Refine Your Search

Topic

Author

Affiliation

Search Results

Technical Paper

“Connected Vehicles – A Testing Approach and Methodology”

2021-09-22
2021-26-0450
With the introduction of Connected vehicles, it is possible to extend the limited horizon of vehicles on the road by collective perceptions, where vehicles periodically share their information with others vehicles / servers using cloud. Nevertheless, by the time the connected vehicle spread expands, it is critical to understand the validation techniques which can be used to ensure a flawless transfer of data and connectivity. Usually the connected vehicle validation is limited to Application layer only in most of the OEMs. However in this work, we focus on validation of all the 4 layers involved namely, Physical hardware layer, Communication layer, Cloud platform and Application layer. For physical and communication layer, we simulated the in-vehicle environment using standalone vehicle electronic control units (ECUs) which communicate with the telematics control unit (TCU) available in the vehicle and a localized load box for replicating the actual load cases.
Technical Paper

Reliability-Oriented Distributed Test Strategy for FOTA/SOTA enabled Edge Device

2021-09-22
2021-26-0476
In order to enhance customer experience and to reduce time to market, the manufacturers are constantly in need of being able to update software/firmware of the Electronic Control units (ECU) when the vehicle is in field operations. The updates could be a bug fix or a new feature release. Until the recent years, the updation of software/firmware used to be done using a physical hardwired connection to the Vehicle in a workshop. However, with the element of connectivity being added to the vehicle, the updation of software can be done remotely and wirelessly over the air using a feature called Flash over the air (FOTA) and Software over the air (SOTA). In order to safeguard the telematics ECU from tampering or hacking, the manufacturers are doing away with the ports on the underlying hardware through which manual flashing used to be done. This means that, the only option available to flash or update the ECU is using FOTA/SOTA.
Technical Paper

EVALUATION OF PROTECTED BOOT MECHANISM IN AUTOMOTIVE DOMAIN

2021-09-22
2021-26-0506
In the recent years the electronics and software in the car has been increased with the request of new features. Todays vehicles are vulnerable to cyber-attacks due to their connectivity with internet and infrastructure. Due to this security in the automotive domain has gained importance. Earlier the software updates were done at the service station and probability of tampering the software was less. As the vehicles are connected through internet, the car manufacturers are shifting towards over the air updates (OTA). It should be ensured that only authentic software is executed on the micro controller. Protected boot is a security control used to ensure authentic software is executed on the microcontroller. Protected boot is a mechanism in which authenticity and integrity of the software is checked during the booting phase by using the chain of Trust mechanism. Protected boot can be achieved by using authenticated boot or secure boot mechanism.
Technical Paper

Detection method for Cybersecurity attack on Connected vehicles

2021-09-21
2021-01-1249
We propose a cybersecurity attack detection and defending mechanism algorithm with the help of onboard cybersecurity diagnostic system on an electronic control unit (ECU) on connected vehicles. ...This control method autonomously diagnose a cybersecurity problem in a vehicle’s onboard system using an onboard diagnostic (OBD) interface, such as OBD2 and display freeze-frame data from the sensors and components of the vehicle at the time when a fault by a cyberattack is detected, All of this is achieved in an communication structure where the vehicle sensors and onboard ECUs are connected with each other via an internal network
Research Report

Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles

2021-09-13
EPR2021019
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used?
Research Report

Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation

2021-09-13
EPR2021020
Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decades, cyber-attacks on airports keep coming, but most airport lack essential means to confront such cyber-attacks. ...These missing means are not technical tools, but rather holistic regulatory directives, technical and process standards, guides, and best practices for airports cybersecurity—even airport cybersecurity concepts and basic definitions are missing in certain cases. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity. ...Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity.
Technical Paper

A Controller Area Network Bus Identity Authentication Method Based on Hash Algorithm

2021-07-14
2021-01-5077
With the development of vehicle intelligence and the Internet of Vehicles, how to protect the safety of the vehicle network system has become a focus issue that needs to be solved urgently. The Controller Area Network (CAN) bus is currently a very widely used vehicle-mounted bus, and its security largely determines the degree of vehicle-mounted information security. The CAN bus lacks adequate protection mechanisms and is vulnerable to external attacks such as replay attacks, modifying attacks, and so on. On the basis of the existing work, this paper proposes an authentication method that combines Hash-based Message Authentication Code (HMAC)-SHA256 and Tiny Encryption Algorithm (TEA) algorithms. This method is based on dynamic identity authentication in challenge/response made and combined with the characteristics of the CAN bus itself as it achieves the identity authentication between the gateway and multiple electronic control units (ECUs).
Technical Paper

Safe Operations at Roadway Junctions - Design Principles from Automated Guideway Transit

