Refine Your Search

Topic

Author

Affiliation

Search Results

Technical Paper

Wireless CAN adaptation for ZCU based using Zigbee protocol for efficient data transmission and data security

2024-10-17
2024-28-0036
This paper explores the integration of Wireless Controller Area Network (CAN) technology with the Zigbee protocol to enhance data transmission efficiency and security in Zonal Control Unit (ZCU) based systems. By combining Zigbee's wireless capabilities with CAN's established reliability, this integration aims to address these challenges while ensuring robust security measures. The integration of Wireless CAN with Zigbee protocol offers a promising solution to overcome the limitations of traditional wired communication architectures. Utilizing Zigbee's low-power, short-range wireless protocol facilitates seamless communication between ZCU modules, eliminating the need for physical connections and enhancing system flexibility. The adoption of Wireless CAN with Zigbee protocol presents an innovative solution for achieving efficient data transmission and robust data security in ZCU-based systems.
Technical Paper

Automotive security solution using Hardware Security Module (HSM)

2024-10-17
2024-28-0037
., intelligent vehicles with advance safe and secure features but all these advancements come with significant threat of cybersecurity risk. Therefore, providing an automobile that is safe and secure through cyber-attack is also got equal importance. ...In this paper, we will discuss some of the challenges and key application of cybersecurity in the automotive sector. We will also discuss some possible approaches to address these challenges and enhance the security and privacy of automotive systems. ...Certain Automotive cybersecurity applications include Secure ECU communication, Digital signature generation and verification, Secure V2X, In-vehicle infotainment (IVI) security, Secure key management and storage, Secure remote vehicle access and control, and Secure over-the-air (OTA) updates.
Technical Paper

Contextual Study of Security and Privacy in V2X Communication for Architecture & Networking products

2024-10-17
2024-28-0038
In recent times there has been an upward trend in "Connected Vehicles", which has significantly improved not only the driving experience but also the "ownership of the car". The use of state-of-the-art wireless technologies, such as vehicle-to-everything (V2X) connectivity, is crucial for its dependability and safety. V2X also effectively extends the information flow between the transportation ecosystem pedestrians, public infrastructure (traffic management system) and parking infrastructure, charging and fuel stations, Etc. V2X has a lot of potential to enhance traffic flow, boost traffic safety, and provide drivers and operators with new services. One of the fundamental issues is maintaining trustworthy and quick communication between cars and infrastructure. While establishing stable connectivity, reducing interference, and controlling the fluctuating quality of wireless transmissions, we have to ensure the Security and Privacy of V2I.
Technical Paper

A Simulation Framework for Evaluating the Cybersecurity of Autonomous Ground Vehicles

2024-09-16
2024-01-4113
Autonomous ground vehicles (AGV) are comprised of a network of interconnected components including sensors, drive-by-wire actuators, and on-board computing. This on-vehicle network is often connected to a larger network which may include a ground station, other autonomous systems, or remote servers. While AGV share many features with other mobile networked devices like cell phones, the AGV computing and networking architecture may be vulnerable in ways that other systems are not, and the consequences of an attack may result in more severe physical consequences. In this paper, we present a systematic study of the network architecture of an AGV system, a cross-domain evaluation of possible attack vectors for AGV, and an implementation of a simulated cyberphysical test range that reveals the real-world consequences of cyberphysical attacks on AGV.
Technical Paper

Impact Analysis of Cyberattacks in Electric Propulsion Systems for Hybrid Tracked Vehicles

2024-09-16
2024-01-4114
In the age of advancing digitalization and integrating complex electronics within modern vehicles, hybrid tracked vehicles (HTVs) are increasingly becoming susceptible to cybersecurity threats. Particularly vulnerable are the control units, which have become prime targets for adversarial exploitation due to their pivotal role in vehicle functionality.
Technical Paper

A MOSA Approach for Ground Vehicle System Enterprise Commonality

2024-09-16
2024-01-4118
We review architecture concepts adopted and refined in the Future Vertical Lift Architecture Framework, and their applicability to GCIA and MOSA in the ground vehicle domain, including Digital Backbone, Enterprise Key Interfaces, Enterprise Data Model, Transport Services, and Common Services. We also discuss how this MOSA approach combined with a Service Oriented Architecture (SOA) can enable Ground Vehicle System Enterprise commonality to deliver solutions for Multi-Domain Operations.
Technical Paper

Harnessing Advanced Technologies for Swarm Operations within CJADC2

2024-09-16
2024-01-4116
This paper explores the pivotal role of specific technologies— AI, TSN, Sensor Fusion, Autonomous Systems, and Cybersecurity — and MOSA-based open standards in enabling effective swarm operations within CJADC2 to detect, analyze, and respond to swarm threats in real-time across diverse platforms and domains and ensure compatibility with existing command and control infrastructure.
Research Report

Automated Vehicles and Infrastructure Enablers: Cybersecurity

2024-08-26
EPR2024018
Automated Vehicles and Infrastructure Enablers: Cybersecurity focuses on considerations regarding cybersecurity and AVs from the perspective of V2X infrastructure, including electric charging infrastructure. ...While weaponizing automated vehicles (AVs) seems unlikely, cybersecurity breaches may disrupt automated driving systems’ navigation, operation, and safety—especially with the proliferation of vehicle-to-everything (V2X) technologies. ...Effective cybersecurity standards, physical and digital security practices, and well-thought-out design can provide a layered approach to avoiding and mitigating cyber breaches for advanced driver assistance systems and AVs alike.
Technical Paper

