Refine Your Search

Topic

Search Results

Standard

Cybersecurity for Propulsion Systems

2023-09-05
CURRENT
AIR7368
The purpose of this SAE Aerospace Information Report (AIR) is to provide guidance for aircraft engine and propeller systems (hereafter referred to as propulsion systems) certification for cybersecurity. Compliance for cybersecurity requires that the engine control, propeller control, monitoring system, and all auxiliary equipment systems and networks associated with the propulsion system (such as nacelle systems, overspeed governors, and thrust reversers) be protected from intentional unauthorized electronic interactions (IUEI) that may result in an adverse effect on the safety of the propulsion system or the airplane.
Technical Paper

Cyber-security for Engine ECUs: Past, Present and Future

2015-09-01
2015-01-1998
In this paper, we outline past, present and future applications of automotive security for engine ECUs. Electronic immobilizers and anti-tuning countermeasures have been used for several years. Recently, OEMs and suppliers are facing more and more powerful attackers, and as a result, have introduced stronger countermeasures based on hardware security. Finally, with the advent of connected cars, it is expected that many things that currently require a physical connection will be done remotely in a near future. This includes remote diagnostics, reprogramming and engine calibration.
Technical Paper

Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm

2017-09-23
2017-01-2005
Vehicle cybersecurity consists of internal security and external security. Dedicated security hardware will play an important role in car’s internal and external security communication. ...For certain AURIX MCU consisting of HSM, the experiment result shows that cheaper 32-bit HSM’s AES calculating speed is 25 times of 32-bit main controller, so HSM is an effective choice to realize cybersecurity. After comparing two existing methods that realize secure CAN communication, A Modified SECURE CAN scheme is proposed, and differences of the three schemes are analyzed.
Book

Supply Chain Vulnerabilities Impacting Commercial Aviation

2019-09-04
Written by Kirsten Koepsel, a lawyer and engineer whose work has focused on aviation cybersecurity, Supply Chain Vulnerabilities Impacting Commercial Aviation addresses the big question facing aircraft manufacturers today: keep the work in house or outsource it? ...Supply Chain Vulnerabilities Impacting Commercial Aviation discusses the differences in requirements depending on the buyer of the aircraft (governmental or not), ranging from delivery delays to risks linked to cybersecurity and the Internet of Things (IoT), including possible problems with faulty sensors and counterfeit parts.
Magazine

MOBILITY ENGINEERING: September 2017

2017-09-01
Connected commercial vehicles bring cybersecurity to the fore Connectivity, automation and electrification will drive vehicle development in the near future, say industry experts attending the revamped SAE COMVEC 17 event.
Magazine

Automotive Engineering: July 7, 2015

2015-07-07
To serve and protect As cars become more connected and automated, cybersecurity concerns are rising. Industry engineers have many tools and techniques and are now deploying encryption and standards to ensure that vehicle controls are not altered or usurped by unauthorized people.
Technical Paper

Applying Concolic Testing to the Automotive Domain

2024-04-09
2024-01-2802
Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. ...Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. This is achieved through a Satisfiability Modulo Theory (SMT) solver, which operates on symbolic values for program inputs instead of using their concrete counterparts.
Technical Paper

Future of Automotive Embedded Hardware Trust Anchors (AEHTA)

2022-03-29
2022-01-0122
In conjunction with an increasing number of related laws and regulations (such as UNECE R155 and ISO 21434), these drive security requirements in different domains and areas. 2 In this paper we examine the upcoming trends in EE architectures and investigate the underlying cyber-security threats and corresponding security requirements that lead to potential requirements for “Automotive Embedded Hardware Trust Anchors” (AEHTA).
Technical Paper

