Refine Your Search

Topic

Affiliation

Search Results

Technical Paper

Evaluating Network Security Configuration (NSC) Practices in Vehicle-Related Android Applications

2024-04-09
2024-01-2881
Android applications have historically faced vulnerabilities to man-in-the-middle attacks due to insecure custom SSL/TLS certificate validation implementations. In response, Google introduced the Network Security Configuration (NSC) as a configuration-based solution to improve the security of certificate validation practices. NSC was initially developed to enhance the security of Android applications by providing developers with a framework to customize network security settings. However, recent studies have shown that it is often not being leveraged appropriately to enhance security. Motivated by the surge in vehicular connectivity and the corresponding impact on user security and data privacy, our research pivots to the domain of mobile applications for vehicles. As vehicles increasingly become repositories of personal data and integral nodes in the Internet of Things (IoT) ecosystem, ensuring their security moves beyond traditional issues to one of public safety and trust.
Technical Paper

Extended Deep Learning Model to Predict the Electric Vehicle Motor Operating Point

2024-04-09
2024-01-2551
The transition from combustion engines to electric propulsion is accelerating in every coordinate of the globe. The engineers had strived hard to augment the engine performance for more than eight decades, and a similar challenge had emerged again for electric vehicles. To analyze the performance of the engine, the vector engine operating point (EOP) is defined, which is common industry practice, and the performance vector electric vehicle motor operating point (EVMOP) is not explored in the existing literature. In an analogous sense, electric vehicles are embedded with three primary components, e.g., Battery, Inverter, Motor, and in this article, the EVMOP is defined using the parameters [motor torque, motor speed, motor current]. As a second aspect of this research, deep learning models are developed to predict the EVMOP by mapping the parameters representing the dynamic state of the system in real-time.
Technical Paper

Comprehensive Evaluation of Behavioral Competence of an Automated Vehicle Using the Driving Assessment (DA) Methodology

2024-04-09
2024-01-2642
With the development of vehicles equipped with automated driving systems, the need for systematic evaluation of AV performance has grown increasingly imperative. According to ISO 34502, one of the safety test objectives is to learn the minimum performance levels required for diverse scenarios. To address this need, this paper combines two essential methodologies - scenario-based testing procedures and scoring systems - to systematically evaluate the behavioral competence of AVs. In this study, we conduct comprehensive testing across diverse scenarios within a simulator environment following Mcity AV Driver Licensing Test procedure. These scenarios span several common real-world driving situations, including BV Cut-in, BV Lane Departure into VUT Path from Opposite Direction, BV Left Turn Across VUT Path, and BV Right Turn into VUT Path scenarios.
Technical Paper

An Ultra-Light Heuristic Algorithm for Autonomous Optimal Eco-Driving

2023-04-11
2023-01-0679
Connected autonomy brings with it the means of significantly increasing vehicle Energy Economy (EE) through optimal Eco-Driving control. Much research has been conducted in the area of autonomous Eco-Driving control via various methods. Generally, proposed algorithms fall into the broad categories of rules-based controls, optimal controls, and meta-heuristics. Proposed algorithms also vary in cost function type with the 2-norm of acceleration being common. In a previous study the authors classified and implemented commonly represented methods from the literature using real-world data. Results from the study showed a tradeoff between EE improvement and run-time and that the best overall performers were meta-heuristics. Results also showed that cost functions sensitive to the 1-norm of acceleration led to better performance than those which directly minimize the 2-norm.
Technical Paper

Using Ethernet or a Wireless Harness and Named Data Networking in Autonomous Tractor-Trailer Communication

2023-04-11
2023-01-0924
Autonomous truck and trailer configurations face challenges when operating in reverse due to the lack of sensing on the trailer. It is anticipated that sensor packages will be installed on existing trailers to extend autonomous operations while operating in reverse in uncontrolled environments, like a customer's loading dock. Power Line Communication (PLC) between the trailer and the tractor cannot support high bandwidth and low latency communication. This paper explores the impact of using Ethernet or a wireless medium for commercial trailer-tractor communication on the lifecycle and operation of trailer electronic control units (ECUs) from a Systems Engineering perspective to address system requirements, integration, and security. Additionally, content-based and host-based networking approaches for in-vehicle communication, such as Named Data Networking (NDN) and IP-based networking are compared.
Technical Paper

