Refine Your Search

Topic

Search Results

Journal Article

uACPC: Client-Initiated Privacy-Preserving Activation Codes for Pseudonym Certificates Model

2020-07-27
Abstract With the adoption of Vehicle-to-everything (V2X) technology, security and privacy of vehicles are paramount. To avoid tracking while preserving vehicle/driver’s privacy, modern vehicular public key infrastructure provision vehicles with multiple short-term pseudonym certificates. However, provisioning a large number of pseudonym certificates can lead to an enormous growth of Certificate Revocation Lists (CRLs) during its revocation process. One possible approach to avoid such CRL growth is by relying on activation code (AC)-based solutions. In such solutions, the vehicles are provisioned with batches of encrypted certificates, which are decrypted periodically via the ACs (broadcasted by the back-end system). When the system detects a revoked vehicle, it simply does not broadcast the respective vehicle’s AC. As a result, revoked vehicles do not receive their respective AC and are prevented from decrypting their certificates.
Journal Article

Wireless Security in Vehicular Ad Hoc Networks: A Survey

2022-08-17
Abstract Vehicular communications face unique security issues in wireless communications. While new vehicles are equipped with a large set of communication technologies, product life cycles are long and software updates are not widespread. The result is a host of outdated and unpatched technologies being used on the street. This has especially severe security impacts because autonomous vehicles are pushing into the market, which will rely, at least partly, on the integrity of the provided information. We provide an overview of the currently deployed communication systems and their security weaknesses and features to collect and compare widely used security mechanisms. In this survey, we focus on technologies that work in an ad hoc manner. This includes Long-Term Evolution mode 4 (LTE-PC5), Wireless Access in Vehicular Environments (WAVE), Intelligent Transportation Systems at 5 Gigahertz (ITS-G5), and Bluetooth.
Journal Article

Water Body Survey, Inspection, and Monitoring Using Amphibious Hybrid Unmanned Aerial Vehicle

2021-02-04
Abstract Water quality monitoring is needed for the effective management of water resources. Periodic sampling and regular inspection/analysis allow one to classify water and identify changes or trends in water quality over time. This article presents a novel concept of an Amphibious Hybrid Unmanned Aerial Vehicle (AHUAV) that can operate in air and water for rapid water sampling, real-time water quality analysis, and water body management. A methodology using the developed AHUAV system for water body management has also been proposed for an easier and effective way of monitoring water bodies using advanced drone technologies. Using drones for water body management can be a cost-effective and efficient way of carrying out regular inspections and continual monitoring.
Journal Article

Vulnerability of FlexRay and Countermeasures

2019-05-23
Abstract The importance of in-vehicle network security has increased with an increase in automated and connected vehicles. Hence, many attacks and countermeasures have been proposed to secure the controller area network (CAN), which is an existent in-vehicle network protocol. At the same time, new protocols-such as FlexRay and Ethernet-which are faster and more reliable than CAN have also been proposed. European OEMs have adopted FlexRay as a control network that can perform the fundamental functions of a vehicle. However, there are few studies regarding FlexRay security. In particular, studies on attacks against FlexRay are limited to theoretical studies or simulation-based experiments. Hence, the vulnerability of FlexRay is unclear. Understanding this vulnerability is necessary for the application of countermeasures and improving the security of future vehicles. In this article, we highlight the vulnerability of FlexRay found in the experiments conducted on a real FlexRay network.
Journal Article

Using a Dual-Layer Specification to Offer Selective Interoperability for Uptane

2020-08-24
Abstract This work introduces the concept of a dual-layer specification structure for standards that separate interoperability functions, such as backward compatibility, localization, and deployment, from those essential to reliability, security, and functionality. The latter group of features, which constitute the actual standard, make up the baseline layer for instructions, while all the elements required for interoperability are specified in a second layer, known as a Protocols, Operations, Usage, and Formats (POUF) document. We applied this technique in the development of a standard for Uptane [1], a security framework for over-the-air (OTA) software updates used in many automobiles. This standard is a good candidate for a dual-layer specification because it requires communication between entities, but does not require a specific format for this communication.
Journal Article

