Refine Your Search

Search Results

Viewing 1 to 2 of 2
Technical Paper

Recognizing Manipulated Electronic Control Units

2015-04-14
2015-01-0202
Combatting the modification of automotive control systems is a current and future challenge for OEMs and suppliers. ‘Chip-tuning’ is a manifestation of manipulation of a vehicle's original setup and calibration. With the increase in automotive functions implemented in software and corresponding business models, chip tuning will become a major concern. Recognizing and reporting of tuned control units in a vehicle is required for technical as well as legal reasons. This work approaches the problem by capturing the behavior of relevant control units within a machine learning system called a recognition module. The recognition module continuously monitors vehicle's sensor data. It comprises a set of classifiers that have been trained on the intended behavior of a control unit before the vehicle is delivered. When the vehicle is on the road, the recognition module uses the classifier together with current data to ascertain that the behavior of the vehicle is as intended.
Journal Article

“Verify-on-Demand” - A Practical and Scalable Approach for Broadcast Authentication in Vehicle-to-Vehicle Communication

2011-04-12
2011-01-0584
In general for Vehicle-to-Vehicle (V2V) communication, message authentication is performed on every received wireless message by conducting verification for a valid signature, and only messages that have been successfully verified are processed further. In V2V safety communication, there are a large number of vehicles and each vehicle transmits safety messages frequently; therefore the number of received messages per second would be large. Thus authentication of each and every received message, for example based on the IEEE 1609.2 standard, is computationally very expensive and can only be carried out with expensive dedicated cryptographic hardware. An interesting observation is that most of these routine safety messages do not result in driver warnings or control actions since we expect that the safety system would be designed to provide warnings or control actions only when the threat of collision is high.
X