Refine Your Search

Topic

Search Results

Technical Paper

Challenges in Integrating Cybersecurity into Existing Development Processes

2020-04-14
2020-01-0144
Strategies designed to deal with these challenges differ in the way in which added duties are assigned and cybersecurity topics are integrated into the already existing process steps. Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. ...Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. A cybersecurity development approach is frequently perceived as introducing impediments, that bear the risk of cybersecurity measures receiving a lower priority to reduce inconvenience. ...For an established development process and a team accustomed to this process, adding cybersecurity features to the product initially means inconvenience and reduced productivity without perceivable benefits.
Technical Paper

Wireless Charging for EV/HEV with Prescriptive Analytics, Machine Learning, Cybersecurity and Blockchain Technology: Ongoing and Future Trends

2019-04-02
2019-01-0790
Due to the rapid development in the technological aspect of the autonomous vehicle (AV), there is a compelling need for research in the field vehicle efficiency and emission reduction without affecting the performance, safety and reliability of the vehicle. Electric vehicle (EV) with rechargeable battery has been proved to be a practical solution for the above problem. In order to utilize the maximum capacity of the battery, a proper power management and control mechanism need to be developed such that it does not affect the performance, reliability and safety of vehicle. Different optimization techniques along with deterministic dynamic programming (DDP) approach are used for the power distribution and management control. The battery-operated electric vehicle can be recharged either by plug-in a wired connection or by the inductive mean (i.e. wirelessly) with the help of the electromagnetic field energy.
Technical Paper

Intelligent Vehicle Monitoring for Safety and Security

2019-04-02
2019-01-0129
The caveat to these additional capabilities is issues like cybersecurity, complexity, etc. This paper is an exploration into FuSa and CAVs and will present a systematic approach to understand challenges and propose potential framework, Intelligent Vehicle Monitoring for Safety and Security (IVMSS) to handle faults/malfunctions in CAVs, and specifically autonomous systems.
Technical Paper

Secure Vehicular Communication Using Blockchain Technology

2020-04-14
2020-01-0722
Also, all the existing methods for vehicular communication rely on a centralized server which itself invite massive cyber-security threats. These threats and challenges can be addressed by using the Blockchain (BC) technology, where each transaction is logged in a decentralized immutable BC ledger.
Technical Paper

Securing Connected Vehicles End to End

2014-04-01
2014-01-0300
As vehicles become increasingly connected with the external world, they face a growing range of security vulnerabilities. Researchers, hobbyists, and hackers have compromised security keys used by vehicles' electronic control units (ECUs), modified ECU software, and hacked wireless transmissions from vehicle key fobs and tire monitoring sensors. Malware can infect vehicles through Internet connectivity, onboard diagnostic interfaces, devices tethered wirelessly or physically to the vehicle, malware-infected aftermarket devices or spare parts, and onboard Wi-Fi hotspot. Once vehicles are interconnected, compromised vehicles can also be used to attack the connected transportation system and other vehicles. Securing connected vehicles impose a range of unique new challenges. This paper describes some of these unique challenges and presents an end-to-end cloud-assisted connected vehicle security framework that can address these challenges.
Technical Paper

Trust-Based Control and Scheduling for UGV Platoon under Cyber Attacks

2019-04-02
2019-01-1077
Unmanned ground vehicles (UGVs) may encounter difficulties accommodating environmental uncertainties and system degradations during harsh conditions. However, human experience and onboard intelligence can may help mitigate such cases. Unfortunately, human operators have cognition limits when directly supervising multiple UGVs. Ideally, an automated decision aid can be designed that empowers the human operator to supervise the UGVs. In this paper, we consider a connected UGV platoon under cyber attacks that may disrupt safety and degrade performance. An observer-based resilient control strategy is designed to mitigate the effects of vehicle-to-vehicle (V2V) cyber attacks. In addition, each UGV generates both internal and external evaluations based on the platoons performance metrics. A cloud-based trust-based information management system collects these evaluations to detect abnormal UGV platoon behaviors.
Technical Paper