Use of Artificial Neural Network to Develop Surrogates for Hydrotreated Vegetable Oil with Experimental Validation in Ignition Quality Tester

2024-02-01
Abstract This article presents surrogate mixtures that simulate the physical and chemical properties in the auto-ignition of hydrotreated vegetable oil (HVO). Experimental investigation was conducted in the Ignition Quality Tester (IQT) to validate the auto-ignition properties with respect to those of the target fuel. The surrogate development approach is assisted by artificial neural network (ANN) embedded in MATLAB optimization function. Aspen HYSYS is used to calculate the key physical and chemical properties of hundreds of mixtures of representative components, mainly alkanes—the dominant components of HVO, to train the learning algorithm. Binary and ternary mixtures are developed and validated in the IQT. The target properties include the derived cetane number (DCN), density, viscosity, surface tension, molecular weight, and volatility represented by the distillation curve. The developed surrogates match the target fuel in terms of ignition delay and DCN within 6% error range.
Journal Article

Uncertainty Estimation for Neural Time Series with an Application to Sideslip Angle Estimation

2021-08-19
Abstract The automotive industry offers many applications for machine learning (ML), in general, and deep neural networks in particular. However, the real-world deployment of neural networks into safety-critical components remains a challenge as models would need to offer robustness under a wide range of operating conditions. In this work, we focus on uncertainty estimation, which can be used to deliver predictors that fail gracefully, by detecting situations where their predictions are unreliable. Following Gräber et al. [1], we use Recurrent Neural Networks (RNNs) to perform sideslip angle estimation. To perform robust uncertainty estimation, we augment the RNNs with generative models. We demonstrate the advantage of the proposed model architecture over Monte Carlo (MC) dropout [2] on the Revs data set [3].
Journal Article

Transient Operation and Over-Dilution Mitigation for Low-Pressure EGR Systems in Spark-Ignition Engines

2018-09-17
Abstract Low-Pressure cooled Exhaust Gas Recirculation (LP-cEGR) is proven to be an effective technology for fuel efficiency improvement in turbocharged spark-ignition (SI) engines. Aiming to fully exploit the EGR benefits, new challenges are introduced that require more complex and robust control systems and strategies. One of the most important restrictions of LP-cEGR is the transient response, since long air-EGR flow paths introduce significant transport delays between the EGR valve and the cylinders. High dilution generally increases efficiency, but can lead to cycle-by-cycle combustion variation. Especially in SI engines, higher-than-requested EGR dilution may lead to combustion instabilities and misfires. Considering the long EGR evacuation period, one of the most challenging transient events is throttle tip-out, where the engine operation shifts from a high-load point with high dilution tolerance to a low-load point where EGR tolerance is significantly reduced.
Journal Article

Towards a Blockchain Framework for Autonomous Vehicle System Integrity

2021-05-05
Abstract Traditionally, Electronic Control Units (ECUs) in vehicles have been left unsecured. Ensuring cybersecurity in an ECU network is challenging as there is no centralized authority in the vehicle to provide security as a service. While progress has been made to address cybersecurity vulnerabilities, many of these approaches have focused on enterprise, software-centric systems and require more computational resources than typically available for onboard vehicular devices. Furthermore, vehicle networks have the additional challenge of mitigating security vulnerabilities while satisfying safety and performance constraints. This article introduces a blockchain framework to detect unauthorized modifications to vehicle ECUs. A proof of concept blockchain prototype framework is implemented on a set of microprocessors (comparable to those used by simple ECUs) as a means to assess the efficacy of using our blockchain approach to detect unauthorized updates.
Journal Article

Toward Unsupervised Test Scenario Extraction for Automated Driving Systems from Urban Naturalistic Road Traffic Data

2023-02-02
Abstract Scenario-based testing is a promising approach to solving the challenge of proving the safe behavior of vehicles equipped with automated driving systems (ADS). Since an infinite number of concrete scenarios can theoretically occur in real-world road traffic, the extraction of scenarios relevant in terms of the safety-related behavior of these systems is a key aspect for their successful verification and validation. Therefore, a method for extracting multimodal urban traffic scenarios from naturalistic road traffic data in an unsupervised manner, minimizing the amount of (potentially biased) prior expert knowledge, is proposed. Rather than an (elaborate) rule-based assignment by extracting concrete scenarios into predefined functional scenarios, the presented method deploys an unsupervised machine learning pipeline. The approach allows for exploring the unknown nature of the data and their interpretation as test scenarios that experts could not have anticipated.
Journal Article

