Refine Your Search

Search Results

Viewing 1 to 2 of 2
Technical Paper

Intelligent Auxiliary Battery Control - A Connected Approach

2021-09-21
2021-01-1248
As vehicles are getting electrified and more intelligent, the energy consumption of the auxiliary system increases rapidly. The auxiliary battery acts as the backbone of the system to support the proper operation of the vehicle. It is important to ensure the auxiliary battery has enough energy to meet the basic loads regardless the vehicle is in park or running. However, the existing methods only focus on auxiliary energy management when the vehicle is in a dynamic event. To fulfill the gap, we propose an intelligent strategy that detects the low state of charge (SOC) condition, temporarily turns down the auxiliary loads based on their priorities and charges the auxiliary battery at the maximum efficiency of the auxiliary power unit. In addition, the proposed strategy allows the vehicle to get the park duration update and make intelligent decisions on charging the auxiliary battery.
Technical Paper

Onboard Cybersecurity Diagnostic System for Connected Vehicles

2021-09-21
2021-01-1249
Today’s advanced vehicles have high degree of interaction due to numerous sensors, actuators and also with complex communication within the control units. In order to hack a vehicle, it has to be within a certain range of communication. Here, we discuss the On-Board Diagnostic (OBD) regulations for next generation BEV/HEV, its vulnerabilities and cybersecurity threats that come with hacking. We propose three cybersecurity attack detection and defense methods: Cyber-Attack detection algorithm, Time-Based CAN Intrusion Detection Method and, Feistel Cipher Block Method. These control methods autonomously diagnose a cybersecurity problem in a vehicle’s onboard system using an OBD interface, such as OBD-II when a fault caused by a cyberattack is detected, All of this is achieved in an internal communication network structure. The results discussed here focus on the first detection method that is Cyber-Attack detection algorithm.
X