Refine Your Search

Topic

Search Results

Viewing 1 to 11 of 11
Technical Paper

Cybersecurity in the Context of Fail-Operational Systems

2024-04-09
2024-01-2808
The development of highly automated driving functions (AD) recently rises the demand for so called Fail-Operational systems for native driving functions like steering and braking of vehicles. Fail-Operational systems shall guarantee the availability of driving functions even in presence of failures. This can also mean a degradation of system performance or limiting a system’s remaining operating period. In either case, the goal is independency from a human driver as a permanently situation-aware safety fallback solution to provide a certain level of autonomy. In parallel, the connectivity of modern vehicles is increasing rapidly and especially in vehicles with highly automated functions, there is a high demand for connected functions, Infotainment (web conference, Internet, Shopping) and Entertainment (Streaming, Gaming) to entertain the passengers, who should no longer occupied with driving tasks.
Journal Article

A Quantitative Analysis of Autonomous Vehicle Cybersecurity as a Component of Trust

2023-08-10
Abstract Connected autonomous vehicles that employ internet connectivity are technologically complex, which makes them vulnerable to cyberattacks. Many cybersecurity researchers, white hat hackers, and black hat hackers have discovered numerous exploitable vulnerabilities in connected vehicles. ...This study expanded the technology acceptance model (TAM) to include cybersecurity and level of trust as determinants of technology acceptance. This study surveyed a diverse sample of 209 licensed US drivers over 18 years old.
Technical Paper

Access Control Requirements for Autonomous Robotic Fleets

2023-04-11
2023-01-0104
Access control enforces security policies for controlling critical resources. For V2X (Vehicle to Everything) autonomous military vehicle fleets, network middleware systems such as ROS (Robotic Operating System) expose system resources through networked publisher/subscriber and client/server paradigms. Without proper access control, these systems are vulnerable to attacks from compromised network nodes, which may perform data poisoning attacks, flood packets on a network, or attempt to gain lateral control of other resources. Access control for robotic middleware systems has been investigated in both ROS1 and ROS2. Still, these implementations do not have mechanisms for evaluating a policy's consistency and completeness or writing expressive policies for distributed fleets. We explore an RBAC (Role-Based Access Control) mechanism layered onto ROS environments that uses local permission caches with precomputed truth tables for fast policy evaluation.
Technical Paper

The Operation Phase as the Currently Underestimated Phase of the (Safety and Legal) Product Lifecycle of Autonomous Vehicles for SAE L3/L4 – Lessons Learned from Existing European Operations and Development of a Deployment and Surveillance Blueprint

2023-12-29
2023-01-1906
Advanced Autonomous Vehicles (AV) for SAE Level 3 and Level 4 functions will lead to a new understanding of the operation phase in the overall product lifecycle. Regulations such as the EU Implementing Act and the German L4 Act (AFGBV) request a continuous field surveillance, the handling of critical E/E faults and software updates during operation. This is required to enhance the Operational Design Domain (ODD) during operation, offering Functions on Demand (FoD), by increasing software features within these autonomous vehicle systems over the entire digital product lifecycle, and to avoid and reduce downtime by a malfunction of the Autonomous Driving (AD) software stack.
Best Practice

AVSC Best Practice for Interactions Between ADS-DVs and Vulnerable Road Users (VRUs)

2022-08-09
CURRENT
AVSC00009202208
AVSC Best Practice for Interactions Between ADS-DVs and Vulnerable Road Users (VRUs) AVSC00009202208 establishes common terminology and a baseline understanding of the challenges posed, and framework to evaluate automated driving system-dedicated vehicle (ADS-DV) interactions with VRUs. This best practice can facilitate communication among the industry and public, help calibrate expectations of all traffic participants, and improve broader acceptance of SAE level 4 and level 5 ADS-equipped vehicles.
Magazine

Autonomous Vehicle Engineering: November 2019

2019-11-01
Editorial Bill Visnic: Expect the unexpected The Navigator Sam Abuelsamid: Separating illusion from magic in AV deployment The Road to Automobility The era of electrified, self-driving vehicles is upon us. Engineers are key to the transformation - with much hard work still to be done. Far and Away: Remote Drivers Monitor Autonomous Vehicles Remote operators are helping autonomous shuttles and other AVs navigate through complex situations. Mapping Canada - Centimeter by Centimeter A Montreal-based company leverages artificial intelligence to take on the task of developing high-definition maps of Canada. You've Lost That Queasy Feeling… Transcontinental research aims to understand the complex nature of motion sickness to help improve the automated-vehicle experience. 3D Sonar Sees Objects Overlooked by Costlier Sensors A dream of robotic fish inspires inexpensive automated-driving sensing technology that works for the critical areas close to the vehicle.
Article

Addressing configuration controls in an era of multiple security frameworks

2019-07-04
 Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Article

Virtual factories accelerate collaboration, advance technologies

2019-08-26
The Commonwealth Center for Advanced Manufacturing (CCAM), a non-profit consortium based in Prince George County, Virginia, uses a 3D visualization lab to expand beyond the walls of its 62,000-square-foot brick and mortar facility and deliver a collaborative development for researchers in industry, academia, and government.
Article

Raytheon invests in advanced, autonomous manufacturing technologies for radar development, testing

2018-08-22
Raytheon Company (NYSE: RTN) in Waltham, Mass., has upped its investment in advanced manufacturing innovations, including automated and autonomous technologies, to support complex radar testing and integration. The company’s new $72 million, 30,000 square-foot facility on its Andover, Mass., campus, is now home to some of the industry's leading innovations, and a historic first, in manufacturing, officials say.
Article

AIA predicts flying air taxis, supersonic air travel, and space industry for 2050

2019-03-15
In the “What’s Next for Aerospace and Defense: A Vision for 2050” study, AIA, New York City-based McKinsey & Company, and other industry partners reveal a comprehensive 30-year, Industry 4.0 forecast of air travel and spaceflight based on improvements in automation and digitization, next-generation materials, alternative energy sources and storage, and increased data throughput.
Article

Automation streamlines accreditation to speed aerospace and defense technology deployment

2018-12-07
Automated software tools are eliminating weeks, if not months, from the Risk Management Framework (RMF) accreditation process by virtually eliminating the time of the initial hardening while also providing the required documentation. By doing so, technology integrators can significantly reduce the time to build, test, and deploy new technologies in Security Technical Implementation Guide (STIG)-compliant environments.
X