Toward Privacy-Aware Traceability for Automotive Supply Chains

2021-07-14
Abstract The lack of traceability in today’s supply-chain system for auto components makes counterfeiting a significant problem leading to millions of dollars of lost revenue every year and putting the lives of customers at risk. Traditional solutions are usually built upon hardware such as radio-frequency identification (RFID) tags and barcodes, and these solutions cannot stop attacks from supply-chain (insider) parties themselves as they can simply duplicate products in their local database. This industry-academia collaborative work studies the benefits and challenges associated with the use of distributed ledger (or blockchain) technology toward preventing counterfeiting in the presence of malicious supply-chain parties. We illustrate that the provision of a distributed and append-only ledger jointly governed by supply-chain parties themselves makes permissioned blockchains such as Hyperledger Fabric a promising approach toward mitigating counterfeiting.
Journal Article

Tooth Time-Based Engine Misfire Detection Index for Multicylinder Engines of Vehicles Not Affected by Various Deviations between Cylinders

2021-09-28
Abstract This article proposes a new misfire detection index, the ΔGap slope, for a four-cylinder engine. However, the proposed index is not limited to four-cylinder engines. The ΔGap slope uses the tooth time measured using the existing crankshaft position sensor; therefore, an additional sensor is not required, which makes it economical. The ΔGap slope is defined as the difference between the gap slopes of the same cylinder for two adjacent cycles. Various factors that cause deviations in gap slopes between cylinders can be eliminated in the process of determining the difference between two gap slopes. Hence, in contrast with the existing engine roughness method, the ΔGap slope has the advantage of not requiring compensation for deviations between the cylinders. The conventional gap slope method must use different sets of thresholds for each cylinder located at the same position on the sensor wheel, which results in multiple thresholds being applied.
Journal Article

Threat Identification and Defense Control Selection for Embedded Systems

2020-08-18
Abstract Threat identification and security analysis have become mandatory steps in the engineering design process of high-assurance systems, where successful cyberattacks can lead to hazardous property damage or loss of lives. This article describes a novel approach to perform security analysis on embedded systems modeled at the architectural level. The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. This article also provides an illustrative example based on a drone package delivery system modeled in AADL.
Journal Article

Thermal Management Optimization of Prismatic Lithium-Ion Battery Using Phase Change Material

2022-04-21
Abstract High technology expertise and strong advancement in electric vehicles and Lithium (Li)-ion battery devices and systems have increased the speed of development and application of new equipment. It is reported that Li-ion battery life reduces almost by 60 days per degree temperature rise in an operational temperature of 30°C to 40°C, which makes cooling a high priority. The current study focuses on cooling the battery system using Phase Change Material (PCM) placed as bands of different dimensions around the prismatic battery. Eight novel designs of varying dimensions were constructed for three-volume scenarios. The heat generations considered in this study are 6,855 W/m3, 12,978 W/m3, 19,100 W/m3, and 63,970 W/m3. The data obtained was trained using an artificial neural network (ANN), and an equation was attained to fit the data. The optimum placement of PCM with respect to the number of bands and dimensions was achieved through a Genetic Algorithm.
Journal Article

The Placement of Digitized Objects in a Point Cloud as a Photogrammetric Technique

2018-08-08
Abstract The frequency of video-capturing collision events from surveillance systems are increasing in reconstruction analyses. The video that has been provided to the investigator may not always include a clear perspective of the relevant area of interest. For example, surveillance video of an incident may have captured a pre- or post-incident perspective that, while failing to capture the precise moment when the pedestrian was struck by a vehicle, still contains valuable information that can be used to assist in reconstructing the incident. When surveillance video is received, a quick and efficient technique to place the subject object or objects into a three-dimensional environment with a known rate of error would add value to the investigation.
Journal Article

