Refine Your Search

Topic

Search Results

Journal Article

Effect of Spoke Design and Material Nonlinearity on Non-Pneumatic Tire Stiffness and Durability Performance

2021-08-06
Abstract The non-pneumatic tire (NPT) has been widely used due to its advantages of no run-flat, no need for air maintenance, low rolling resistance, and improvement of passenger comfort due to its better shock absorption. It has a variety of applications in military vehicles, earthmovers, the lunar rover, stair-climbing vehicles, etc. Recently, the Unique Puncture-Proof Tire System (UPTIS) NPT has been introduced for passenger vehicles. In this study, three different design configurations, viz., Tweel, Honeycomb, and newly developed UPTIS, have been compared. The effect of polyurethane (PU) material nonlinearity has also been introduced by applying five different nonlinear PU material properties in the spokes. The combined analysis of the PU material nonlinearity and spoke design configuration on the overall tire stiffness and spoke damage prediction is done using three-dimensional (3D) finite element modelling (FEM) simulations performed in ANSYS 16.0.
Journal Article

A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems

2021-11-16
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
Journal Article

Using a Dual-Layer Specification to Offer Selective Interoperability for Uptane

2020-08-24
Abstract This work introduces the concept of a dual-layer specification structure for standards that separate interoperability functions, such as backward compatibility, localization, and deployment, from those essential to reliability, security, and functionality. The latter group of features, which constitute the actual standard, make up the baseline layer for instructions, while all the elements required for interoperability are specified in a second layer, known as a Protocols, Operations, Usage, and Formats (POUF) document. We applied this technique in the development of a standard for Uptane [1], a security framework for over-the-air (OTA) software updates used in many automobiles. This standard is a good candidate for a dual-layer specification because it requires communication between entities, but does not require a specific format for this communication.
Journal Article

Securing the On-Board Diagnostics Port (OBD-II) in Vehicles

2020-08-18
Abstract Modern vehicles integrate Internet of Things (IoT) components to bring value-added services to both drivers and passengers. These components communicate with the external world through different types of interfaces including the on-board diagnostics (OBD-II) port, a mandatory interface in all vehicles in the United States and Europe. While this transformation has driven significant advancements in efficiency and safety, it has also opened a door to a wide variety of cyberattacks, as the architectures of vehicles were never designed with external connectivity in mind, and accordingly, security has never been pivotal in the design. As standardized, the OBD-II port allows not only direct access to the internal network of the vehicle but also installing software on the Electronic Control Units (ECUs).
Journal Article

A Comprehensive Attack and Defense Model for the Automotive Domain

2019-01-17
Abstract In the automotive domain, the overall complexity of technical components has increased enormously. Formerly isolated, purely mechanical cars are now a multitude of cyber-physical systems that are continuously interacting with other IT systems, for example, with the smartphone of their driver or the backend servers of the car manufacturer. This has huge security implications as demonstrated by several recent research papers that document attacks endangering the safety of the car. However, there is, to the best of our knowledge, no holistic overview or structured description of the complex automotive domain. Without such a big picture, distinct security research remains isolated and is lacking interconnections between the different subsystems. Hence, it is difficult to draw conclusions about the overall security of a car or to identify aspects that have not been sufficiently covered by security analyses.
Journal Article

Evaluation of Thermal Roll Formed Thick Composite Panels Using Surface NDT Methods

2017-09-19
Abstract Inspection of Composite panels is vital to the assessment of their ability to be fit for purpose. Conventional methods such as X-ray CT and Ultrasonic scanning can be used, however, these are often expensive and time consuming processes. In this paper we investigate the use of off-the-shelf Non-Destructive Test, NDT, equipment utilizing Fringe projection hardware and open source software to rapidly evaluate a series of composite panels. These results are then verified using destructive analysis of the panels to prove the reliability of the rapid NDT methods for use with carbon composite panels. This process allows us to quickly identify regions of geometric intolerance or formed defects without the use of expensive sub-surface scanning systems, enabling a fast and cost effective initial part evaluation system. The focus of this testing series is on 6mm thick pre-preg carbon-epoxy composite laminates that have been laid up using AFP and formed using TRF.
Journal Article

Separable and Standard Monte Carlo Simulation of Linear Dynamic Systems Using Combined Approximations

2019-01-25
Abstract Reliability analysis of a large-scale system under random dynamic loads can be a very time-consuming task since it requires repeated studies of the system. In many engineering problems, for example, wave loads on an offshore platform, the excitation loads are defined using a power spectral density (PSD) function. For a given PSD function, one needs to generate many time histories to make sure the excitation load is modeled accurately. Global and local approximation methods are available to predict the system response efficiently. Each way has their advantages and shortcomings. The combined approximations (CA) method is an efficient method, which combines the advantages of local and global approximations. This work demonstrates two methodologies that utilize CA to reduce the cost of crude or separable Monte Carlo simulation (MCS) of linear dynamic systems when the excitation loads are defined using PSD functions.
Journal Article