2021-06-16
2021-01-1004
This paper describes a system-level view of a fully automated transit system comprising a fleet of automated vehicles (AVs) in driverless operation, each with an SAE level 4 Automated Driving System, along with its related safety infrastructure and other system equipment. This AV system-level control is compared to the automatic train control system used in automated guideway transit technology, particularly that of communications-based train control (CBTC). Drawing from the safety principles, analysis methods, and risk assessments of CBTC systems, comparable functional subsystem definitions are proposed for AV fleets in driverless operation. With the prospect of multiple AV fleets operating within a single automated mobility district, the criticality of protecting roadway junctions requires an approach like that of automated fixed-guideway transit systems, in which a guideway switch zone “interlocking” at each junction location deconflicts railway traffic, affirming safe passage.
Technical Paper

It Takes a Village: A Case Study of Business Development and Innovation in a UAS/AUS Ecosystem to Address Critical Industry Challenges

2021-06-16
2021-01-1002
Entrepreneurial innovation that spurs economic development requires a collaborative cluster of cooperative effort, across a diverse ecosystem of partners. Literature provides resounding evidence to support the notion that an innovative, entrepreneurial ecosystem is critical to both successful economic development and industry sector growth. The UAS/AUS industry sector is a fast-growing sector across the United States, with regional leadership demonstrated in North Dakota, California, North Carolina, New York, Oklahoma, Texas and New Mexico. This case study is focused on investigating how the North Dakota autonomous systems ecosystem continues to evolves and develop mechanisms and partnerships to address industry pain points, facilitate cutting edge research, ensure high-quality UAS/AUS testing, and support an adaptive business development pipeline across the entrepreneurial life cycle.
Technical Paper

The Role of Safety Critical Architecture in an Evolving Ecosystem

2021-06-16
2021-01-1000
There are many industries where safety is a major, if not the primary, concern, such as aviation and nuclear power. These industries rely on many layers of standards for designing, developing, and deploying safety critical systems and technologies. While unmanned aircraft system (UAS) operations and UAS Traffic Management (UTM) are often touted as “safety critical”, the systems and technologies are not being held to the same standards as traditional aviation, with its long pedigree of safety. There are multiple reasons for this dichotomy. One such reason is that design assurance standards, such as DO-178 for software, do not fit with modern technology such as web-based communication and machine learning. At the architecture level, the federated approach to UTM has led to a void in the Systems Engineering process. Nobody “owns” the entire system and therefore nobody owns the Systems Engineering process where many safety related design decisions are traditionally made.
Research Report

Unsettled Issues Regarding Autonomous Vehicles and Open-source Software

2021-04-21
EPR2021009
Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
Technical Paper

Streamlined Process for Cloud Based Diagnostics Using Amazon Web Services

2021-04-06
2021-01-0159
In the age of 5G, the cloud constitutes a massive computational resource. Such capability is greatly underutilized, especially for the purpose of vehicle diagnostics and prognostics. Diagnostics and prognostics run mostly in the limited and cost sensitive electronic module of the vehicle. Utilizing vehicle connectivity, along with the massive capability of the cloud would allow the deployment of smarter algorithms that provide improved vehicle performance and operation management. In this paper, a streamlined process to develop and deploy off-board diagnostics is presented. The process included developing multiphysics digital twins and running the diagnostics off-board. It was demonstrated on a fleet of virtual Hybrid Electric Vehicles (HEV). The Digital Twin replica was created using Simulink® and Simscape®. The microcontroller used to demonstrate the diagnostic is a Raspberry Pi hardware running in real time.
Technical Paper

Deep Learning Based Real Time Vulnerability Fixes Verification Mechanism for Automotive Firmware/Software

2021-04-06
2021-01-0183
Software vulnerability management is one of the most critical and crucial security techniques, which analyzes the automotive software/firmware across the digital cockpit, ADAS, V2X, etc. domains for vulnerabilities, and provides security patches for the concerned Common Vulnerabilities and Exposures (CVE). The process of automotive SW/FW vulnerability management system between the OEMs and vendors happen through a channel of fixing a certain number of vulnerabilities by 1st tier supplier which needs to be verified in front of OEMs for the fixed number and type of patches in there deliverable SW/FW. The gap of verification between for the fixed patches between the OEMs and 1st tier supplier requires a reliable human independent intelligent technique to have a trustworthiness of verification.
Technical Paper

Secure Controller Area Network Logging

2021-04-06
2021-01-0136
Practical encryption is an important tool in improving the cybersecurity posture of vehicle data loggers and engineering tools. However, low-cost embedded systems struggle with reliably capturing and encrypting all frames on the vehicle networks.
Technical Paper

