Refine Your Search

Topic

Search Results

Book

9th AVL International Commercial Powertrain Conference (2017)

2017-05-21
Organized in cooperation with SAE International, AVL’s International Commercial Powertrain Conference- ICPC, happens every two years. It is the premier forum for truck, agricultural and construction equipment manufacturers to discuss powertrain technology challenges and solutions across their industries. This event offers a unique opportunity for engineers to address the synergy effects and distinctive characteristics of commercial vehicles, agricultural tractors and non-road vehicles, and industrial machinery. In 2017, the 9th ICPC focused on alternative powertrain technologies and innovations improving operating efficiency. These proceedings focus on: • Future challenges for engines and emissions • Smart Technologies Changing Farming • Cyber Physical Systems in Agriculture Business • OEM View of the Future of the Construction Machinery Industry • Powertrain Developments • CO2 Reduction • CVT Transmission Platform Technology • Autonomous and Connected Trucks
Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

2018-05-16
Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
Technical Paper

A Zero Trust Architecture for Automotive Networks

2024-04-09
2024-01-2793
Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to secure intra-vehicle networks. ...This research successfully met the four requirements and demonstrated that using ZT principles in an on-vehicle network greatly improved the cybersecurity posture with manageable impact to system performance and deployment.
Article

Addressing configuration controls in an era of multiple security frameworks

2019-07-04
 Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.
Standard

CAN FD Data Link Layer

2021-07-16
HISTORICAL
J1939-22_202107
The flexible data rate capability in CAN (commonly called CAN FD) is implemented as a transport layer in order to allow for functional safety, cybersecurity, extended transport capability, and backward compatibility with SAE J1939DA.
Standard

CAN FD Data Link Layer

2021-03-22
HISTORICAL
J1939-22_202103
The flexible data rate capability in CAN (commonly called CAN FD) is implemented as a transport layer in order to allow for functional safety, cybersecurity, extended transport capability, and backward compatibility with SAE J1939DA.
Standard

CAN FD Data Link Layer

2022-09-08
CURRENT
J1939-22_202209
The flexible data rate capability in CAN (commonly called CAN FD) is implemented as a transport layer in order to allow for functional safety, cybersecurity, extended transport capability, and backward compatibility with SAE J1939DA.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-01-14
HISTORICAL
J3061_201601
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. ...Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. ...This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. This includes: Defining a complete lifecycle process framework that can be tailored and utilized within each organization’s development processes to incorporate Cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning.
Event

Digital Summit - WCX™ World Congress Experience

2024-05-19
If you are not able to attend WCX 2022 in-person, you will have the opportunity to join a selected number of live technical and executive discussions online that will advance your skill set in propulsion, connectivity security and safety as well as the business of technology.
Standard

Hardware Protected Security for Ground Vehicles

2020-02-10
CURRENT
J3101_202002
Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section is a generalization of such use cases in an attempt to extract common requirements for the hardware protected security environment that enable it to be a gatekeeper. Examples are: Creating a new key fob Re-flashing ECU firmware Reading/exporting PII out of the ECU Using a subscription-based feature Performing some service on an ECU Transferring ownership of the vehicle Some of these examples are discussed later in this section and some have detailed sections of their own. This list is by no means comprehensive.
Magazine

MOBILITY ENGINEERING

2016-12-01
Focus on advanced safety systems and human-factor interventions The impact of REACH on the aviation sector Considered the most comprehensive chemical-regulation legislation to date, REACH presents serious ramifications for the aircraft industry. Lightweighting: What's Next? Experts weigh in on the challenges and future enablers in the battle to reduce vehicle mass. The best of COMVEC 2016 Autonomous vehicles and improved fuel efficiency via advanced powertrain solutions are pressing topics detailed in this select group of technical papers from the SAE Commercial Vehicle Engineering Congress. Optimizing waste heat recovery for long-haul trucks Autonomous solutions in agriculture Downsizing a HD diesel engine for off-highway applications Zero-emissions electric aircraft: Theory vs. reality
Magazine

