Refine Your Search


Search Results

Technical Paper

Challenges in Integrating Cybersecurity into Existing Development Processes

Strategies designed to deal with these challenges differ in the way in which added duties are assigned and cybersecurity topics are integrated into the already existing process steps. Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. ...Cybersecurity requirements often clash with existing system requirements or established development methods, leading to low acceptance among developers, and introducing the need to have clear policies on how friction between cybersecurity and other fields is handled. A cybersecurity development approach is frequently perceived as introducing impediments, that bear the risk of cybersecurity measures receiving a lower priority to reduce inconvenience. ...For an established development process and a team accustomed to this process, adding cybersecurity features to the product initially means inconvenience and reduced productivity without perceivable benefits.
Technical Paper

An Integrated View on Automotive SPICE, Functional Safety and Cyber-Security

This increases the attractiveness of an attack on vehicles and thus introduces new risks for vehicle cybersecurity. Thus, just as safety became a critical part of the development in the late 20th century, the automotive domain must now consider cybersecurity as an integral part of the development of modern vehicles. ...Thus, just as safety became a critical part of the development in the late 20th century, the automotive domain must now consider cybersecurity as an integral part of the development of modern vehicles. Aware of this fact, the automotive industry has, therefore, recently taken multiple efforts in designing and producing safe and secure connected and automated vehicles. ...As the domain geared up for the cybersecurity challenges, they leveraged experiences from many other domains, but must face several unique challenges.
Training / Education

Introduction to Automated Vehicle Safety Multi-Agent, Functional, SOTIF, and Cybersecurity

You’ll learn the main attributes of safety as applied to automated vehicles, including the four types of safety: Functional Safety, Safety of the Intended Functionality (SOTIF), Multi-agent safety, and safety involved in cybersecurity attacks. The discussion will enable participants to conceive of the various applicable design aspects of safety, clarify the role of SOTIF, multi-agent safety, and cybersecurity safety and address the development of multi-agent safety using a probabilistic and stochastic framework.
Technical Paper

Integrated Safety and Security Development in the Automotive Domain

The recently released SAE J3061 guidebook for cyber-physical vehicle systems provides high-level principles for automotive organizations for identifying and assessing cybersecurity threats and for designing cybersecurity aware systems in close relation to the ISO 26262 standard for the functional safety of road vehicles. ...., infotainment, car-2-car or car-2-infrastructure communication) as well as new advances toward advanced driver assistance systems (ADAS) or even autonomous driving functions make cybersecurity another key factor to be taken into account by vehicle suppliers and manufacturers. ...Although these can capitalize on experiences from many other domains, they still have to face several unique challenges when gearing up for specific cybersecurity challenges. A key challenge is related to the increasing interconnection of automotive systems with networks (such as Car2X).
Training / Education

Overview of Highly Automated Vehicles

Various testing approaches are discussed, for software, sensors, cybersecurity and the vehicle itself. The course also covers liability and ethical considerations for HAV’s and reviews current state and federal regulations, as well as potential future regulatory actions.
Technical Paper

Secure Vehicular Communication Using Blockchain Technology

Also, all the existing methods for vehicular communication rely on a centralized server which itself invite massive cyber-security threats. These threats and challenges can be addressed by using the Blockchain (BC) technology, where each transaction is logged in a decentralized immutable BC ledger.
Training / Education

Introduction to Highly Automated Vehicles

Every year, the U.S. on average, experiences more than 34,000 traffic deaths and over 5 million vehicle crashes. While the trend in traffic deaths has been generally downward for the past decade, most of this reduction has been the result of optimizing passive occupant crash protection systems such as seatbelts and airbags. Highly automated vehicle's (HAV's) offer the potential to significantly reduce vehicle crashes by perceiving a dangerous situation before the crash has occurred and supporting the human driver with proactive warnings and in some cases active interventions to avoid or mitigate the crash.
Technical Paper

Safe and Secure Development: Challenges and Opportunities

The ever-increasing complexity and connectivity of driver assist functions pose challenges for both Functional Safety and Cyber Security. Several of these challenges arise not only due to the new functionalities themselves but due to numerous interdependencies between safety and security. Safety and security goals can conflict, safety mechanisms might be intentionally triggered by attackers to impact functionality negatively, or mechanisms can compete for limited resources like processing power or memory to name just some conflict potentials. But there is also the potential for synergies, both in the implementation as well as during the development. For example, both disciplines require mechanisms to check data integrity, are concerned with freedom from interference and require architecture based analyses. So far there is no consensus in the industry on how to best deal with these interdependencies in automotive development projects.
Technical Paper

Research on CAN Network Security Aspects and Intrusion Detection Design

With the rapid development of vehicle intelligent and networking technology, the IT security of automotive systems becomes an important area of research. In addition to the basic vehicle control, intelligent advanced driver assistance systems, infotainment systems will all exchange data with in-vehicle network. Unfortunately, current communication network protocols, including Controller Area Network (CAN), FlexRay, MOST, and LIN have no security services, such as authentication or encryption, etc. Therefore, the vehicle are unprotected against malicious attacks. Since CAN bus is actually the most widely used field bus for in-vehicle communications in current automobiles, the security aspects of CAN bus is focused on. Based on the analysis of the current research status of CAN bus network security, this paper summarizes the CAN bus potential security vulnerabilities and the attack means.

