Refine Your Search

Topic

Search Results

Journal Article

Simulation Study on Influence of Environmental Temperature on Current-Carrying Capacity of Automotive Electrical Connector

2021-11-12
Abstract The purpose of this article is to reduce the adverse effects of temperature rise on the electrical connector, reduce the failure risk of electrical connector due to the mismatch of current-carrying capacity selection, and improve the service life of the electrical connector. This article takes a certain type of vehicle electric connector as the research object. An accurate contact pair model of the electrical connector is established by SOLIDWORKS software. The force and thermoelectric coupling simulation analysis of the 3D solid model with reasonable load and boundary conditions was carried out by ABAQUS software. The results show that the insertion force and positive force of the electrical connector terminal are in line with the values specified in the standard.
Journal Article

Sliced Secure Boot: An Accelerated Secure Boot Concept Compatible with Automotive Safety Controllers

2023-06-08
Abstract The secure boot has successfully protected systems from executing untrusted software (SW), but low-power controllers lack sufficient time to check every memory cell while satisfying real-time functional safety requirements. Automotive controllers need to maintain security through multiple cycles of remote, unsupervised operation and safely reach a secure state when an anomaly is detected. To accelerate the boot time, we propose Sliced Secure Boot: build fingerprints by slicing orthogonally through memory blocks, protect each cell with a reusable fingerprint using a reproducible pattern with sufficient entropy, and randomly check one fingerprint pattern during boot. We do not claim that sampling offers equivalent protection to exhaustive checks but demonstrate that careful sampling can provide a sufficient level of detection while maintaining compatibility with both startup time and functional safety requirements.
Journal Article

Software-Based Approach for Sharing Real-Time Peripherals in a Virtualized Automotive Microcontroller Platform

2021-05-11
Abstract In the automotive domain, the evolution of electrical and electronic (E/E) architecture trend is toward consolidating multiple heterogeneous applications executing on individual devices onto a centralized powerful computing platform. Many forums debate the nature of this centralized computing platform. At least for another decade, automotive powertrain functions will continue their development on a multicore controller platform (MCU) instead of many core processors. Data security and the need to meet Automotive Safety Integrity Level D (ASIL-D)-compliant powertrain functions are some of the reasons for this preference. For the centralized computing platform, virtualizing the underlying MCU will facilitate the simultaneous execution of heterogeneous powertrain applications with guaranteed spatial and temporal isolation. A common problem in virtualizing the MCU is the sharing of peripherals, which are comparatively scarce.
Journal Article

The Autonomous Racing Software Stack of the KIT19d

2022-01-06
Abstract Formula Student Driverless (FSD) challenges engineering students to develop autonomous single-seater race cars in a quest to bring about more graduates who are well prepared to solve the real-world problems associated with autonomous driving. In this article, we present the software stack of KA-RaceIng’s entry to the 2019 competitions. We cover the essential modules of the system, including perception, localization, mapping, motion planning, and control. Furthermore, development methods are outlined, and an overview of the system architecture is given. We conclude by presenting selected runtime measurements, data logs, and competition results to provide an insight into the performance of the final prototype.
Journal Article

The Missing Link: Aircraft Cybersecurity at the Operational Level

2020-07-25
Abstract Aircraft cybersecurity efforts have tended to focus at the strategic or tactical levels without a clear connection between the two. There are many excellent engineering tools already in widespread use, but many organizations have not yet integrated and linked them into an overarching “campaign plan” that connects those tactical actions such as process hazard analysis, threat modeling, and probabilistic methods to the desired strategic outcome of secure and resilient systems. This article presents the combined systems security engineering process (CSSEP) as a way to fill that gap. Systems theory provides the theoretical foundation on which CSSEP is built. CSSEP is structured as a control loop in which the engineering team is the controller of the design process. The engineering team needs to have an explicit process model on how systems should be secured, and a control algorithm that determines what control actions should be selected.
Journal Article

The Placement of Digitized Objects in a Point Cloud as a Photogrammetric Technique

2018-08-08
Abstract The frequency of video-capturing collision events from surveillance systems are increasing in reconstruction analyses. The video that has been provided to the investigator may not always include a clear perspective of the relevant area of interest. For example, surveillance video of an incident may have captured a pre- or post-incident perspective that, while failing to capture the precise moment when the pedestrian was struck by a vehicle, still contains valuable information that can be used to assist in reconstructing the incident. When surveillance video is received, a quick and efficient technique to place the subject object or objects into a three-dimensional environment with a known rate of error would add value to the investigation.
Journal Article

