Refine Your Search

Topic

Search Results

Standard

Cybersecurity for Propulsion Systems

2023-09-05
CURRENT
AIR7368
The purpose of this SAE Aerospace Information Report (AIR) is to provide guidance for aircraft engine and propeller systems (hereafter referred to as propulsion systems) certification for cybersecurity. Compliance for cybersecurity requires that the engine control, propeller control, monitoring system, and all auxiliary equipment systems and networks associated with the propulsion system (such as nacelle systems, overspeed governors, and thrust reversers) be protected from intentional unauthorized electronic interactions (IUEI) that may result in an adverse effect on the safety of the propulsion system or the airplane.
Research Report

Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation

2021-09-13
EPR2021020
Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decades, cyber-attacks on airports keep coming, but most airport lack essential means to confront such cyber-attacks. ...These missing means are not technical tools, but rather holistic regulatory directives, technical and process standards, guides, and best practices for airports cybersecurity—even airport cybersecurity concepts and basic definitions are missing in certain cases. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity. ...Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity.
Technical Paper

Information Security Risk Management of Vehicles

2018-04-03
2018-01-0015
The results of this work is allowed to identify a number of cybersecurity threats of the automated security-critical automotive systems, which reduces the efficiency of operation, road safety and system safety. ...According to the evaluating criterion of board electronics, the presence of poorly-protected communication channels, the 75% of the researched modern vehicles do not meet the minimum requirements of cybersecurity due to the danger of external blocking of vital systems. The revealed vulnerabilities of the security-critical automotive systems lead to the necessity of developing methods for mechanical and electronic protection of the modern vehicle. ...The law of normal distribution of the mid-points of the expert evaluation of the cyber-security of a modern vehicle has been determined. Based on the system approach, ranking of the main cybersecurity treats is performed.
Event

Attend - Innovations in Mobility: Aerospace Digital Summit

2024-04-25
Innovations in Mobility: Aerospace Digital Summitaerospace mobility leaders convene leverage cutting-edge technology, design, develop safety measures, integrate current regulations, suggest future policies, expand markets, diversify revenue streams.

SAE EDGE™ Research Reports - Publications

2024-04-25
SAE EDGE Research Reports provide examinations significant topics facing mobility industry today including Connected Automated Vehicle Technologies Electrification Advanced Manufacturing
Standard

COMMERCIAL AIRCRAFT INFORMATION SECURITY CONCEPTS OF OPERATION AND PROCESS FRAMEWORK

2005-12-20
CURRENT
ARINC811
The purpose of this document is to facilitate an understanding of aircraft information security and to develop aircraft information security operational concepts. This common understanding is important since a number of subcommittees and working groups within the aeronautical industry are considering aircraft information security. This document also provides an aircraft information security process framework relating to airline operational needs that, when implemented by an airline and its suppliers, will enable the safe and secure dispatch of the aircraft in a timely manner. This framework facilitates development of cost-effective aircraft information security and provides a common language for understanding security needs.
Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

2018-05-16
Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
Standard

Requirements for a COTS Assembly Management Plan

2020-08-03
CURRENT
EIA933C
This document applies to the development of Plans for integrating and managing COTS assemblies in electronic equipment and Systems for the commercial, military, and space markets; as well as other ADHP markets that wish to use this document. For purposes of this document, COTS assemblies are viewed as electronic assemblies such as printed wiring assemblies, relays, disk drives, LCD matrices, VME circuit cards, servers, printers, laptop computers, etc. There are many ways to categorize COTS assemblies1, including the following spectrum: At one end of the spectrum are COTS assemblies whose design, internal parts2, materials, configuration control, traceability, reliability, and qualification methods are at least partially controlled, or influenced, by ADHP customers (either individually or collectively). An example at this end of the spectrum is a VME circuit card assembly.
SAE MOBILUS Subscription

Wiley Cyber Security Collection Add-On

2018-03-23
As an annual subscription, the Wiley Cyber Security Collection Add-On is available for purchase along with one or both of the following: Wiley Aerospace Collection Wiley Automotive Collection The titles from the Wiley Cyber Security Collection are included in the SAE MOBILUS® eBook Package. Titles: Network Forensics Penetration Testing Essentials Security in Fixed and Wireless Networks, 2nd Edition The Network Security Test Lab: A Step-by-Step Guide Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition Computer Security Handbook, Set, 6th Edition Threat Modeling: Designing for Security Other available Wiley collections: Wiley SAE MOBILUS eBook Package Wiley Aerospace Collection Wiley Automotive Collection Wiley Computer Systems Collection Add-On (purchasable with the Wiley Aerospace Collection and/or the Wiley Automotive Collection)
Magazine