Data Collection for Incident Response for Vehicles with Autonomous Systems

2023-04-11
2023-01-0628
First responders and traffic crash investigators collect and secure evidence necessary to determine the cause of a crash. As vehicles with advanced autonomous features become more common on the road, inevitably they will be involved in such incidents. Thus, traditional data collection requirements may need to be augmented to accommodate autonomous technology and the connectivity associated with autonomous and semi-autonomous driving features. The objective of this paper is to understand the data from a fielded autonomous system and to motivate the development of requirements for autonomous vehicle data collection. The issue of data ownership and access will be discussed. Additional complicating factors, such as cybersecurity concerns combined with a first responder’s legal authority, may pose challenges for traditional data collection.
Technical Paper

Neural Network Model to Predict the Thermal Operating Point of an Electric Vehicle

2023-04-11
2023-01-0134
The automotive industry widely accepted the launch of electric vehicles in the global market, resulting in the emergence of many new areas, including battery health, inverter design, and motor dynamics. Maintaining the desired thermal stress is required to achieve augmented performance along with the optimal design of these components. The HVAC system controls the coolant and refrigerant fluid pressures to maintain the temperatures of [Battery, Inverter, Motor] in a definite range. However, identifying the prominent factors affecting the thermal stress of electric vehicle components and their effect on temperature variation was not investigated in real-time. Therefore, this article defines the vector electric vehicle thermal operating point (EVTHOP) as the first step with three elements [instantaneous battery temperature, instantaneous inverter temperature, instantaneous stator temperature].
Journal Article

Cybersecurity Vulnerabilities for Off-Board Commercial Vehicle Diagnostics

2023-04-11
2023-01-0040
The lack of inherent security controls makes traditional Controller Area Network (CAN) buses vulnerable to Machine-In-The-Middle (MitM) cybersecurity attacks. Conventional vehicular MitM attacks involve tampering with the hardware to directly manipulate CAN bus traffic. We show, however, that MitM attacks can be realized without direct tampering of any CAN hardware. Our demonstration leverages how diagnostic applications based on RP1210 are vulnerable to Machine-In-The-Middle attacks. Test results show SAE J1939 communications, including single frame and multi-framed broadcast and on-request messages, are susceptible to data manipulation attacks where a shim DLL is used as a Machine-In-The-Middle. The demonstration shows these attacks can manipulate data that may mislead vehicle operators into taking the wrong actions.
Technical Paper

An In-Cylinder Imaging Study of Pre-chamber Spark-Plug Flame Development in a Single-Cylinder Direct-Injection Spark-Ignition Engine

2023-04-11
2023-01-0254
Prior work in the literature have shown that pre-chamber spark plug technologies can provide remarkable improvements in engine performance. In this work, three passively fueled pre-chamber spark plugs with different pre-chamber geometries were investigated using in-cylinder high-speed imaging of spectral emission in the visible wavelength region in a single-cylinder direct-injection spark-ignition gasoline engine. The effects of the pre-chamber spark plugs on flame development were analyzed by comparing the flame progress between the pre-chamber spark plugs and with the results from a conventional spark plug. The engine was operated at fixed conditions (relevant to federal test procedures) with a constant speed of 1500 revolutions per minute with a coolant temperature of 90 oC and stoichiometric fuel-to-air ratio. The in-cylinder images were captured with a color high-speed camera through an optical insert in the piston crown.
Research Report

Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights

2022-07-28
EPR2022016
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality.
Technical Paper

Performance Evaluation of an Autonomous Vehicle Using Resilience Engineering

2022-03-29
2022-01-0067
Standard operation of autonomous vehicles on public roads results in significant exposure to high levels of risk. There is a significant need to develop metrics that evaluate safety of an automated system without reliance on the rate of vehicle accidents and fatalities compared to the number of miles driven; a proactive rather than a reactive metric is needed. Resilience engineering is a new paradigm for safety management that focuses on evaluating complex systems and their interaction with the environment. This paper presents the overall methodology of resilience engineering and the resilience assessment grid (RAG) as an evaluation tool to measure autonomous systems' resilience. This assessment tool was used to evaluate the ability to respond to the system. A Pure Pursuit controller was developed and utilized as the path tracking control algorithm, and the Carla simulator was used to implement the algorithm and develop the testing environment for this methodology.
Journal Article

Accelerating In-Vehicle Network Intrusion Detection System Using Binarized Neural Network

2022-03-29
2022-01-0156
Controller Area Network (CAN), the de facto standard for in-vehicle networks, has insufficient security features and thus is inherently vulnerable to various attacks. To protect CAN bus from attacks, intrusion detection systems (IDSs) based on advanced deep learning methods, such as Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), have been proposed to detect intrusions. However, those models generally introduce high latency, require considerable memory space, and often result in high energy consumption. To accelerate intrusion detection and also reduce memory requests, we exploit the use of Binarized Neural Network (BNN) and hardware-based acceleration for intrusion detection in in-vehicle networks. As BNN uses binary values for activations and weights rather than full precision values, it usually results in faster computation, smaller memory cost, and lower energy consumption than full precision models.
Journal Article

