Refine Your Search

Topic

Author

Affiliation

Search Results

Technical Paper

Evaluating Cybersecurity Vulnerabilities in V2X Communications

2022-03-29
2022-01-0120
Hence, there is a need for these V2X communications to be secured and reliable by ensuring that the cybersecurity properties like Confidentiality, Integrity, and Availability (CIA) are not compromised. ...This paper evaluates the potential cybersecurity use-cases developed, focusing on vulnerabilities like black hole attack, sybil attack and timing attack in V2X communications. ...The proposed cybersecurity vulnerabilities were tested and evaluated on FEV’s Smart Vehicle Demonstrator. Furthermore, the best practice countermeasure methods to avoid and overcome the risks identified based on the results were also discussed.
Technical Paper

Functional verification and validation of secure controller area network (CAN) communication

2022-03-29
2022-01-0110
In agriculture industry, increasing use of Vehicle Internet of Things (IoT), telematics and emerging technologies are resulting in smarter machines with connected solutions. Inter and Intra Communication with vehicle to vehicle and inside vehicle - Electronic Control Unit (ECU) to ECU or ECU to sensor, requirement for flow of data increased in-turn resulting in increased need for secure communication. In this paper, we focus on functional verification and validation of secure Controller Area Network (CAN) for intra vehicular communication to establish confidentiality, integrity, authenticity, and freshness of data, supporting safety, advanced automation, protection of sensitive data and IP (Intellectual Property) protection. Network security algorithms and software security processes are the layers supporting to achieve our cause. Test environment setup with secured hardware and simulated models, test scenarios and test data created to achieve our objective.
Research Report

Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure

2021-12-15
EPR2021030
Information and communication technology is fundamentally changing the way we live and operate in cities, such as instant access to events, transportation, bookings, payments, and other services. At the same time, three “megatrends” in the automotive industry—self-driving, electrification, and advanced manufacturing technology—are enabling the design of innovative, application-specific vehicles that capitalize on city connectivity. Applications could countless; however, they also need to be safe and securely integrated into a city’s physical and digital infrastructure, and into the overall urban ecosystem. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure examines the current state of the industry, the developments in automated driving and robotics, and how these new urban, self-driving city applications are different. It also analyzes higher level challenges for urban applications.
Research Report

Unsettled Issues Concerning Urban Air Mobility Infrastructure

2021-11-15
EPR2021025
Urban air mobility (UAM) refers to urban transportation systems that move people by air. UAM offers the potential for reducing traffic congestion in cities and providing an integrated approach to urban mobility. With the emergence of electric vertical takeoff and landing (eVTOL) aircraft, drone technology, and the possibility of automated aircraft, interest in this topic has grown considerably for private sector solution providers—including aerospace and technology companies—as well as urban planners and transportation professionals. Unsettled Issues Concerning Urban Air Mobility Infrastructure discusses the infrastructure requirements to effectively integrate UAM services into the overarching urban transportation system to enable multimodal trips and complete origin to destination travel. Click here to access the full SAE EDGETM Research Report portfolio.
Research Report

Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation

2021-09-13
EPR2021020
Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decades, cyber-attacks on airports keep coming, but most airport lack essential means to confront such cyber-attacks. ...These missing means are not technical tools, but rather holistic regulatory directives, technical and process standards, guides, and best practices for airports cybersecurity—even airport cybersecurity concepts and basic definitions are missing in certain cases. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity. ...Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity.
Technical Paper

A Controller Area Network Bus Identity Authentication Method Based on Hash Algorithm

2021-07-14
2021-01-5077
With the development of vehicle intelligence and the Internet of Vehicles, how to protect the safety of the vehicle network system has become a focus issue that needs to be solved urgently. The Controller Area Network (CAN) bus is currently a very widely used vehicle-mounted bus, and its security largely determines the degree of vehicle-mounted information security. The CAN bus lacks adequate protection mechanisms and is vulnerable to external attacks such as replay attacks, modifying attacks, and so on. On the basis of the existing work, this paper proposes an authentication method that combines Hash-based Message Authentication Code (HMAC)-SHA256 and Tiny Encryption Algorithm (TEA) algorithms. This method is based on dynamic identity authentication in challenge/response made and combined with the characteristics of the CAN bus itself as it achieves the identity authentication between the gateway and multiple electronic control units (ECUs).
Technical Paper

Safe Operations at Roadway Junctions - Design Principles from Automated Guideway Transit

2021-06-16
2021-01-1004
This paper describes a system-level view of a fully automated transit system comprising a fleet of automated vehicles (AVs) in driverless operation, each with an SAE level 4 Automated Driving System, along with its related safety infrastructure and other system equipment. This AV system-level control is compared to the automatic train control system used in automated guideway transit technology, particularly that of communications-based train control (CBTC). Drawing from the safety principles, analysis methods, and risk assessments of CBTC systems, comparable functional subsystem definitions are proposed for AV fleets in driverless operation. With the prospect of multiple AV fleets operating within a single automated mobility district, the criticality of protecting roadway junctions requires an approach like that of automated fixed-guideway transit systems, in which a guideway switch zone “interlocking” at each junction location deconflicts railway traffic, affirming safe passage.
Journal Article

