Refine Your Search


Search Results

Viewing 1 to 13 of 13
Technical Paper

Cyber-security for Engine ECUs: Past, Present and Future

In this paper, we outline past, present and future applications of automotive security for engine ECUs. Electronic immobilizers and anti-tuning countermeasures have been used for several years. Recently, OEMs and suppliers are facing more and more powerful attackers, and as a result, have introduced stronger countermeasures based on hardware security. Finally, with the advent of connected cars, it is expected that many things that currently require a physical connection will be done remotely in a near future. This includes remote diagnostics, reprogramming and engine calibration.
Technical Paper

Hypervisor Implementation in Vehicle Networks

The hypervisor offers many benefits to the vehicle architecture, both operationally and with cybersecurity. The proposed mitigant provides the structure to partition the various VMs. This allows for the different functions to be managed within their own distinct VM. ...While the cybersecurity applications are numerous, there are also the operational benefits. The hypervisor is designed to not only manage the VMs, but also to increase the efficiency of these via resource management.
Technical Paper

Securing J1939 Communications Using Strong Encryption with FIPS 140-2

Since 2001, all sensitive information of U.S. Federal Agencies has been protected by strong encryption mandated by the Federal Information Processing Standards (FIPS) 140-2 Security Requirements. The requirements specify a formal certification process. The process ensures that validated encryption modules have implemented the standard, and have passed a rigorous testing and review processes. Today, this same strong security protection has become possible for vehicle networks using modern, cost-effective encryption in hardware. This paper introduces the motivation and context for the encryption diagnostics security in terms of all vehicles in general, not just trucks which use SAE J1939 communications. Several practical scenarios for using such encryption hardware and the advantages of using hardware compared to software private-key encryption and public-key encryption are described.
Technical Paper

Investigation of Vehicular Networks and its Main Security Issues

Vehicular Network is an emerging and developing technology to improve traffic management and safety issues, and enable a wide range of value-added services such as collision warning/avoidance. Many applications have been designed to provide safety and comfort for passengers. This technology is a prolific area for attackers who will attempt to challenge the network with their malicious or rational attacks. In this paper we elaborate what a vehicular network is, different kinds of communication in this field, main mechanism and related parts and how vehicular networks work then we introduce some of its applications. After primary familiarity with this system we investigate to different type of attacker, more important security issues, How to secure vehicular networks (security requirements and some tools and methods to achieve secure vehicular networks), difficulties and providing viable security solutions, and at the end briefly explanation of related standards.
Technical Paper

Challenges in the Regulatory Framework of Automated Driving

Automated Driving (AD) is foreseen to be one of the major social and technological challenges in the coming years. Many manufacturers are developing new models with cutting-edge functionalities, which are not included in the scope of the current regulatory framework. Apart from demonstrating their know-how and expertise about AD, their willingness to sell their AD models in the European market is accelerating the rule-making system. However, which is the roadmap for the European regulatory framework? Policy makers and regulatory bodies are pushing their boundaries at all levels (national and international) in order to introduce modifications in existing regulations. These regulations will enable the introduction of these new functionalities into the market. Without decreasing the standards of safety and security, the implementation of a clear and harmonized regulatory framework and approval process is extremely needed.
Journal Article

Improvement of the Resilience of a Cyber-Physical Remote Diagnostic Communication System against Cyber Attacks

In the near future, vehicles will operate autonomously and communicate with their environment. This communication includes Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) communication, and comunication with cloud-based servers (V2C). To improve the resilience of remote diagnostic communication between a vehicle and external test equipment against cyberattacks, it is imperative to understand and analyze the functionality and vulnerability of each communication system component, including the wired and wireless communication channels. This paper serves as a continuation of the SAE Journal publication on measures to prevent unauthorized access to the in-vehicle E/E system [9], explains the components of a cyber-physical system (CPS) for remote diagnostic communication, analyzes their vulnerability against cyberattacks and explains measures to improve the resiliance.
Research Report

Unsettled Technology Opportunities for Vehicle Health Management and the Role for Health-Ready Components