Cybersecurity Approval Criteria: Application of UN R155

2024-07-02
2024-01-2983
The UN R155 regulation is the first automotive cybersecurity regulation and has made security a mandatory approval criterion for new vehicle types. ...These recommendations aim to enhance the comprehensiveness of the security assessment associated with UN R155, fostering a more uniform approach to evaluating cybersecurity in the context of vehicle type approvals.
Technical Paper

Enabling the Security of Global Time in Software-Defined-Vehicles (SGTS, MACsec)

2024-07-02
2024-01-2978
., driver assistance functions, intrusion detection system, vehicle diagnostics, external device authentication during vehicle diagnostics, vehicle-to-grid and so on). The cybersecurity attacks targeting the global time result in false time, accuracy degradation, and denial of service as stated in IETF RFC 7384 [2].
Technical Paper

Safety, ADAS, and Cybersecurity: Vol. 1

2024-05-03
EPRCOMPV152023
This chapter delves into the field of multi-agent collaborative perception (MCP) for autonomous driving: an area that remains unresolved. Current single-agent perception systems suffer from limitations, such as occlusion and sparse sensor observation at a far distance. To address this, three unsettled topics have been identified that demand immediate attention. First, it is crucial to establish normative communication protocols to facilitate seamless information sharing among vehicles. Second, collaboration strategies need to be defined, including identifying the need for specific collaboration projects, determining the collaboration partners, defining the content of collaboration, and establishing the integration mechanism. Finally, collecting sufficient data for MCP model training is vital. This includes capturing diverse modal data and labeling various downstream tasks as accurately as possible.
Technical Paper

Safety, ADAS, and Cybersecurity: Vol. 2

2024-05-03
EPRCOMPV162023
And as much as there are technical questions regarding network latency, bandwidth, cybersecurity, etc., aspects like human workload, attentiveness, and situational awareness also need to be clarified.
Research Report

Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

2024-04-22
EPR2024009
On the other hand, the potential risks associated with CAV deployment related to technical vulnerabilities are safety and cybersecurity issues that may arise from flawed hardware and software. Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. ...Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. ...This report also highlights the importance of establishing robust cybersecurity protocols and fostering digital trust in these vehicles to ensure safe and secure deployment in our modern transportation system.
Technical Paper

Evaluating Network Security Configuration (NSC) Practices in Vehicle-Related Android Applications

2024-04-09
2024-01-2881
Android applications have historically faced vulnerabilities to man-in-the-middle attacks due to insecure custom SSL/TLS certificate validation implementations. In response, Google introduced the Network Security Configuration (NSC) as a configuration-based solution to improve the security of certificate validation practices. NSC was initially developed to enhance the security of Android applications by providing developers with a framework to customize network security settings. However, recent studies have shown that it is often not being leveraged appropriately to enhance security. Motivated by the surge in vehicular connectivity and the corresponding impact on user security and data privacy, our research pivots to the domain of mobile applications for vehicles. As vehicles increasingly become repositories of personal data and integral nodes in the Internet of Things (IoT) ecosystem, ensuring their security moves beyond traditional issues to one of public safety and trust.
Technical Paper

Cybersecurity in the Context of Fail-Operational Systems

2024-04-09
2024-01-2808
The development of highly automated driving functions (AD) recently rises the demand for so called Fail-Operational systems for native driving functions like steering and braking of vehicles. Fail-Operational systems shall guarantee the availability of driving functions even in presence of failures. This can also mean a degradation of system performance or limiting a system’s remaining operating period. In either case, the goal is independency from a human driver as a permanently situation-aware safety fallback solution to provide a certain level of autonomy. In parallel, the connectivity of modern vehicles is increasing rapidly and especially in vehicles with highly automated functions, there is a high demand for connected functions, Infotainment (web conference, Internet, Shopping) and Entertainment (Streaming, Gaming) to entertain the passengers, who should no longer occupied with driving tasks.
Technical Paper

Security Requirements for Vehicle Security Gateways

2024-04-09
2024-01-2806
The NMFTA’s Vehicle Cybersecurity Requirements Woking Group (VCRWG), comprised of fleets, OEMs and cybersecurity experts, has worked the past few years to produce security requirements for Vehicle Network Gateways. ...Vehicle Network Gateways play an important role in vehicle cybersecurity – they are the component responsible for assuring vehicle network operations in the presence of untrustworthy devices on the aftermarket or diagnostics connectors.
Technical Paper

Vehicle Cyber Engineering (VCE) Testbed with CLaaS (Cyber-Security Labs as a Service)

2024-04-09
2024-01-2796
The VCE Laboratory testbeds are connected with an Amazon Web Services (AWS) cloud-based Cyber-security Labs as a Service (CLaaS) system, which allows students and researchers to access the testbeds from any place that has a secure internet connection. ...VCE students are assigned predefined virtual machines to perform designated cyber-security experiments. The CLaaS system has low administrative overhead associated with experiment setup and management. ...VCE Laboratory CLaaS experiments have been developed for demonstrating man-in-the-middle cyber-security attacks from actual compromised hardware or software connected with the TestCube.
X