Aerospace & Defense Technology: April 2023

2023-04-06
Breathing Life into Artificial Intelligence and Next Generation Autonomous Aerospace Systems Robotic Rotational Molding Creates New Opportunities for Military and Aerospace Applications Rim-Driven Electric Aircraft Propulsion High-Speed Midwave Infrared Cameras Enable Military Test Range Tracking System What Today's Advances in Radar Technology Mean for Testing and Training Tackling Ruggedization Challenges for RF Communications in Software Defined Radios AUVSI XPONENTIAL 2023 The Blueprint for Autonomy Multi-Scale Structuring of the Polar Ionosphere Understanding a radically new sensing capability for polar ionospheric science introduced by observational evidence recently provided by the electronically steerable Resolute Bay Incoherent Scatter Radar (RISR). Stepped-Frequency Distributed Radar for Through-the-Wall Sensing A technical analysis of the effectiveness of distributed radar for through-the-wall sensing applications.
Magazine

MOMENTUM: SEPTEMBER 2017

2017-09-01
Knowledge wins at 2017 Formula SAE Lincoln The University of Pennsylvania and Texas A&M win the Electric and Internal Combustion Classes, respectively. Flying high at SAE Aero Design New for the twin 2017 competitions in Texas and Florida was a requirement for planes registered in the Regular Class to carry "passengers." Pedal to the metal at Formula SAE Michigan More than 100 university teams compete in this premier student racecar design competition combining static and dynamic events. Removing bumps on the path to fully automated driving Inaugural workshop for new AutoDrive Challenge student competition held at SAE World Headquarters.
Article

Addressing configuration controls in an era of multiple security frameworks

2019-07-04
 Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Magazine

MOBILITY ENGINEERING

2016-12-01
Focus on advanced safety systems and human-factor interventions The impact of REACH on the aviation sector Considered the most comprehensive chemical-regulation legislation to date, REACH presents serious ramifications for the aircraft industry. Lightweighting: What's Next? Experts weigh in on the challenges and future enablers in the battle to reduce vehicle mass. The best of COMVEC 2016 Autonomous vehicles and improved fuel efficiency via advanced powertrain solutions are pressing topics detailed in this select group of technical papers from the SAE Commercial Vehicle Engineering Congress. Optimizing waste heat recovery for long-haul trucks Autonomous solutions in agriculture Downsizing a HD diesel engine for off-highway applications Zero-emissions electric aircraft: Theory vs. reality
Magazine

Aerospace & Defense Technology: September 2023

2023-09-07
How Thunderbolt 4 Helps Bring Fault-Tolerant, Distributed Systems to Market Delivering Operational Energy to Enhance Warfighter Capability Optoelectronic Analog Signal Transmission Takes Center Stage Amidst Aerospace and Defense Innovation Shaking Outside the Box to Advance Flight Research An Introduction to Quantum Computing How Laser Communications Innovation is Finally Coming of Age and Driving Innovation in Defense Spatial Calibration for Accurate Long Distance Measurement Using Infrared Cameras A new spatial calibration procedure has been introduced for infrared optical systems developed for cases where camera systems are required to be focused at distances beyond 100 meters. Towards Greater Sensitivity: A Brief FTIR and Infrared-Based Cavity Ring Down Spectroscopy Comparative Study A presentation of work comparing efficacy of a traditional IR method used as a standard within the U.S.
Magazine

Tech Briefs: April 2018

2018-04-01
Laser Detecting Systems Enhancing Survivability and Lethality on the Battlefield Designing With Plastics for Military Equipment Engine Air-Brakes Paving the Way to Quieter Aircraft Nett Warrior Enhancing Battlefield Connectivity and Communications XPONENTIAL 2018 - An AUVSI Experience Communications in Space: A Deep Subject First Air-Worthy Metal-Printed RF Filter Ready for Takeoff Validation of Automated Prediction of Blood Product Needs Algorithm Processing Continuous Non-Invasive Vital Signs Streams (ONPOINT4) Using a combination of non-invasive sensors, advanced algorithms, and instruments built for combat medics could reduce hemorrhaging and improve survival rates. Calculation of Weapon Platform Attitude and Cant Using Available Sensor Feedback Successful development of mobile weapon systems must incorporate operation on sloped terrain.
Magazine

MOBILITY ENGINEERING: June 2016

2016-06-01
Base-engine value engineering for higher fuel efficiency and enhanced performance Continuous improvement in existing engines can be efficiently achieved with a value engineering approach. The integration of product development with value engineering ensures the achievement of specified targets in a systematic manner and within a defined timeframe. Integrated system engineering for valvetrain design and development of a high-speed diesel engine The lead time for engine development has reduced significantly with the advent of advanced simulation techniques. Cars poised to become 'a thing' Making automobiles part of the Internet of Things brings both risks and rewards. Agility training for cars Chassis component suppliers refine vehicle dynamics at the high end and entry level with four-wheel steering and adaptive damping.
Article

Software needs security, and security needs software: a scientific overview

2019-04-22
Software needs security. That's a consequence of using software to control critical systems. It's difficult because software is inherently a complex artifact, even when the code just consists of a single sequential program in a single programming language, with well-defined inputs and outputs. Of course, actual software rarely if ever has such a simple structure. Security needs software. That's a consequence of the complexity just mentioned. No process can ensure security at scale unless it is automated by using software itself: programming languages, verification tools, software platforms.
X