Simulation Modeling of Malware for IoT: Implications for Aviation

2021-03-02
2021-01-0019
This paper presents the results of a study of the malware, which will affect the Internet of Things (IoT) and its implications for aviation. First, the Delphi methodology is used in order to identify the type of malware which will be more prevalent in IoT devices. Second, several models are developed using system dynamics to study the propagation of malware, and recent cases are simulated (e.g., Sartori Botnet) to study the dynamics of propagation and potential schemes of protection. Third, a generic risk management framework is presented and discussed. Then, guidelines for the aviation industry are considered.
Journal Article

A Novel Assessment and Administration Method of Autonomous Vehicle

2020-04-14
2020-01-0708
As a promising strategic industry group that is rapidly evolving around the world, autonomous vehicle is entering a critical phase of commercialization from demonstration to end markets. The global automotive industry and governments are facing new common topics and challenges brought by autonomous vehicle, such as how to test, assess, and administrate the autonomous vehicle to ensure their safe running in real traffic situations and proper interactions with other road users. Starting from the facts that the way to autonomous driving is the process of a robot or a machine taking over driving tasks from a human. This paper summarizes the main characteristics of autonomous vehicle which are different from traditional one, then demonstrates the limitations of the existing certification mechanism and related testing methods when applied to autonomous vehicle.
Technical Paper

Evaluating Trajectory Privacy in Autonomous Vehicular Communications

2019-04-02
2019-01-0487
Autonomous vehicles might one day be able to implement privacy preserving driving patterns which humans may find too difficult to implement. In order to measure the difference between location privacy achieved by humans versus location privacy achieved by autonomous vehicles, this paper measures privacy as trajectory anonymity, as opposed to single location privacy or continuous privacy. This paper evaluates how trajectory privacy for randomized driving patterns could be twice as effective for autonomous vehicles using diverted paths compared to Google Map API generated shortest paths. The result shows vehicles mobility patterns could impact trajectory and location privacy. Moreover, the results show that the proposed metric outperforms both K-anonymity and KDT-anonymity.
Technical Paper

Service Analysis of Autonomous Driving

2020-12-30
2020-01-5194
Autonomous driving represents the ultimate goal of future automobile development. As a collaborative application that integrates vehicles, road infrastructure, network and cloud, autonomous driving business requires a high-degree dynamic cooperation among multiple resources such as data, computing and communications that are distributed throughout the system. In order to meet the anticipated high demand for resources and performance requirements of autonomous driving, and to ensure the safety and comfort of the vehicle users and pedestrians, a top concern of autonomous driving is to understand the system requirements for resources and conduct an in-depth analysis of the autonomous driving business. In this context, this paper presents a comprehensive analysis of the typical business for autonomous driving and establishes an analysis model for five common capabilities, i.e. collection, transmission, intelligent computing, human-machine interaction (HMI), and security.
Technical Paper

Is the Age of the Automotive V-model Over?

2021-04-06
2021-01-0065
The V-model has been central to rigorous vehicle engineering for decades. However, there are three factors that could be used to argue whether the V-model is still a good fit for the automotive industry as we move into the connected autonomous vehicle (CAV) era. The first is the shift during development towards simulation to reduce costs, which means that testing runs can be done quickly, reminiscent of the software development AGILE methodology. The second is the need to monitor vehicles after production due to ever-increasing software functionality on a vehicle. This is for two reasons: firstly, the software over the lifetime of the vehicle would need updating, and secondly, monitoring is required for incident response in the event of a cyber-attack. Since the V-model traditionally doesn't consider the product after the vehicle enters the market, there is an absence of a widely accepted model to follow.
Technical Paper

Technical Trends of the Intelligent Connected Vehicle and Development Stage Division for Freeway Traffic Control

2020-12-30
2020-01-5134
It is deemed that currently the intelligent connected vehicle (ICV) is in its early stage of development, and it will go through multiple development stages in the future to realize its final goal—autonomous driving. Based on the existing ICV researches, this paper believes that ICV can be used to improve the efficiency and safety of freeway. The current research of ICV has two main directions: one focuses on the traffic flow characteristics of vehicles with different attributes, the other is concerned with using ICV to reduce congestion. From the policies issued by countries around the world and the development plans promoted by major vehicle manufacturers, the future development trends and challenges of ICV are analyzed. ICV must overcome all the shortcomings to achieve its final goal, including insufficient hardware capabilities or excessive cost, and the degree of intelligence that needs to be improved.
Technical Paper

