Refine Your Search

Search Results

Viewing 1 to 10 of 10
Technical Paper

Vehicle Diagnostics Adapter Cybersecurity Concerns with Wireless Connectivity

2023-04-11
2023-01-0034
Maintaining and diagnosing vehicle systems often involves a technician connecting a service computer to the vehicle diagnostic port through a vehicle diagnostics adapter (VDA). This creates a connection from the service software to the vehicle network through a protocol adapter. Often, the protocols for the personal computer (PC) hosted diagnostic programs use USB, and the diagnostic port provides access to the controller area network (CAN). However, the PC can also communicate to the VDA via WiFi or Bluetooth. There may be scenarios where these wireless interfaces are not appropriate, such as maintaining military vehicles. As such, a method to defeature the wireless capabilities of a typical vehicle diagnostic adapter is demonstrated without access to the source code or modifying the hardware. The process of understanding the vehicle diagnostic adapter system, its hardware components, the firmware for the main processor and subsystems, and the update mechanism is explored.
Technical Paper

Using Ethernet or a Wireless Harness and Named Data Networking in Autonomous Tractor-Trailer Communication

2023-04-11
2023-01-0924
Autonomous truck and trailer configurations face challenges when operating in reverse due to the lack of sensing on the trailer. It is anticipated that sensor packages will be installed on existing trailers to extend autonomous operations while operating in reverse in uncontrolled environments, like a customer's loading dock. Power Line Communication (PLC) between the trailer and the tractor cannot support high bandwidth and low latency communication. This paper explores the impact of using Ethernet or a wireless medium for commercial trailer-tractor communication on the lifecycle and operation of trailer electronic control units (ECUs) from a Systems Engineering perspective to address system requirements, integration, and security. Additionally, content-based and host-based networking approaches for in-vehicle communication, such as Named Data Networking (NDN) and IP-based networking are compared.
Technical Paper

Data Collection for Incident Response for Vehicles with Autonomous Systems

2023-04-11
2023-01-0628
First responders and traffic crash investigators collect and secure evidence necessary to determine the cause of a crash. As vehicles with advanced autonomous features become more common on the road, inevitably they will be involved in such incidents. Thus, traditional data collection requirements may need to be augmented to accommodate autonomous technology and the connectivity associated with autonomous and semi-autonomous driving features. The objective of this paper is to understand the data from a fielded autonomous system and to motivate the development of requirements for autonomous vehicle data collection. The issue of data ownership and access will be discussed. Additional complicating factors, such as cybersecurity concerns combined with a first responder’s legal authority, may pose challenges for traditional data collection.
Journal Article

Cybersecurity Vulnerabilities for Off-Board Commercial Vehicle Diagnostics

2023-04-11
2023-01-0040
The lack of inherent security controls makes traditional Controller Area Network (CAN) buses vulnerable to Machine-In-The-Middle (MitM) cybersecurity attacks. Conventional vehicular MitM attacks involve tampering with the hardware to directly manipulate CAN bus traffic. We show, however, that MitM attacks can be realized without direct tampering of any CAN hardware. Our demonstration leverages how diagnostic applications based on RP1210 are vulnerable to Machine-In-The-Middle attacks. Test results show SAE J1939 communications, including single frame and multi-framed broadcast and on-request messages, are susceptible to data manipulation attacks where a shim DLL is used as a Machine-In-The-Middle. The demonstration shows these attacks can manipulate data that may mislead vehicle operators into taking the wrong actions.
Technical Paper

Secure Controller Area Network Logging

2021-04-06
2021-01-0136
Practical encryption is an important tool in improving the cybersecurity posture of vehicle data loggers and engineering tools. However, low-cost embedded systems struggle with reliably capturing and encrypting all frames on the vehicle networks. In this paper, implementations of symmetric and asymmetric algorithms were used to perform envelope encryption of session keys with symmetric encryption algorithms while logging vehicle controller area network (CAN) traffic. Maintaining determinism and minimizing latency are primary considerations when implementing cryptographic solutions in an embedded system. To satisfy the timing requirements for vehicle systems, the memory-mapped Cryptographic Acceleration Unit (mmCAU) on the NXP K66 processor enabled 6.4Mb/sec symmetric encryption rates, which enables logging of multiple channels at 100% bus load. Using AES-128 in Cipher Block Chaining (CBC) mode provides the encryption for data confidentiality.
Journal Article