Transition to Electric Vehicles in China: Implications for Total Cost of Ownership and Cost to Society

2020-07-08
Abstract China is driving the transition away from internal combustion engine vehicles (ICEVs) to plug-in electric vehicles (PEVs, including plug-in hybrid electric vehicles (PHEVs) and battery electric vehicles (BEVs)) to address its pressing energy security and environmental pollution problems. The recent enactment of the dual-credit scheme mandate will compensate for the phase out of the subsidy program, while ostensibly shifting the burden of filling in the cost gap between PEVs and ICEVs from the government to the automakers (though in practice to car buyers).
Journal Article

Understanding Subsidies to Achieve Diesel Powertrain Financial Parity for Heavy-Duty Fuel Cell Electric Vehicles

2022-12-07
Abstract The development of a long-term sustainable hydrogen energy economy for commercial vehicle transportation will need to overcome key critical technical and logistics considerations in the near term. As compared to zero-emission powertrains, fossil-fuel-based powertrains provide mission flexibility and high uptime at a comparatively low total cost of ownership (TCO). While the incumbent carbon-intensive powertrains suffer from poor efficiency and are not sustainable to support global climate change initiatives in transportation decarbonization, techno-economic challenges continue to create complex barriers to the large-scale displacement of these with highly electrified powertrains architectures. This article specifically addresses opportunities that well-targeted subsidies would afford in achieving fuel cell electric powertrain financial parity with diesel powertrains in heavy-duty trucks (HDTs).
Journal Article

Using a Dual-Layer Specification to Offer Selective Interoperability for Uptane

2020-08-24
Abstract This work introduces the concept of a dual-layer specification structure for standards that separate interoperability functions, such as backward compatibility, localization, and deployment, from those essential to reliability, security, and functionality. The latter group of features, which constitute the actual standard, make up the baseline layer for instructions, while all the elements required for interoperability are specified in a second layer, known as a Protocols, Operations, Usage, and Formats (POUF) document. We applied this technique in the development of a standard for Uptane [1], a security framework for over-the-air (OTA) software updates used in many automobiles. This standard is a good candidate for a dual-layer specification because it requires communication between entities, but does not require a specific format for this communication.
Journal Article

What Can User Typologies Tell Us about Carsickness Criticality in Future Mobility Systems

2022-02-15
Abstract Car manufacturers are continuously improving passenger comfort by advancing technologies including highly automated driving. Before the broad introduction of automated driving, specific human factors regarding passenger comfort must be considered, including motion sickness. Therefore, the identification of the frequency of motion sickness and associated factors in the population is needed to extrapolate the effects for future mobility systems. We conducted three surveys between 2015 and 2020, asking people questions about their experience with motion sickness in cars. Based on the responses of 1165 participants, gender and age showed a strong influence on the self-reported frequency of motion sickness. For deeper analysis, a logistic order regression model was used to estimate the frequency of motion sickness for different user typologies.
Journal Article

Wireless Security in Vehicular Ad Hoc Networks: A Survey

2022-08-17
Abstract Vehicular communications face unique security issues in wireless communications. While new vehicles are equipped with a large set of communication technologies, product life cycles are long and software updates are not widespread. The result is a host of outdated and unpatched technologies being used on the street. This has especially severe security impacts because autonomous vehicles are pushing into the market, which will rely, at least partly, on the integrity of the provided information. We provide an overview of the currently deployed communication systems and their security weaknesses and features to collect and compare widely used security mechanisms. In this survey, we focus on technologies that work in an ad hoc manner. This includes Long-Term Evolution mode 4 (LTE-PC5), Wireless Access in Vehicular Environments (WAVE), Intelligent Transportation Systems at 5 Gigahertz (ITS-G5), and Bluetooth.
Journal Article

Worsening Perception: Real-Time Degradation of Autonomous Vehicle Perception Performance for Simulation of Adverse Weather Conditions

2022-01-06
Abstract Autonomous vehicles (AVs) rely heavily upon their perception subsystems to “see” the environment in which they operate. Unfortunately, the effect of variable weather conditions presents a significant challenge to object detection algorithms, and thus, it is imperative to test the vehicle extensively in all conditions which it may experience. However, the development of robust AV subsystems requires repeatable, controlled testing—while real weather is unpredictable and cannot be scheduled. Real-world testing in adverse conditions is an expensive and time-consuming task, often requiring access to specialist facilities. Simulation is commonly relied upon as a substitute, with increasingly visually realistic representations of the real world being developed.
X