Data Manipulation Approach and Parameters Interrelationships of the High-Pressure Torsion for AA6061-15%SiCp Composite

2018-05-29
Abstract On contrast to the qualitative approach used in the majority of researches, an evaluation quantitative approach is introduced not only to depict the plain individual effect of the influence of the high-pressure torsion (HPT) processing conditions on the microstructural and Hv-values of the ultra-hard nanostructured AA6061-15%SiCp composite but also to detect its possible parameters functional interaction and nonlinear trends involved. Experimental data were used to establish many adequate and significant empirical models to detect and to evaluate the mutual functional interrelationships between the Hv-values of the composite, each of HPT processing pressure, and number of revolutions. For each group of interrelated parameters, the preferred selected developed model has been exploited to generate the relevant contours and response surface graphs.
Journal Article

Fuzz Testing Virtual ECUs as Part of the Continuous Security Testing Process

2020-08-18
Abstract There are already a number of cybersecurity activities introduced in the development process in the automotive industry. For example, security testing of automotive components is often performed at the late stages of development. Fuzz testing is often performed as part of the security testing activity. However, since testing occurs late in the development process, it is expensive and, in some cases, may be too late to fix certain identified issues. Another challenge is that some testing requires hardware that is costly and may not be available until late in the development. We suggest fuzz testing virtual ECUs, which overcomes these challenges and allows for more efficient and effective security testing.
Journal Article

Contrasting International Vehicle Security Laws from the Japanese Perspective

2020-08-18
Abstract Automotive cybersecurity is steadily becoming a key factor in the worldwide adoption of connected and self-driving vehicles. Following the trend set by legislation mandating standardized vehicle safety, international standards and legislation are being put into place to mandate vehicle security. Due to cultural and legal system differences, the priorities of different countries’ legislation often differ. This article seeks to explore the different approaches taken by countries in some of the major automotive markets, with a special emphasis on that of the Japanese automotive security landscape.
Journal Article

Pseudonym Issuing Strategies for Privacy-Preserving V2X Communication

2020-08-18
Abstract Connected vehicle technology consisting of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication falls under the umbrella of V2X, or Vehicle-to-Everything, communication. This enables vehicles and infrastructure to exchange safety-related information to enable smarter, safer roads. If driver alerts are raised or automated action is taken as a result of these messages, it is critical that messages are trustworthy and reliable. To this end, the Security Credential Management System (SCMS) and Cooperative Intelligent Transportation Systems (C-ITS) Credential Management System (CCMS) have been proposed to enable authentication and authorization of V2X messages without compromising individual user privacy. This is accomplished by issuing each vehicle a large set of “pseudonyms,” unrelated to any real-world identity. During operation, the vehicle periodically switches pseudonyms, thereby changing its identity to others in the network.
Journal Article

Evaluating How Functional Performance in Aerospace Components Is Affected by Geometric Variation

2018-06-05
Abstract Geometric variation stemming from manufacturing can be a limiting factor for the quality and reliability of products. Therefore, manufacturing assessments are increasingly being performed during the early stages of product development. In the aerospace industry, products are complex engineering systems, the development of which require multidisciplinary expertise. In such contexts, there are significant barriers against assessing the effects of geometric variation on the functionality of products. To overcome these barriers, this article introduces a new methodology consisting of a modelling approach linked to a multidisciplinary simulation environment. The modelling approach is based on the parametric point method, which allows point-scanned data to be transferred to parameterised CAD models. In a case study, the methodology is implemented in an industrial setting.
Journal Article

Power Quality Test Data Analysis for Aircraft Subsystem

2018-12-21
Abstract Aircraft subsystem development involves various combinations of testing and qualification activities to realize a flight-worthy system. The subsystem needs to be verified for a massive number of customer requirements. Power quality (PQ) testing is also an important testing activity carried out as part of the environmental qualification test. It is intended to verify the functionality of subsystems with various kinds of power disturbances and to determine the ability of a subsystem to withstand PQ disturbances. The subsystem being designed should be reliable enough to handle PQ anomalies. A PQ test results in an enormous amount of data for analysis with millions of data samples depending on the test and can be identified as big data. The engineer needs to analyze each set of test data as part of post-processing to ensure the power disturbances during testing are as per the standard requirements and that the functional performance of the subsystem is met.
Journal Article

Delivering Threat Analysis and Risk Assessment Based on ISO 21434: Practical and Tooling Considerations

2020-12-31
Abstract Automotive cybersecurity engineers now have the challenge of delivering Risk Assessments of their products using a method that is described in the new standard for automotive cybersecurity: International Organization for Standardization/Society of Automotive Engineers (ISO/SAE) 21434. The ISO standards are not treated in the same way as regulations that are mandated by governing bodies. However, the new United Nations (UN) Regulation No. 155 “Cyber Security and Cyber Security Management” actually drives a need to apply ISO/SAE 21434. This article investigates the practical aspects of performing such a Threat Analysis and Risk Assessment (TARA) from system modelling and asset identification to attack modelling and the consequences an attack will have.
Journal Article