Securing Connected Vehicles End to End

2014-04-01
2014-01-0300
As vehicles become increasingly connected with the external world, they face a growing range of security vulnerabilities. Researchers, hobbyists, and hackers have compromised security keys used by vehicles' electronic control units (ECUs), modified ECU software, and hacked wireless transmissions from vehicle key fobs and tire monitoring sensors. Malware can infect vehicles through Internet connectivity, onboard diagnostic interfaces, devices tethered wirelessly or physically to the vehicle, malware-infected aftermarket devices or spare parts, and onboard Wi-Fi hotspot. Once vehicles are interconnected, compromised vehicles can also be used to attack the connected transportation system and other vehicles. Securing connected vehicles impose a range of unique new challenges. This paper describes some of these unique challenges and presents an end-to-end cloud-assisted connected vehicle security framework that can address these challenges.
Technical Paper

The Study of Secure CAN Communication for Automotive Applications

2017-03-28
2017-01-1658
Cyber security is becoming increasingly critical in the car industry. Not only the entry points to the external world in the car need to be protected against potential attack, but also the on-board communication in the car require to be protected against attackers who may try to send unauthorized CAN messages. However, the current CAN network was not designed with security in mind. As a result, the extra measures have to be taken to address the key security properties of the secure CAN communication, including data integrity, authenticity, confidentiality and freshness. While integrity and authenticity can be achieved by using a relatively straightforward algorithms such as CMAC (Cipher-based Message Authentication Code) and Confidentiality can be handled by a symmetric encryption algorithm like AES128 (128-bit Advanced Encryption Standard), it has been recognized to be more challenging to achieve the freshness of CAN message.
Standard

Hardware Protected Security for Ground Vehicles

2020-02-10
CURRENT
J3101_202002
Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section is a generalization of such use cases in an attempt to extract common requirements for the hardware protected security environment that enable it to be a gatekeeper. Examples are: Creating a new key fob Re-flashing ECU firmware Reading/exporting PII out of the ECU Using a subscription-based feature Performing some service on an ECU Transferring ownership of the vehicle Some of these examples are discussed later in this section and some have detailed sections of their own. This list is by no means comprehensive.
Journal Article

Software-Based Approach for Sharing Real-Time Peripherals in a Virtualized Automotive Microcontroller Platform

2021-05-11
Abstract In the automotive domain, the evolution of electrical and electronic (E/E) architecture trend is toward consolidating multiple heterogeneous applications executing on individual devices onto a centralized powerful computing platform. Many forums debate the nature of this centralized computing platform. At least for another decade, automotive powertrain functions will continue their development on a multicore controller platform (MCU) instead of many core processors. Data security and the need to meet Automotive Safety Integrity Level D (ASIL-D)-compliant powertrain functions are some of the reasons for this preference. For the centralized computing platform, virtualizing the underlying MCU will facilitate the simultaneous execution of heterogeneous powertrain applications with guaranteed spatial and temporal isolation. A common problem in virtualizing the MCU is the sharing of peripherals, which are comparatively scarce.
Standard

Requirements for a COTS Assembly Management Plan

2020-08-03
CURRENT
EIA933C
This document applies to the development of Plans for integrating and managing COTS assemblies in electronic equipment and Systems for the commercial, military, and space markets; as well as other ADHP markets that wish to use this document. For purposes of this document, COTS assemblies are viewed as electronic assemblies such as printed wiring assemblies, relays, disk drives, LCD matrices, VME circuit cards, servers, printers, laptop computers, etc. There are many ways to categorize COTS assemblies1, including the following spectrum: At one end of the spectrum are COTS assemblies whose design, internal parts2, materials, configuration control, traceability, reliability, and qualification methods are at least partially controlled, or influenced, by ADHP customers (either individually or collectively). An example at this end of the spectrum is a VME circuit card assembly.
Journal Article

