Refine Your Search

Topic

Search Results

Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

2018-05-16
Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
Journal Article

Cybersecurity Vulnerabilities for Off-Board Commercial Vehicle Diagnostics

2023-04-11
2023-01-0040
The lack of inherent security controls makes traditional Controller Area Network (CAN) buses vulnerable to Machine-In-The-Middle (MitM) cybersecurity attacks. Conventional vehicular MitM attacks involve tampering with the hardware to directly manipulate CAN bus traffic.
Training / Education

Cybersecurity in the Energy Sector

Anytime
Anatomy and examples of cyberattacks on industrial control systems (ICS) and critical infrastructures (CI): In this course you will understand the importance of cybersecurity for Critical Infrastructure and you will know typical attack vectors, vulnerabilities and defense strategies. ...Decentralized Energy Systems Security: In this course you will know relevant technical countermeasures for cybersecurity. You will understand threats and solutions concerning data communication and network security in the energy systems.
Event

Digital Summit - WCX™ World Congress Experience

2024-05-17
If you are not able to attend WCX 2022 in-person, you will have the opportunity to join a selected number of live technical and executive discussions online that will advance your skill set in propulsion, connectivity security and safety as well as the business of technology.
Event

Digital Summit - WCX™ World Congress Experience

2024-05-17
If you are not able to attend WCX 2022 in-person, you will have the opportunity to join a selected number of live technical and executive discussions online that will advance your skill set in propulsion, connectivity security and safety as well as the business of technology.
Article

Europe’s blockchain-based Smart E-Mobility Challenge will conclude this May in Germany

2019-05-07
TIoTA, an open software consortium of over 50 members organized to support the creation of a secure, scalable, interoperable, and trusted IoT ecosystem, began the E-Mobility Challenge to link IoT devices with consumers and stakeholder companies such as operators and service, communication, and payment providers within the preexisting European electric vehicle ecosystem.
Standard

Hardware Protected Security for Ground Vehicles

2020-02-10
CURRENT
J3101_202002
Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section is a generalization of such use cases in an attempt to extract common requirements for the hardware protected security environment that enable it to be a gatekeeper. Examples are: Creating a new key fob Re-flashing ECU firmware Reading/exporting PII out of the ECU Using a subscription-based feature Performing some service on an ECU Transferring ownership of the vehicle Some of these examples are discussed later in this section and some have detailed sections of their own. This list is by no means comprehensive.
Article

MOBI rolls out the first blockchain-enabled Vehicle Identity (VID) mobility standard

2019-07-18
The Mobility Open Blockchain Initiative – a global nonprofit working to create standards in blockchain, distributed ledgers, and related technologies for consumers, smart cities, and mobility – has launched the industry's first vehicle identification (VID) standard incorporating blockchain technology into a digital vehicle identification system.
Magazine

MOBILITY ENGINEERING: June 2016

2016-06-01
Base-engine value engineering for higher fuel efficiency and enhanced performance Continuous improvement in existing engines can be efficiently achieved with a value engineering approach. The integration of product development with value engineering ensures the achievement of specified targets in a systematic manner and within a defined timeframe. Integrated system engineering for valvetrain design and development of a high-speed diesel engine The lead time for engine development has reduced significantly with the advent of advanced simulation techniques. Cars poised to become 'a thing' Making automobiles part of the Internet of Things brings both risks and rewards. Agility training for cars Chassis component suppliers refine vehicle dynamics at the high end and entry level with four-wheel steering and adaptive damping.
Magazine

MOBILITY ENGINEERING: March 2018

2018-03-01
Advancing toward driverless cars Autonomous-driving technology is set to revolutionize the auto industry. But getting to a true "driverless" future will be an iterative process based on merging numerous individual innovations. Overcoming the challenges of HCCI combustion Homogenous-charge compression ignition (HCCI) holds considerable promise to unlock new IC-engine efficiencies. But HCCI's advantages bring engineering obstacles, particularly emissions control. Simulation for tractor cabin vibroacoustic optimization Method of identifying and stopping an electronically controlled diesel engine in runaway mode Electrification not a one-size-fits-all solution Efforts in the off-highway industry have been under way for decades, but electrification technology still faces implementation challenges. 700 miles, hands-free! GM's Super Cruise turns Cadillac drivers into passengers in a well-engineered first step toward greater vehicle autonomy.
Training / Education

Managing Energy Data: Advanced Analytics

Anytime
Introduction to Managing Energy Data: The Internet of Things (IoT) revolution (eg. the vast spread of smart meters worldwide) is generating massive amounts of energy data, drastically transforming the sector and current energy systems. This digital transformation gives rise to more intelligent ways of managing energy and brings about opportunities for energy companies to improve their business models and services. This course contains a brief introduction to the topics presented in the course, from smart meters and smart metering data to data science.
Event

Program - Government/Industry Meeting 2024

2024-05-17
Annual conference government policy, regulatory makers, automotive industry neutral forum discuss US government regulation, technology, customer acceptance future vehicle design. industry event safety, emission control, fuel efficiency, automated vehicles.
Journal Article

Real-Time Network Defense of SAE J1939 Address Claim Attacks

2021-08-30
Abstract Heavy vehicles are essential for the modern economy, delivering critical food, supplies, and freight throughout the world. Connected heavy vehicles are also driven by embedded computers that utilize internal communication using common standards. However, some implementations of the standards leave an opening for a malicious actor to abuse the system. One such abuse case is a cyber-attack known as the “Address Claim Attack.” Proposed in 2018, this attack uses a single network message to disable all communication to and from a target electronic control unit, which may have a detrimental effect on operating the vehicle. This article demonstrates the viability of the attack and then describes the implementation of a solution to prevent this attack in real time without requiring any intervention from the manufacturer of the target devices. The defense technique uses a bit-banged Controller Area Network (CAN) filter to detect the attack.
X