Assessing the Safety of Environment Perception in Automated Driving Vehicles

2020-04-21
Abstract The development of automated driving systems (ADS) necessitates procedures to validate system safety. The reliability of an ADS’s environment perception provided by lidar, radar, and camera sensors is of special interest in this context, because perception errors can be safety-critical. In this article, we formalize the reliability-based validation of environment perception for safe automated driving and discuss associated challenges. We describe a potential solution to a perception reliability validation by deriving performance requirements at the sensor level. We then summarize statistical methods to learn sensor perception reliabilities in field tests, on proving grounds, and through virtual simulations. With the developed safety validation framework, we show that, potentially, one can validate the safety of an ADS with feasible test effort.
Journal Article

Towards a Blockchain Framework for Autonomous Vehicle System Integrity

2021-05-05
Abstract Traditionally, Electronic Control Units (ECUs) in vehicles have been left unsecured. Ensuring cybersecurity in an ECU network is challenging as there is no centralized authority in the vehicle to provide security as a service. While progress has been made to address cybersecurity vulnerabilities, many of these approaches have focused on enterprise, software-centric systems and require more computational resources than typically available for onboard vehicular devices. Furthermore, vehicle networks have the additional challenge of mitigating security vulnerabilities while satisfying safety and performance constraints. This article introduces a blockchain framework to detect unauthorized modifications to vehicle ECUs. A proof of concept blockchain prototype framework is implemented on a set of microprocessors (comparable to those used by simple ECUs) as a means to assess the efficacy of using our blockchain approach to detect unauthorized updates.
Journal Article

Cyberattacks and Countermeasures for Intelligent and Connected Vehicles

2019-10-14
Abstract ICVs are expected to make the transportation safer, cleaner, and more comfortable in the near future. However, the trend of connectivity has greatly increased the attack surfaces of vehicles, which makes in-vehicle networks more vulnerable to cyberattacks which then causes serious security and safety issues. In this article, we therefore systematically analyzed cyberattacks and corresponding countermeasures for in-vehicle networks of intelligent and connected vehicles (ICVs). Firstly, we analyzed the security risk of ICVs and proposed an in-vehicle network model from a hierarchical point of view. Then, we discussed possible cyberattacks at each layer of proposed network model.
Journal Article

Data Privacy in the Emerging Connected Mobility Services: Architecture, Use Cases, Privacy Risks, and Countermeasures

2019-10-14
Abstract The rapid development of connected and automated vehicle technologies together with cloud-based mobility services is transforming the transportation industry. As a result, huge amounts of consumer data are being collected and utilized to provide personalized mobility services. Using big data poses serious challenges to data privacy. To that end, the risks of privacy leakage are amplified by data aggregations from multiple sources and exchanging data with third-party service providers, in face of the recent advances in data analytics. This article provides a review of the connected vehicle landscape from case studies, system characteristics, and dataflows. It also identifies potential challenges and countermeasures.
Journal Article

Comparison of Genetic Algorithm and Taguchi Optimization Techniques for Surface Roughness of Natural Fiber-Reinforced Polymer Composites

2020-08-11
Abstract Climate change has necessitated the development of “green” alternatives to replace existing materials. This focus has resulted in the push toward fabricating natural fiber-reinforced polymer composites. This research work looks at the surface roughness (SR) of natural fibers like rice husk ash (RHA) and groundnut shell ash (GSA) reinforced in nine different concentrations into an epoxy matrix to form composites. Composite samples are fabricated using various concentrations of natural fibers and measures and optimizes for the SR through the implementation of genetic algorithms (GA). It was found that a minimum SR of 1.422 μm can be obtained for an epoxy/hardener ratio of 3:1 and without the addition of any reinforcements. This optimization was achieved within 102 generations. In addition to GA optimization, another optimization implementation was done through the Taguchi method.
Journal Article

Security Threat Modeling and Automated Analysis for System Design

2021-04-29
Abstract Despite more and more rigorous defense mechanisms in place for cyber-physical systems, cybercriminals are increasingly attacking systems for benefits using a variety of means including malware, phishing, ransomware, and denial of service. Cyberattacks could not only cause significant economic loss but also disastrous consequences for individuals and organizations. Therefore, it is advantageous to detect and fix potential cyber vulnerabilities before the system is fielded. To this end, this article presents a language, VERDICT, and a novel framework, Cyber Vulnerability Analysis Framework (CyVAF) to (i) define cyber threats and mitigation defenses based on system properties, (ii) detect cyber vulnerabilities of system architecture automatically, and also (iii) suggest mitigation defenses. VERDICT is developed as an annex to the Architecture Analysis and Design Language (AADL) but can also be used independently.
X