A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems

2021-11-16
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
Magazine

MOBILITY ENGINEERING: March 2018

2018-03-01
Advancing toward driverless cars Autonomous-driving technology is set to revolutionize the auto industry. But getting to a true "driverless" future will be an iterative process based on merging numerous individual innovations. Overcoming the challenges of HCCI combustion Homogenous-charge compression ignition (HCCI) holds considerable promise to unlock new IC-engine efficiencies. But HCCI's advantages bring engineering obstacles, particularly emissions control. Simulation for tractor cabin vibroacoustic optimization Method of identifying and stopping an electronically controlled diesel engine in runaway mode Electrification not a one-size-fits-all solution Efforts in the off-highway industry have been under way for decades, but electrification technology still faces implementation challenges. 700 miles, hands-free! GM's Super Cruise turns Cadillac drivers into passengers in a well-engineered first step toward greater vehicle autonomy.
Magazine

Automotive Engineering: May 2017

2017-05-04
Innovations for lightweighting Tough fuel-economy bogies for 2021 and beyond are driving new approaches to materials use, as seen in these case studies. Axellent progress AAM's new Quantum drive-axle technology is a leap forward in lightweight, efficient driveline systems aimed at 2020 and beyond. Low-temperature combustion ready for prime time? At SAE's High-Efficiency IC Engines Symposium, Delphi said its new, third-generation GDCI is promising, but even LTC proponents admit that challenges remain. More automation for ECU testing The latest fault-insertion tests enable engineers to run more test cases in less time.
Magazine

Automotive Engineering: September 2017

2017-09-01
New vision @ Gentex Creating a vital ADAS partner through home-grown R&D and manufacturing in (of all places) western Michigan. Positioning for hybrid growth BorgWarner "modularizes" to provide OEMs optimal electrified-driveline flexibility. Editorial: Beleaguered diesel could use a break-or a breakthrough SAE Standards News Kickoff to begin testing program to validate SAE J2954 wireless charging Recommended Practice Supplier Eye Will you be an active participant or passive bystander? The Navigator For future vehicles, communication equals trust Tenneco readies new semi-active digital suspension for 2020 New 90-degree turbo V6 leads Audi's hybridization blitz GKN using modular control algorithms for added systems integration U of M students engineer new autonomous shuttle system Jaguar's 2018 E-Pace shares Land Rover bones Ford pumps powertrains for 2018 F-150 2018 Subaru Crosstrek moves to new global platform Nissan's Ponz Pandikithura on EV lifecycle value
Magazine

Mobility Engineering: September 2015

2015-09-01
The advent of stop-start technology As environmental concerns grow for R&D teams, OEMs look to bring the strategy further into the mainstream. Recycling opportunities for hybrid/electric vehicle lithium-ion batteries With limited reserves and strict environmental regulations, re-cyclers look to established extraction means to reuse, recycle, and dispose of the used batteries. Cameras look to go the distance Automakers seek vision systems with greater distances, improved reliability, and more functionality, thanks to ruggedized complementary metal-oxide semiconductor technologies. Getting right with composites With composites now a mainstay in most new aircraft de-signs, the engineering emphasis has switched from understanding if they work to thinking through the most efficient way to manufacture them, such as using design-for-manufacturing software.
Magazine

Automotive Engineering: April 7, 2015

2015-04-07
GM's CTO driving new paths to technology leadership 'We're making actual production commitments regarding our advanced-technology strategy, rather than just talking about it,' says GM's CTO Jon Lauckner. 'We're absolutely going to be among the leaders, if not the leader, in these areas.' Aluminum prepares for its next big leap Ford's F-Series blockbuster was just the beginning. New micromills now in pilot phase aim to bring vastly stronger and more formable light-alloy materials at higher capacity, says Alcoa's Mike Murphy. Slick solutions for friction reduction From new lubricants to 'smart' oil pumps and clever bearing technologies, engine designers are attacking every potential source of spin losses and internal friction in the quest for more mechanical work out of less fuel. Next-gen NSX: a twin-turbo, multi-material Ferrari-fighter The production NSX made its much-awaited global debut at NAIAS in January.
X