A Domain-Centralized Automotive Powertrain E/E Architecture

2021-04-06
2021-01-0786
This paper proposes a domain-centralized powertrain E/E (electrical and/or electronic) architecture for all-electric vehicles that features: a powerful master controller (domain controller) that implements most of the functionality of the domain; a set of smart actuators for electric motor(s), HV (High Voltage) battery pack, and thermal management; and a gateway that routes all hardware signals, including digital and analog I/O, and field bus signals between the domain controller and the rest of the vehicle that is outside of the domain. Major functional safety aspects of the architecture are presented and a safety architecture is proposed. The work represents an early E/E architecture proposal. In particular, detailed partitioning of software components over the domain’s Electronic Control Units (ECUs) has not been determined yet; instead, potential partitioning schemes are discussed.
Technical Paper

Vehicular Visual Sensor Blinding Detection by Integrating Variational Autoencoders with SVM

2021-04-06
2021-01-0144
The advancements of autonomous vehicles or advanced driver assistance systems in terms of safety, driving experience, and comfort against manual driving results in extensive adoption of them across the modern automotive sector. The autonomous vehicles are equipped with numerous sensing and actuating components both inside as well as outside the vehicles to perceive the environment, perform path planning, and intelligently control the autonomous vehicles. The perception mechanism includes fused information of multiple sensors such as camera, RADAR, and LiDAR to effectively understand all the dynamic driving environments. Some of the intentional and unintentional mechanisms such as cyber-attacks and natural variations of the environment, etc., across the sensor's external interface with the environment cause the degradation of the perception mechanism.
Technical Paper

Integrating Fuzz Testing into the Cybersecurity Validation Strategy

2021-04-06
2021-01-0139
Therefore, modern cybersecurity validation is highly stressed for finding security vulnerabilities and robustness issues early and systematically at every stage of the product development process. ...The integration of a sophisticated fuzz testing program within the overall cybersecurity validation strategy allows for accommodating towards these challenging demands. In this paper, we review a general automotive cybersecurity engineering process containing functional testing, vulnerability scanning and penetration testing, and highlight shortcomings that can be complemented by fuzz testing. ...In this paper, we review a general automotive cybersecurity engineering process containing functional testing, vulnerability scanning and penetration testing, and highlight shortcomings that can be complemented by fuzz testing.
Technical Paper

Cybersecurity Metrics for Automotive Systems

2021-04-06
2021-01-0138
With the increased need for cybersecurity in automotive systems due to the development of more advanced technologies and corresponding increased threat vectors, coupled with the upcoming ISO/SAE 21434 cybersecurity standard for automotive systems and cybersecurity regulations in UNECE WP.29, it is becoming increasingly important for auto manufacturers and suppliers to have a clear and common understanding and agreement of cybersecurity metrics for the development and deployment of vehicles. ...Cybersecurity for automotive systems is challenging and one of the major challenges is how to measure this specific system property. ...With the increased need for cybersecurity in automotive systems due to the development of more advanced technologies and corresponding increased threat vectors, coupled with the upcoming ISO/SAE 21434 cybersecurity standard for automotive systems and cybersecurity regulations in UNECE WP.29, it is becoming increasingly important for auto manufacturers and suppliers to have a clear and common understanding and agreement of cybersecurity metrics for the development and deployment of vehicles.
Technical Paper

Adopting Aviation Safety Knowledge into the Discussions of Safe Implementation of Connected and Autonomous Road Vehicles

2021-04-06
2021-01-0074
The development of connected and autonomous vehicles (CAVs) is progressing fast. Yet, safety and standardization-related discussions are limited due to the recent nature of the sector. Despite the effort that is initiated to kick-start the study, awareness among practitioners is still low. Hence, further effort is required to stimulate this discussion. Among the available works on CAV safety, some of them take inspiration from the aviation sector that has strict safety regulations. The underlying reason is the experience that has been gained over the decades. However, the literature still lacks a thorough association between automation in aviation and the CAV from the safety perspective. As such, this paper motivates the adoption of safe-automation knowledge from aviation to facilitate safer CAV systems.
Technical Paper

THARA - A Framework to Align the Functional Safety and Security Process in Automotive Domain

2021-04-06
2021-01-0148
The underlying systems are susceptible to safety and cybersecurity attacks as the involved ECUs are interconnected. The security attacks can lead to disrupting the safe operation of the vehicle while causing injury to the passengers. ...Consequently, the functional safety requirements and cybersecurity requirements can be aligned with each other. In this paper, a case study of the application of the THARA framework is presented through the risk analysis of safety and security threats applicable to the rear-view camera (RVC) feature of the vehicle.
X