Refine Your Search

Topic

Search Results

Viewing 1 to 15 of 15
Book

Cybersecurity for Commercial Vehicles

2018-08-28
It delivers details on key subject areas including: SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems The differences between automotive and commercial vehicle cybersecurity. Forensics for identifying breaches in cybersecurity. Platooning and fleet implications. ...This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack. ...It delivers details on key subject areas including: SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems The differences between automotive and commercial vehicle cybersecurity.
Technical Paper

Enabling the Security of Global Time in Software-Defined-Vehicles (SGTS, MACsec)

2024-07-02
2024-01-2978
., driver assistance functions, intrusion detection system, vehicle diagnostics, external device authentication during vehicle diagnostics, vehicle-to-grid and so on). The cybersecurity attacks targeting the global time result in false time, accuracy degradation, and denial of service as stated in IETF RFC 7384 [2].
Technical Paper

Trust-Based Control and Scheduling for UGV Platoon under Cyber Attacks

2019-04-02
2019-01-1077
Unmanned ground vehicles (UGVs) may encounter difficulties accommodating environmental uncertainties and system degradations during harsh conditions. However, human experience and onboard intelligence can may help mitigate such cases. Unfortunately, human operators have cognition limits when directly supervising multiple UGVs. Ideally, an automated decision aid can be designed that empowers the human operator to supervise the UGVs. In this paper, we consider a connected UGV platoon under cyber attacks that may disrupt safety and degrade performance. An observer-based resilient control strategy is designed to mitigate the effects of vehicle-to-vehicle (V2V) cyber attacks. In addition, each UGV generates both internal and external evaluations based on the platoons performance metrics. A cloud-based trust-based information management system collects these evaluations to detect abnormal UGV platoon behaviors.
Magazine

Autonomous Vehicle Engineering: July 2020

2020-07-02
Editorial High noon for high-level autonomy The Navigator A fork in the road for the AV business The Electric, Autonomous Revolution Lifts Off Engineering the new generation of electric and hybrid vertical-take-off-and-landing vehicles at Wisk and Elroy Air. New SAE Standard for Automated-Driving Developers Developed in less than a year, SAE's new J3216 standard will impact traffic management, operations and safety for automated mobility. Making Data Logging, Replay and Prototyping More Efficient High levels of continuity and compatibility are vital to avoid interruptions in the development process - and reduce cost. Radar Death Star ELunewave's 3D-printed spherical antenna makes for fast, 360-degree single-snapshot readings that are claimed to beat the slower sweeps of conventional radar. The Case for FOTA in AV Data Security Firmware over-the-air data transmission helps OEMs drive secure vehicle autonomy.
Technical Paper

Evaluating Trajectory Privacy in Autonomous Vehicular Communications

2019-04-02
2019-01-0487
Autonomous vehicles might one day be able to implement privacy preserving driving patterns which humans may find too difficult to implement. In order to measure the difference between location privacy achieved by humans versus location privacy achieved by autonomous vehicles, this paper measures privacy as trajectory anonymity, as opposed to single location privacy or continuous privacy. This paper evaluates how trajectory privacy for randomized driving patterns could be twice as effective for autonomous vehicles using diverted paths compared to Google Map API generated shortest paths. The result shows vehicles mobility patterns could impact trajectory and location privacy. Moreover, the results show that the proposed metric outperforms both K-anonymity and KDT-anonymity.
Standard

Instructions for Using Plug-In Electric Vehicle (PEV) Communications, Interoperability and Security Documents

2018-07-18
CURRENT
J2836_201807
This SAE Information Report J2836 establishes the instructions for the documents required for the variety of potential functions for PEV communications, energy transfer options, interoperability and security. This includes the history, current status and future plans for migrating through these documents created in the Hybrid Communication and Interoperability Task Force, based on functional objective (e.g., (1) if I want to do V2G with an off-board inverter, what documents and items within them do I need, (2) What do we intend for V3 of SAE J2953, …).
Journal Article

A Deep Neural Network Attack Simulation against Data Storage of Autonomous Vehicles

2023-09-29
Abstract In the pursuit of advancing autonomous vehicles (AVs), data-driven algorithms have become pivotal in replacing human perception and decision-making. While deep neural networks (DNNs) hold promise for perception tasks, the potential for catastrophic consequences due to algorithmic flaws is concerning. A well-known incident in 2016, involving a Tesla autopilot misidentifying a white truck as a cloud, underscores the risks and security vulnerabilities. In this article, we present a novel threat model and risk assessment (TARA) analysis on AV data storage, delving into potential threats and damage scenarios. Specifically, we focus on DNN parameter manipulation attacks, evaluating their impact on three distinct algorithms for traffic sign classification and lane assist.
Technical Paper

Contextual Study of Security and Privacy in V2X Communication for Architecture & Networking products

2024-10-17
2024-28-0038
In recent times there has been an upward trend in "Connected Vehicles", which has significantly improved not only the driving experience but also the "ownership of the car". The use of state-of-the-art wireless technologies, such as vehicle-to-everything (V2X) connectivity, is crucial for its dependability and safety. V2X also effectively extends the information flow between the transportation ecosystem pedestrians, public infrastructure (traffic management system) and parking infrastructure, charging and fuel stations, Etc. V2X has a lot of potential to enhance traffic flow, boost traffic safety, and provide drivers and operators with new services. One of the fundamental issues is maintaining trustworthy and quick communication between cars and infrastructure. While establishing stable connectivity, reducing interference, and controlling the fluctuating quality of wireless transmissions, we have to ensure the Security and Privacy of V2I.
Magazine

Autonomous Vehicle Engineering: August 2018

2018-08-02
Editorial V2Reality Blockchain Unchained! The weird world of cryptocurrency exists because of the intense mathematics of blockchain technology. The mobility sector is looking beyond Bitcoin to put blockchain to work in potentially game-changing ways. Are Blockchain and 'Smart Contracts' the Secure Future? Legal risk and reward of blockchain and smart contracts as a prescription for automotive applications Software Building Blocks for AV Systems Elektrobit's unique software framework is designed to smooth development of automated driving functions. Cyber Security Goes Upstream The first cloud-based solution for connected vehicles was born in Israel and is now pilot testing at global OEMs. Electronic Architectures Get Smart Upgradable, scalable and powerful new architectures will help enable data-hungry connected, autonomous vehicles. Aptiv's VP of Mobility Architecture explains.
Magazine

SAE Truck & Off-Highway Engineering: June 2021

2021-06-01
No shortage of challenges Supply chain struggles join perennial challenges for Cummins' off-highway business, namely meeting shifting global emissions standards and satisfying emerging technology trends. Batteries not the only route to EV efficiency Allison CTO stresses efficiency and safety of propulsion units also are critical to reducing cost, improving performance and ultimately winning over customers. Batteries go underground A Saft expert evaluates various Li-ion chemistries and strategies - battery swapping vs. fast charging - for electric mining vehicles. Platooning: an evolving pathway to full autonomy Human-guided convoys can provide real-world benefits sooner than individual driverless trucks, but safety and operational issues still need to be resolved to optimize platoon configurations. Supplier Directory Complete listing of industry suppliers categorized by technology area.
Article

Europe’s blockchain-based Smart E-Mobility Challenge will conclude this May in Germany

2019-05-07
TIoTA, an open software consortium of over 50 members organized to support the creation of a secure, scalable, interoperable, and trusted IoT ecosystem, began the E-Mobility Challenge to link IoT devices with consumers and stakeholder companies such as operators and service, communication, and payment providers within the preexisting European electric vehicle ecosystem.
X