MOBILITY ENGINEERING: December 2017

2017-12-01
Rockets re-engineered-a step further into the cosmos Powertrain design for reliability Ice breaker Mazda's Skyactiv-X beats the big companies to market with a promising new engine that marries Otto and Diesel attributes. Advances for off-highway engine design As manufacturers continue to drive out cost and meet a worldwide patchwork of regulatory frameworks, the tools for developing those engines are advancing. From showcase prototypes to advanced analytical techniques, suppliers are helping the cause. Aeroacoustic simulation delivers breakthroughs in aircraft noise reduction Autonomy testing: Simulation to the rescue Autonomous technology development injects new rigors on vehicle-development testing.
Magazine

MOBILITY ENGINEERING: June 2016

2016-06-01
Base-engine value engineering for higher fuel efficiency and enhanced performance Continuous improvement in existing engines can be efficiently achieved with a value engineering approach. The integration of product development with value engineering ensures the achievement of specified targets in a systematic manner and within a defined timeframe. Integrated system engineering for valvetrain design and development of a high-speed diesel engine The lead time for engine development has reduced significantly with the advent of advanced simulation techniques. Cars poised to become 'a thing' Making automobiles part of the Internet of Things brings both risks and rewards. Agility training for cars Chassis component suppliers refine vehicle dynamics at the high end and entry level with four-wheel steering and adaptive damping.
Magazine

MOBILITY ENGINEERING: March 2018

2018-03-01
Advancing toward driverless cars Autonomous-driving technology is set to revolutionize the auto industry. But getting to a true "driverless" future will be an iterative process based on merging numerous individual innovations. Overcoming the challenges of HCCI combustion Homogenous-charge compression ignition (HCCI) holds considerable promise to unlock new IC-engine efficiencies. But HCCI's advantages bring engineering obstacles, particularly emissions control. Simulation for tractor cabin vibroacoustic optimization Method of identifying and stopping an electronically controlled diesel engine in runaway mode Electrification not a one-size-fits-all solution Efforts in the off-highway industry have been under way for decades, but electrification technology still faces implementation challenges. 700 miles, hands-free! GM's Super Cruise turns Cadillac drivers into passengers in a well-engineered first step toward greater vehicle autonomy.
Magazine

MOBILITY ENGINEERING: September 2017

2017-09-01
Connected commercial vehicles bring cybersecurity to the fore Connectivity, automation and electrification will drive vehicle development in the near future, say industry experts attending the revamped SAE COMVEC 17 event.
Magazine

Mobility Engineering: September 2015

2015-09-01
The advent of stop-start technology As environmental concerns grow for R&D teams, OEMs look to bring the strategy further into the mainstream. Recycling opportunities for hybrid/electric vehicle lithium-ion batteries With limited reserves and strict environmental regulations, re-cyclers look to established extraction means to reuse, recycle, and dispose of the used batteries. Cameras look to go the distance Automakers seek vision systems with greater distances, improved reliability, and more functionality, thanks to ruggedized complementary metal-oxide semiconductor technologies. Getting right with composites With composites now a mainstay in most new aircraft de-signs, the engineering emphasis has switched from understanding if they work to thinking through the most efficient way to manufacture them, such as using design-for-manufacturing software.
Technical Paper

Optimizing CAN Bus Security with In-Place Cryptography

2019-01-16
2019-01-0098
In-vehicle networks used for inter-ECU communication, most commonly the CAN bus, were not designed with cybersecurity in mind, and as a result, communication by corrupt devices connected to the bus is not authenticated.
Event

Program - Government/Industry Meeting 2024

2024-05-19
Annual conference government policy, regulatory makers, automotive industry neutral forum discuss US government regulation, technology, customer acceptance future vehicle design. industry event safety, emission control, fuel efficiency, automated vehicles.
Journal Article

Real-Time Network Defense of SAE J1939 Address Claim Attacks

2021-08-30
Abstract Heavy vehicles are essential for the modern economy, delivering critical food, supplies, and freight throughout the world. Connected heavy vehicles are also driven by embedded computers that utilize internal communication using common standards. However, some implementations of the standards leave an opening for a malicious actor to abuse the system. One such abuse case is a cyber-attack known as the “Address Claim Attack.” Proposed in 2018, this attack uses a single network message to disable all communication to and from a target electronic control unit, which may have a detrimental effect on operating the vehicle. This article demonstrates the viability of the attack and then describes the implementation of a solution to prevent this attack in real time without requiring any intervention from the manufacturer of the target devices. The defense technique uses a bit-banged Controller Area Network (CAN) filter to detect the attack.
X