Chip and Board Level Digital Forensics of Cummins Heavy Vehicle Event Data Recorders

2020-04-14
2020-01-1326
Crashes involving Cummins powered heavy vehicles can damage the electronic control module (ECM) containing heavy vehicle event data recorder (HVEDR) records. When ECMs are broken and data cannot be extracted using vehicle diagnostics tools, more invasive and low-level techniques are needed to forensically preserve and decode HVEDR data. A technique for extracting non-volatile memory contents using non-destructive board level techniques through the available in-circuit debugging port is presented. Additional chip level data extraction techniques can also provide access to the HVEDR data. Once the data is obtained and preserved in a forensically sound manner, the binary record is decoded to reveal typical HVDER data like engine speed, vehicle speed, accelerator pedal position, and other status data. The memory contents from the ECM can be written to a surrogate and decoded with traditional maintenance and diagnostic software.
Journal Article

Towards a Cyber Assurance Testbed for Heavy Vehicle Electronic Controls

2016-09-27
2016-01-8142
Cyber assurance of heavy trucks is a major concern with new designs as well as with supporting legacy systems. Many cyber security experts and analysts are used to working with traditional information technology (IT) networks and are familiar with a set of technologies that may not be directly useful in the commercial vehicle sector. To help connect security researchers to heavy trucks, a remotely accessible testbed has been prototyped for experimentation with security methodologies and techniques to evaluate and improve on existing technologies, as well as developing domain-specific technologies. The testbed relies on embedded Linux-based node controllers that can simulate the sensor inputs to various heavy vehicle electronic control units (ECUs). The node controller also monitors and affects the flow of network information between the ECUs and the vehicle communications backbone.
Journal Article

Quantifying Uncertainty in Vehicle Simulation Studies

2012-04-16
2012-01-0506
The design of vehicles, particularly hybrid and other advanced technology vehicles, is typically complex and benefits from systems engineering processes. Vehicle modeling and simulation have become increasingly important system design tools to improve the accuracy, repeatability, and flexibility of the design process. In developing vehicle computational models and simulation, there is an inevitable compromise between the level of detail and the development/computational cost. The tradeoff is specific to the requirements of each vehicle design effort. The assumptions and detail limitations used for vehicle simulations lead to a varying degree of result uncertainty for each design effort. This paper provides a literature review to investigate the state of the art vehicle simulation methods, and quantifies the uncertainty associated with components that are commonly allocated uncertainty.
Technical Paper

Six Sigma Methodologies in Microjoining - Improve Step

2002-03-04
2002-01-0900
A current general need within Six Sigma methodologies is to utilize statistical methods including experimental design in the confirmation of new processes and their parameters. This is typically done in the improve step of the DMAIC process. This need is even more evident in microjoining (small scale resistance welding) due to the number and complexity of the process variables. This paper outlines the improve step of a Six Sigma project in which statistical methods are applied to a microjoining process. These statistical methods include linear experimental design, regression analysis with linear transformation and mathematical modeling. The paper documents the methodology used to establish process parameters in microjoining of an electrical lead frame design.
Technical Paper

Six Sigma Methodologies in Ignition Coil Manufacturing Using Experimental Design - Improve Step

2002-03-04
2002-01-0899
Quality issues in magnet wire stripping and soldering have led to continuous improvement efforts in ignition coil manufacturing using Six Sigma methodologies. This effort has resulted in the investigation of an alternative product and process design, microjoining. This paper describes the continuation of development occurring during the improvement phase of a Six Sigma project. The confirmation of the results is accomplished through the use of experimental design, response surface methodologies, mathematical modeling and optimization of the process. Nonlinear design of experiments have been used to confirm a breakthrough microjoining process developed that is an alternative to soldering. The statistical methods used to develop the process build on the current documented research efforts.
X