Foreseeable Misuse in Automated Driving Vehicles - The Human Factor in Fatal Accidents of Complex Automation

2017-03-28
2017-01-0059
Today, highly automated driving is paving the road for full autonomy. Highly automated vehicles can monitor the environment and make decisions more accurately and faster than humans to create safer driving conditions while ultimately achieving full automation to relieve the driver completely from participating in driving. As much as this transition from advanced driving assistance systems to fully automated driving will create frontiers for re-designing the in-vehicle experience for customers, it will continue to pose significant challenges for the industry as it did in the past and does so today. As we transfer more responsibility, functionality and control from human to machine, technologies become more complex, less transparent and making constant safe-guarding a challenge. With automation, potential misuse and insufficient system safety design are important factors that can cause fatal accidents, such as in TESLA autopilot incident.
Research Report

Unsettled Impacts of Integrating Automated Electric Vehicles into a Mobility-as-a-Service Ecosystem and Effects on Traditional Transportation and Ownership

2019-12-20
EPR2019004
The current business model of the automotive industry is based on individual car ownership, yet new ridesharing companies such as Uber and Lyft are well capitalized to invest in large, commercially operated, on-demand mobility service vehicle fleets. Car manufacturers like Tesla want to incorporate personal car owners into part-time fleet operation by utilizing the company’s fleet service. These robotaxi fleets can be operated profitably when the technology works in a reliable manner and regulators allow driverless operation. Although Mobility-as-a-Service (MaaS) models of private and commercial vehicle fleets can complement public transportation models, they may contribute to lower public transportation ridership and thus higher subsidies per ride. This can lead to inefficiencies in the utilization of existing public transportation infrastructure.
Technical Paper

Experimental Setup Enabling Self-Confrontation Interviews for Modelling Naturalistic Driving Behavior

2019-04-02
2019-01-1082
Behavioral models of traffic actors have a potential of unlocking sophisticated safety features and mitigating several challenges of urban automated driving. Intuitively, volunteers driving on routes of daily commuting in their private vehicles are the preferred source of information to be captured by data collection system. Such dataset can then serve as a basis for identifying efficient methods of context representation and parameterization of behavioral models. This paper describes the experimental setup supporting the development of driver behavioral models within the SIMUSAFE project. In particular, the paper presents an IoT data acquisition and analysis infrastructure supporting self-confrontation interviews with drivers. The proposed retrofit system was installed in private vehicles of volunteers in two European cities. Wherever possible, the setup used open source software and electronic components available on consumer market.
Research Report

Unsettled Topics Concerning Automated Driving Systems and the Development Ecosystem

2020-03-17
EPR2020004
With over 100 years of operation, the current automobile industry has settled into an equilibrium with the development of methodologies, regulations, and processes for improving safety. In addition, a nearly $2-trillion market operates in the automotive ecosystem with connections into fields ranging from insurance to advertising. Enabling this ecosystem is a well-honed, tiered supply chain and an established development environment. Autonomous vehicle (AV) technology is a leap forward for the existing automotive industry; now the automobile is expected to manage perception and decision-making tasks. The safety technologies associated with these tasks were presented in an earlier SAE EDGE™ Research Report, “Unsettled Technology Areas in Autonomous Vehicle Test and Validation.”
Technical Paper

Buckendale Lecture Series: Transformational Technologies Reshaping Transportation—A Government Perspective

2018-09-01
2018-01-2011
Transportation departments are under-going a dramatic transformation, shifting from organizations focused primarily on building roads to a focus on mobility for all users. The transformation is the result of rapidly advancing autonomous vehicle technology and personal telecommunication technology. These technologies provide the opportunity to dramatically improve safety, mobility, and economic opportunity for society and industry. Future generations of engineers and other transportation professionals have the opportunity to be part of that societal change. This paper will focus on the technologies state DOT’s and the private sector are researching, developing, and deploying to promote the future of mobility and improved efficiency for commercial trucking through advancements in truck platooning, self-driving long-haul trucking, and automated last mile distribution networks.
X