Autonomous Vehicle Engineering: July 2020

Editorial High noon for high-level autonomy The Navigator A fork in the road for the AV business The Electric, Autonomous Revolution Lifts Off Engineering the new generation of electric and hybrid vertical-take-off-and-landing vehicles at Wisk and Elroy Air. New SAE Standard for Automated-Driving Developers Developed in less than a year, SAE's new J3216 standard will impact traffic management, operations and safety for automated mobility. Making Data Logging, Replay and Prototyping More Efficient High levels of continuity and compatibility are vital to avoid interruptions in the development process - and reduce cost. Radar Death Star ELunewave's 3D-printed spherical antenna makes for fast, 360-degree single-snapshot readings that are claimed to beat the slower sweeps of conventional radar. The Case for FOTA in AV Data Security Firmware over-the-air data transmission helps OEMs drive secure vehicle autonomy.
Journal Article

Vulnerability of FlexRay and Countermeasures

Abstract The importance of in-vehicle network security has increased with an increase in automated and connected vehicles. Hence, many attacks and countermeasures have been proposed to secure the controller area network (CAN), which is an existent in-vehicle network protocol. At the same time, new protocols-such as FlexRay and Ethernet-which are faster and more reliable than CAN have also been proposed. European OEMs have adopted FlexRay as a control network that can perform the fundamental functions of a vehicle. However, there are few studies regarding FlexRay security. In particular, studies on attacks against FlexRay are limited to theoretical studies or simulation-based experiments. Hence, the vulnerability of FlexRay is unclear. Understanding this vulnerability is necessary for the application of countermeasures and improving the security of future vehicles. In this article, we highlight the vulnerability of FlexRay found in the experiments conducted on a real FlexRay network.
Journal Article

Data Privacy in the Emerging Connected Mobility Services: Architecture, Use Cases, Privacy Risks, and Countermeasures

Abstract The rapid development of connected and automated vehicle technologies together with cloud-based mobility services is transforming the transportation industry. As a result, huge amounts of consumer data are being collected and utilized to provide personalized mobility services. Using big data poses serious challenges to data privacy. To that end, the risks of privacy leakage are amplified by data aggregations from multiple sources and exchanging data with third-party service providers, in face of the recent advances in data analytics. This article provides a review of the connected vehicle landscape from case studies, system characteristics, and dataflows. It also identifies potential challenges and countermeasures.
Journal Article

Assuring Vehicle Update Integrity Using Asymmetric Public Key Infrastructure (PKI) and Public Key Cryptography (PKC)

Abstract Over the past forty years, the Electronic Control Unit (ECU) technology has grown in both sophistication and volume in the automotive sector, and modern vehicles may comprise hundreds of ECUs. ECUs typically communicate via a bus-based network architecture to collectively support a broad range of safety-critical capabilities, such as obstacle avoidance, lane management, and adaptive cruise control. However, this technology evolution has also brought about risks: if ECU firmware is compromised, then vehicle safety may be compromised. Recent experiments and demonstrations have shown that ECU firmware is not only poorly protected but also that compromised firmware may pose safety risks to occupants and bystanders.
Technical Paper

Securing the Secret Key

Recent advances in automotive technologies have paved way to a new era of connectivity. Advanced Driver Assistance Systems are getting deployed in automobiles; many companies are developing driverless cars; connected cars are no more a work of mere research. [1] Vehicle manufacturers are developing ways to interface mobile devices with vehicles. However, all these advances in technology has introduced security risks. Unlike traditional computing systems, the security risk of an automobile can be fatal and can result in loss of lives [2]. The in-vehicle network of an automobile was originally designed to operate in a closed environment and hence network security was not considered during its design [3]. Several studies have already shown that an in-vehicle network can be easily compromised and an intruder can take full control of the vehicle. Researchers are working on various ways to solve this problem. Securing the in-vehicle communication by encrypting the messages is one such way.
Research Report

Unsettled Topics Concerning Sensors for Automated Road Vehicles

This SAE EDGE™ Research Report identifies key unsettled issues of interest to the automotive industry regarding the new generation of sensors designed for vehicles capable of automated driving. Four main issues are outlined that merit immediate interest: First, specifying a standardized terminology and taxonomy to be used for discussing the sensors required by automated vehicles. Second, generating standardized tests and procedures for verifying, simulating, and calibrating automated driving sensors. Third, creating a standardized set of tools and methods to ensure the security, robustness, and integrity of data collected by such sensors. The fourth issue, regarding the ownership and privacy of data collected by automated vehicle sensors, is considered only briefly here since its scope far exceeds the technical issues that are the primary focus of the present report. SAE EDGE™ Research Reports are preliminary investigations of new technologies.
Research Report

Unsettled Legal Issues Facing Automated Vehicles

This SAE EDGE Research Report explores the many legal issues raised by the advent of automated vehicles. While promised to bring major changes to our lives, there are significant legal challenges that have to be overcome before they can see widespread use. A century’s worth of law and regulation were written with only human drivers in mind, meaning they have to be amended before machines can take the wheel. Everything from key federal safety regulations down to local parking laws will have to shift in the face of AVs. This report undertakes an examination of the AV laws of Nevada, California, Michigan, and Arizona, along with two failed federal AV bills, to better understand how lawmakers have approached the technology. States have traditionally regulated a great deal of what happens on the road, but does that still make sense in a world with AVs? Would the nascent AV industry be able to survive in a world with fifty potential sets of rules?