a portion of the security arrangements proposed in the present status of examination to defeat the assaults. In any case, the fundamental objective of this paper is to feature a comprehensive methodology known as intrusion detection system (IDS) which has been a significant device in getting networks and data systems over the course of the last many years. To the best of our insight, there is no recorded writing on a thorough outline of IDS execution explicitly in the CAN transport network system.
Technical Paper

Deep Learning Based Automotive Requirements Analysis

2023-04-11
2023-01-0864
Automotive system functionalities spread over a wide range of sub-domains ranging from non-driving related components to complex autonomous driving related components. The requirements to design and develop these components span across software, hardware, firmware, etc. elements. The successful development of these components to achieve the needs from the stockholders requires accurate understanding and traceability of the requirements of these component systems. The high level customer requirements transformation into low level granularity requires an efficient requirement engineer. The manual understanding of the customer requirements from the requirement documents are influenced by the context and the knowledge gap of the requirement engineer in understanding and transforming the requirements.
Technical Paper

Using AADL to Assess Architectural Concerns for Cyber Security

2023-03-07
2023-01-0998
We describe how we apply the SAE AS 5506 Architecture and Analysis Design Language (AADL) [4] to reason about contextual and architectural concerns for cyber security. A system’s cyber security certification requires verification that the system’s cyber security mechanisms are correct, non-bypassable, and tamper-resistant. We can verify correctness by examining the mechanism itself, but verifying the other qualities requires us to examine the context in which that mechanism resides. Understanding that context and validating the system’s evolving design against that context is an objective for the Architecture Centric Virtual Integration Process (ACVIP), an AADL-based approach to model and detect system design defects before they become too costly to fix. We describe our work to apply AADL to assess non-bypassability and tamper-resistance. The results of our research - tool plugins for cyber security architectural validation - support system developers today in their ACVIP activities.
Technical Paper

Identification and Verification of Attack-Tree Threat Models in Connected Vehicles

2022-12-22
2022-01-7087
As a result of the ever-increasing application of cyber-physical components in the automotive industry, cybersecurity has become an urgent topic. Adapting technologies and communication protocols like Ethernet and WiFi in connected vehicles yields many attack scenarios. ...Consequently, ISO/SAE 21434 and UN R155 (2021) define a standard and regulatory framework for automotive cybersecurity, Both documents follow a risk management-based approach and require a threat modeling methodology for risk analysis and identification. ...Initially, we transform cybersecurity guidelines to attack trees, and then we use their formal interpretations to assess the vehicle’s design.
Technical Paper

Research on the Development Path and Policy Recommendations of Vehicle Infrastructure Cooperation

2022-12-22
2022-01-7065
By looking into the vehicle-infrastructure cooperation (VIC) which is oriented towards intelligent, networked and integrated development, this paper analyzes and proposes the essence and development direction of Intelligent Vehicle Infrastructure Cooperation Systems (I-VICS). With an in-depth analysis of technologies of core importance to VIC and influence factors that constrain VIC development as a whole, the paper comes up with a technological route for VIC, and identifies a direction for vehicle-infrastructure cooperative development that progresses from primary to intermediate cooperation, then to advanced cooperation, and finally to full-fledged cooperation. Policy recommendations aiming at strengthening top-level design, building an integrated vehicle-infrastructure-cloud platform, expediting independence of key techs, building robust standards and regulations for VIC, enhancing workforce development as well as greater efforts at market promotion are put forward.
X