Using Delphi and System Dynamics for IoT Cybersecurity: Preliminary Airport Implications

2021-03-02
2021-01-0019
Day by day, airports adopt more IoT devices. However, airports are not exempt from possible failures due to malware’s proliferation that can abuse vulnerabilities. Computer criminals can access, corrupt, and extract information from individuals or companies. This paper explains the development of a propagation model, which started with a Delphi process. We discuss the preliminary implications for airports of the simulation model built from the Delphi recommendations.
Technical Paper

Technical Trends of the Intelligent Connected Vehicle and Development Stage Division for Freeway Traffic Control

2020-12-30
2020-01-5134
It is deemed that currently the intelligent connected vehicle (ICV) is in its early stage of development, and it will go through multiple development stages in the future to realize its final goal—autonomous driving. Based on the existing ICV researches, this paper believes that ICV can be used to improve the efficiency and safety of freeway. The current research of ICV has two main directions: one focuses on the traffic flow characteristics of vehicles with different attributes, the other is concerned with using ICV to reduce congestion. From the policies issued by countries around the world and the development plans promoted by major vehicle manufacturers, the future development trends and challenges of ICV are analyzed. ICV must overcome all the shortcomings to achieve its final goal, including insufficient hardware capabilities or excessive cost, and the degree of intelligence that needs to be improved.
Technical Paper

Service Analysis of Autonomous Driving

2020-12-30
2020-01-5194
Autonomous driving represents the ultimate goal of future automobile development. As a collaborative application that integrates vehicles, road infrastructure, network and cloud, autonomous driving business requires a high-degree dynamic cooperation among multiple resources such as data, computing and communications that are distributed throughout the system. In order to meet the anticipated high demand for resources and performance requirements of autonomous driving, and to ensure the safety and comfort of the vehicle users and pedestrians, a top concern of autonomous driving is to understand the system requirements for resources and conduct an in-depth analysis of the autonomous driving business. In this context, this paper presents a comprehensive analysis of the typical business for autonomous driving and establishes an analysis model for five common capabilities, i.e. collection, transmission, intelligent computing, human-machine interaction (HMI), and security.
Research Report

Unsettled Topics Concerning Autonomous Public Transportation Systems

2020-10-30
EPR2020020
With billions of dollars of investment and events like DARPA’s Grand Challenges automated driving technology has been making its way toward commercialization. While the enabling technology for SAE Level 4 and 5 automated vehicles (AV) has not yet matured, specific restricted-use models such as “robo-taxis” and automated truck convoying show great promise. Now, cities are across the world are looking to AVs to solve their public transportation issues. With low speeds and fixed route, public transportation is an ideal application for AVs. From a business angle, AVs could leverage existing public transport models and infrastructure while providing superior quality of service for disadvantaged communities. Yet, dense urban environments—which would benefit from automated transportation the most—present unique challenges and public sector requirements. This SAE EDGE™ Research Report by Dr.
Research Report

Unsettled Topics in the Application of Satellite Navigation to Air Traffic Management

2020-05-27
EPR2020010
Contemporary air traffic management (ATM) challenges are both (1) acute and (2) growing at rates far outpacing established ways for absorbing technological innovation. Lack of timely response will guarantee failure to meet demands. Immediately that creates a necessity to identify means of coping and judging new technologies based on possible speed of adoption. Paralleling the challenges are developments in capability, both recent and decades old. Some steps (e.g., Global Positioning System (GPS) backup) are well known and, in fact, should have progressed further long ago. Others (e.g., sharing raw measurements instead of position fixes) are equally well known and, if followed by further flight tests initiated (and successful) years ago, would have produced a wealth of in-flight experience by now if development had continued. Other possibilities (e.g., automated pilot override) are much less common and are considered largely experimental.
Technical Paper

Selftrust - A Practical Approach for Trust Establishment

2020-04-14
2020-01-0720
In recent years, with increase in external connectivity (V2X, telematics, mobile projection, BYOD) the automobile is becoming a target of cyberattacks and intrusions. Any such intrusion reduces customer trust in connected cars and negatively impacts brand image (like the recent Jeep Cherokee hack). To protect against intrusion, several mechanisms are available. These range from a simple secure CAN to a specialized symbiote defense software. A few systems (e.g. V2X) implement detection of an intrusion (defined as a misbehaving entity). However, most of the mechanisms require a system-wide change which adds to the cost and negatively impacts the performance. In this paper, we are proposing a practical and scalable approach to intrusion detection. Some benefits of our approach include use of existing security mechanisms such as TrustZone® and watermarking with little or no impact on cost and performance. In addition, our approach is scalable and does not require any system-wide changes.
Technical Paper