Game-changing opportunities abound for the application of vehicle health management (VHM) across multiple transportation-related sectors, but key unresolved issues continue to impede progress. VHM technology is based upon the broader field of advanced analytics. Much of traditional analytics efforts to date have been largely descriptive in nature and offer somewhat limited value for large-scale enterprises. Analytics technology becomes increasingly valuable when it offers predictive results or, even better, prescriptive results, which can be used to identify specific courses of action. It is this focus on action which takes analytics to a higher level of impact, and which imbues it with the potential to materially impact the success of the enterprise. Artificial intelligence (AI), specifically machine learning technology, shows future promise in the VHM space, but it is not currently adequate by itself for high-accuracy analytics.
Research Report

Unsettled Topics Concerning Adopting Blockchain Technology in Aerospace

In the aerospace industry, competition is high and the need to ensure safety and security while managing costs is paramount. Furthermore, stakeholders—who gain the most by working together—do not necessarily trust each other. Now, mix that with changing enterprise technologies, management of historical records, and customized legacy systems. This issue touches all aspects of the aerospace industry, from frequent flyer miles to aircraft maintenance and drives tremendous inefficiency and cost. Technology that augments, rather than replaces, is needed to transform these complex systems into efficient, digital processes. Blockchain technology offers collaborative opportunities for solving some of the data problems that have long challenged the industry. This SAE EDGE™ Research Report by Rhonda D. Walthall examines how blockchain technology could impact the aerospace industry and addresses some of the unsettled concerns surrounding its implementation.
Research Report

Unsettled Impacts of Integrating Automated Electric Vehicles into a Mobility-as-a-Service Ecosystem and Effects on Traditional Transportation and Ownership

The current business model of the automotive industry is based on individual car ownership, yet new ridesharing companies such as Uber and Lyft are well capitalized to invest in large, commercially operated, on-demand mobility service vehicle fleets. Car manufacturers like Tesla want to incorporate personal car owners into part-time fleet operation by utilizing the company’s fleet service. These robotaxi fleets can be operated profitably when the technology works in a reliable manner and regulators allow driverless operation. Although Mobility-as-a-Service (MaaS) models of private and commercial vehicle fleets can complement public transportation models, they may contribute to lower public transportation ridership and thus higher subsidies per ride. This can lead to inefficiencies in the utilization of existing public transportation infrastructure.
Journal Article

Chip and Board Level Digital Forensics of Cummins Heavy Vehicle Event Data Recorders

Crashes involving Cummins powered heavy vehicles can damage the electronic control module (ECM) containing heavy vehicle event data recorder (HVEDR) records. When ECMs are broken and data cannot be extracted using vehicle diagnostics tools, more invasive and low-level techniques are needed to forensically preserve and decode HVEDR data. A technique for extracting non-volatile memory contents using non-destructive board level techniques through the available in-circuit debugging port is presented. Additional chip level data extraction techniques can also provide access to the HVEDR data. Once the data is obtained and preserved in a forensically sound manner, the binary record is decoded to reveal typical HVDER data like engine speed, vehicle speed, accelerator pedal position, and other status data. The memory contents from the ECM can be written to a surrogate and decoded with traditional maintenance and diagnostic software.
Technical Paper

Modelify: Semi-Automatic Conversion of Control Systems C Code to Simulink Models

Over the last decade, the automotive industry has embraced model-based development for control systems. Many of these companies have chosen Simulink from MathWorks to design and simulate these models. However, a remaining issue is the fact that many control systems were initially written in C and are still being used. Some companies have attempted to manually convert these C systems to Simulink models but have found this method to be too costly, error-prone, and time consuming. EnSoft decided to tackle this problem by providing a semi-automated conversion using our Atlas for C tool. Atlas is a tool that maps software and creates a relation map for all parts of the program. It then offers the developer tools to query and visualize this graph. We have developed Modelify, a tool built on this framework that performs the necessary queries on a C project and creates equivalent Simulink models and subsystems.
Research Report

Unsettled Topics Concerning Autonomous Public Transportation Systems

With billions of dollars of investment and events like DARPA’s Grand Challenges automated driving technology has been making its way toward commercialization. While the enabling technology for SAE Level 4 and 5 automated vehicles (AV) has not yet matured, specific restricted-use models such as “robo-taxis” and automated truck convoying show great promise. Now, cities are across the world are looking to AVs to solve their public transportation issues. With low speeds and fixed route, public transportation is an ideal application for AVs. From a business angle, AVs could leverage existing public transport models and infrastructure while providing superior quality of service for disadvantaged communities. Yet, dense urban environments—which would benefit from automated transportation the most—present unique challenges and public sector requirements. This SAE EDGE™ Research Report by Dr.