The Missing Link: Aircraft Cybersecurity at the Operational Level

2020-07-25
Abstract Aircraft cybersecurity efforts have tended to focus at the strategic or tactical levels without a clear connection between the two. There are many excellent engineering tools already in widespread use, but many organizations have not yet integrated and linked them into an overarching “campaign plan” that connects those tactical actions such as process hazard analysis, threat modeling, and probabilistic methods to the desired strategic outcome of secure and resilient systems. This article presents the combined systems security engineering process (CSSEP) as a way to fill that gap. Systems theory provides the theoretical foundation on which CSSEP is built. CSSEP is structured as a control loop in which the engineering team is the controller of the design process. The engineering team needs to have an explicit process model on how systems should be secured, and a control algorithm that determines what control actions should be selected.
Journal Article

Supervised Learning Classification Applications in Fault Detection and Diagnosis: An Overview of Implementations in Unmanned Aerial Systems

2022-08-18
Abstract Statistical machine learning classification methods have been widely used in the fault detection analysis in several engineering domains. This motivates us to provide in this article an overview on the application of these methods in the fault diagnosis strategies and also their successful use in unmanned aerial vehicles (UAVs) systems. Different existing aspects including the implementation conditions, offline design, and online computation algorithms as well as computation complexity and detection time are discussed in detail. Evaluation and validation of these aspects have been ensured by a simple demonstration of the basic classification methods and neural network techniques in solving the fault detection and diagnosis problem of the propulsion system failure of a multirotor UAV. A testing platform of an Hexarotor UAV is completely realized.
Journal Article

Study on the Influence of Mass Flow Rate over a National Advisory Committee for Aeronautics 6321 Airfoil Using Improved Blowing and Suction System for Effective Boundary Layer Control

2021-08-06
Abstract The numerical analysis of the three-dimensional (3D) flow over a National Advisory Committee for Aeronautics (NACA) 6321 airfoil to evaluate the mass flow rate by using a novel method Improved Blowing and Suction System (IBSS) to control the boundary layer is presented in this study. Analysis is performed based on 3D Reynolds-Averaged Navier-Stokes (RANS) equation with a K-omega SST solver. The aerodynamic performance of the NACA 6321 is analyzed at a Mach number of 0.10 with three different mass flow rates, namely, 0.08 kg/s, 0.10 kg/s, and 0.12 kg/s. From the study, it is seen that when the mass flow rate decreased, the aerodynamics performance also reduced, and the aerodynamic performance improved with the increase in mass flow rate.
Journal Article

Study on Online Identification Method of Injection Time Characteristics for the High Pressure Diesel-Natural Gas Co-direct Injection Engine

2022-10-31
Abstract The complex hydropneumatic electromagnetic coupling structure of the dual-fuel injector leads to its complicated injection process. The unknown problem of fuel injection characteristics limits the injector design and optimization process of combustion efficiency. Therefore, the scientific study of dual-fuel injection mechanism and online identification method is the key to grasping the diesel-gas coupled injection mechanism, and an important theoretical basis for advanced closed-loop control. In this study, an identification method for the time characteristics of the dual-fuel injector injection process is based on the injector inlet pressure, which can be applied to the diesel-natural gas co-direct injection engine. First, the cause and transfer process of diesel injection pressure waves were analyzed based on the Riemann invariant theory.
Journal Article

Study of Advanced Control Based on the RBF Neural Network Theory in Diesel Engine Speed Control

2019-10-14
Abstract Based on radial basis function (RBF) neural network (NN) theory, RBF-Proportional Integral Derivative (PID) diesel engine speed control is proposed. The algorithm has strong self-learning ability and strong adaptive ability, and is able to optimize the control parameters of the speed loop controller in real time. A series of simulations are carried out with different initial weights. Simulation results reveal that initial weights have little effect on RBF-PID control performance. A STM32 MCU-based controller is developed according to the calculation requirement. Experiments are carried out on a D6114 diesel engine generator to verify the proposed speed control algorithm. The simulation results are in good agreement with the experimental results. The results show that the influence of initial weights on RBF-PID control algorithm is smaller than that on BP-PID control algorithm. When RBF-PID control algorithm is adopted, the steady speed fluctuation rate is 0.4%.
X