A Safety and Security Testbed for Assured Autonomy in Vehicles

2020-04-14
2020-01-1291
Connectivity and autonomy in vehicles promise improved efficiency, safety and comfort. The increasing use of embedded systems and the cyber element bring with them many challenges regarding cyberattacks which can seriously compromise driver and passenger safety. Beyond penetration testing, assessment of the security vulnerabilities of a component must be done through the design phase of its life cycle. This paper describes the development of a benchtop testbed which allows for the assurance of safety and security of components with all capabilities from Model-in-loop to Software-in-loop to Hardware-in-loop testing. Environment simulation is obtained using the AV simulator, CARLA which provides realistic scenarios and sensor information such as Radar, Lidar etc. MATLAB runs the vehicle, powertrain and control models of the vehicle allowing for the implementation and testing of customized models and algorithms.
Technical Paper

Dyno-in-the-Loop: An Innovative Hardware-in-the-Loop Development and Testing Platform for Emerging Mobility Technologies

2020-04-14
2020-01-1057
Today’s transportation is quickly transforming with the nascent advent of connectivity, automation, shared-mobility, and electrification. These technologies will not only affect our safety and mobility, but also our energy consumption, and environment. As a result, it is of unprecedented importance to understand the overall system impacts due to the introduction of these emerging technologies and concepts. Existing modeling tools are not able to effectively capture the implications of these technologies, not to mention accurately and reliably evaluating their effectiveness with a reasonable scope. To address these gaps, a dynamometer-in-the-loop (DiL) development and testing approach is proposed which integrates test vehicle(s), chassis dynamometer, and high fidelity traffic simulation tools, in order to achieve a balance between the model accuracy and scalability of environmental analysis for the next generation of transportation systems.
Technical Paper

State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques for In-Vehicle Security

2020-04-14
2020-01-0721
Controller area network (CAN) is used as a legacy protocol for in-vehicle communication. However, it lacks basic security features such as message authentication, integrity, confidentiality, etc., because the sender information in the message is missing. Hence, it is prone to different attacks like spoofing attacks, denial of service attacks, man in the middle and masquerade attacks. Researchers have proposed various techniques to detect and prevent these attacks, which can be split into two classes: (a) MAC-based techniques and (b) intrusion detection-based techniques. Further, intrusion detection systems can be divided into four categories: (i) message parameter- based, (ii) entropy-based, (iii) machine Learning-based and (iv) fingerprinting-based. This paper details state-of- the-art survey of fingerprinting-based intrusion detection techniques. In addition, the advantages and limitations of different fingerprinting-based intrusion detection techniques methods will be discussed.
Research Report

Unsettled Impacts of Integrating Automated Electric Vehicles into a Mobility-as-a-Service Ecosystem and Effects on Traditional Transportation and Ownership

2019-12-20
EPR2019004
The current business model of the automotive industry is based on individual car ownership, yet new ridesharing companies such as Uber and Lyft are well capitalized to invest in large, commercially operated, on-demand mobility service vehicle fleets. Car manufacturers like Tesla want to incorporate personal car owners into part-time fleet operation by utilizing the company’s fleet service. These robotaxi fleets can be operated profitably when the technology works in a reliable manner and regulators allow driverless operation. Although Mobility-as-a-Service (MaaS) models of private and commercial vehicle fleets can complement public transportation models, they may contribute to lower public transportation ridership and thus higher subsidies per ride. This can lead to inefficiencies in the utilization of existing public transportation infrastructure.
Technical Paper

Transformational Technologies Reshaping Transportation - An Academia Perspective

2019-10-14
2019-01-2620
This paper and the associated lecture present an overview of technology trends and of market and business opportunities created by technology, as well as of the challenges posed by environmental and economic considerations. Commercial vehicles are one of the engines of our economy. Moving goods and people efficiently and economically is a key to continued industrial development and to strong employment. Trucks are responsible for nearly 70% of the movement of goods in the USA (by value) and represent approximately 300 billion of the 3.21 trillion annual vehicle miles travelled by all vehicles in the USA while public transit enables mobility and access to jobs for millions of people, with over 10 billion trips annually in the USA creating and sustaining employment opportunities.
Research Report

Unsettled Technology Areas in Autonomous Vehicle Test and Validation

2019-06-12
EPR2019001
Automated driving system (ADS) technology and ADS-enabled/operated vehicles - commonly referred to as automated vehicles and autonomous vehicles (AVs) - have the potential to impact the world as significantly as the internal combustion engine. Successful ADS technologies could fundamentally transform the automotive industry, civil planning, the energy sector, and more. Rapid progress is being made in artificial intelligence (AI), which sits at the core of and forms the basis of ADS platforms. Consequently, autonomous capabilities such as those afforded by advanced driver assistance systems (ADAS) and other automation solutions are increasingly becoming available in the marketplace. To achieve highly or fully automated or autonomous capabilities, a major leap forward in the validation of these ADS technologies is required. Without this critical cog, helping to ensure the safety and reliability of these systems and platforms, the full capabilities of ADS technology will not be realized.
X