Estimating the Workload of Driving Using Video Clips as Anchors

2022-03-29
2022-01-0805
As new technology is added to vehicles and traffic congestion increases, there is a concern that drivers will be overloaded. As a result, there has been considerable interest in measuring driver workload. This can be achieved using many methods, with subjective assessments such as the NASA Task Loading Index (TLX) being most popular. Unfortunately, the TLX is unanchored, so there is no way to compare TLX values between studies, thus limiting the value of those evaluations. In response, a method was created to anchor overall workload ratings. To develop this method, 24 subjects rated the workload of clips of forward scenes collected while driving on rural, urban, and limited-access roads in relation to 2 looped anchor clips. Those clips corresponded to Level of Service (LOS) A and E (light and heavy traffic) and were assigned values of 2 and 6 respectively.
Technical Paper

Visualization of Frequency Response Using Nyquist Plots

2022-03-29
2022-01-0753
Nyquist plots are a classical means to visualize a complex vibration frequency response function. By graphing the real and imaginary parts of the response, the dynamic behavior in the vicinity of resonances is emphasized. This allows insight into how modes are coupling, and also provides a means to separate the modes. Mathematical models such as Nyquist analysis are often embedded in frequency analysis hardware. While this speeds data collection, it also removes this visually intuitive tool from the engineer’s consciousness. The behavior of a single degree of freedom system will be shown to be well described by a circle on its Nyquist plot. This observation allows simple visual examination of the response of a continuous system, and the determination of quantities such as modal natural frequencies, damping factors, and modes shapes. Vibration test data from an auto rickshaw chassis are used as an example application.
Technical Paper

Performance of DSRC V2V Communication Networks in an Autonomous Semi-Truck Platoon Application

2021-04-06
2021-01-0156
Autonomy for multiple trucks to drive in a fixed-headway platoon formation is achieved by adding precision GPS and V2V communications to a conventional adaptive cruise control (ACC) system. The performance of the Cooperative ACC (CACC) system depends heavily on the reliability of the underlying V2V communications network. Using data recorded on precision-instrumented trucks at both ACM and NCAT test tracks, we provide an understanding of various effects on V2V network performance: Occlusions - non-line-of-sight (NLOS) between the Tx and Rx antenna may cause network signal loss. Rain - water droplets in the air may cause network signal degradation. Antenna position - antennas at higher elevation may have less ground clutter to deal with. RF interference - interference may cause network packet loss. GPS outage - outages caused by tree cover, tunnels, etc. may result in degraded performance. Road curvature - curves may affect antenna diversity.
Technical Paper

Secure Controller Area Network Logging

2021-04-06
2021-01-0136
Practical encryption is an important tool in improving the cybersecurity posture of vehicle data loggers and engineering tools. However, low-cost embedded systems struggle with reliably capturing and encrypting all frames on the vehicle networks. In this paper, implementations of symmetric and asymmetric algorithms were used to perform envelope encryption of session keys with symmetric encryption algorithms while logging vehicle controller area network (CAN) traffic. Maintaining determinism and minimizing latency are primary considerations when implementing cryptographic solutions in an embedded system. To satisfy the timing requirements for vehicle systems, the memory-mapped Cryptographic Acceleration Unit (mmCAU) on the NXP K66 processor enabled 6.4Mb/sec symmetric encryption rates, which enables logging of multiple channels at 100% bus load. Using AES-128 in Cipher Block Chaining (CBC) mode provides the encryption for data confidentiality.
Technical Paper

High-Fidelity Modeling of Light-Duty Vehicle Emission and Fuel Economy Using Deep Neural Networks

2021-04-06
2021-01-0181
The transportation sector contributes significantly to emissions and air pollution globally. Emission models of modern vehicles are important tools to estimate the impact of technologies or controls on vehicle emission reductions, but developing a simple and high-fidelity model is challenging due to the variety of vehicle classes, driving conditions, driver behaviors, and other physical and operational constraints. Recent literature indicates that neural network-based models may be able to address these concerns due to their high computation speed and high-accuracy of predicted emissions. In this study, we seek to expand upon this initial research by utilizing several deep neural networks (DNN) architectures such as a recurrent neural network (RNN) and a convolutional neural network (CNN). These DNN algorithms are developed specific to the vehicle-out emissions prediction application, and a comprehensive assessment of their performances is done.
X