Refine Your Search

Topic

Search Results

Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

2018-05-16
Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
Journal Article

A Comprehensive Data Reduction Algorithm for Automotive Multiplexing

2019-04-08
Abstract Present-day vehicles come with a variety of new features like the pre-crash warning, the vehicle-to-vehicle communication, semi-autonomous driving systems, telematics, drive by wire. They demand very high bandwidth from in-vehicle networks. Various ECUs present inside the automotive transmits useful information via automotive multiplexing. Transmission of data in real-time achieves optimum functionality. The high bandwidth and high-speed requirement can be achieved either by using multiple buses or by implementing higher bandwidth. But, by doing so, the cost of the network as well as the complexity of the wiring increases. Another option is to implement higher layer protocol which can reduce the amount of data transferred by using data reduction (DR) techniques, thus reducing the bandwidth usage. The implementation cost is minimal as the changes are required in the software only and not in hardware.
Journal Article

A Decentralized Multi-agent Energy Management Strategy Based on a Look-Ahead Reinforcement Learning Approach

2021-11-05
Abstract An energy management strategy (EMS) has an essential role in ameliorating the efficiency and lifetime of the powertrain components in a hybrid fuel cell vehicle (HFCV). The EMS of intelligent HFCVs is equipped with advanced data-driven techniques to efficiently distribute the power flow among the power sources, which have heterogeneous energetic characteristics. Decentralized EMSs provide higher modularity (plug and play) and reliability compared to the centralized data-driven strategies. Modularity is the specification that promotes the discovery of new components in a powertrain system without the need for reconfiguration. Hence, this article puts forward a decentralized reinforcement learning (Dec-RL) framework for designing an EMS in a heavy-duty HFCV. The studied powertrain is composed of two parallel fuel cell systems (FCSs) and a battery pack.
Journal Article

A Methodology for the Reverse Engineering of the Energy Management Strategy of a Plug-In Hybrid Electric Vehicle for Virtual Test Rig Development

2021-09-22
Abstract Nowadays, the need for a more sustainable mobility is fostering powertrain electrification as a way of reducing the carbon footprint of conventional vehicles. On the other side, the presence of multiple energy sources significantly increases the powertrain complexity and requires the development of a suitable Energy Management System (EMS) whose performance can strongly affect the fuel economy potential of the vehicle. In such a framework, this article proposes a novel methodology to reverse engineer the control strategy of a test case P2 Plug-in Hybrid Electric Vehicle (PHEV) through the analysis of experimental data acquired in a wide range of driving conditions. In particular, a combination of data obtained from On-Board Diagnostic system (OBD), Controller Area Network (CAN)-bus protocol, and additional sensors installed on the High Voltage (HV) electric net of the vehicle is used to point out any dependency of the EMS decisions on the powertrain main operating variables.
Journal Article

A Proposal for Applying Belief, Desire, and Intent Agents toward Automotive Vehicle Energy Management

2020-01-27
Abstract The automotive industry is facing a multifaceted problem of supervisory energy management, computational power, and digitalization. In response, this article proposes the use of agents utilizing the belief, desire, and intent (BDI) framework as a means to flexibly create online vehicle management systems (VMSs). Under such proposal, a community of agents form a vehicle configuration. Each agent represents a vehicle subsystem and contains knowledge specific to its respective hardware. With this knowledge and partial observation over its operating environment, each agent uses the BDI framework to deliberate over its actions. An interaction protocol, which implements a distributed constraint satisfaction problem (DCSP) algorithm, is used between the agents to create sensible emergent behavior of the vehicle. This interaction protocol allows independently reasoning components to produce emergent behavior that is flexible, robust, verifiable, and explainable.
Journal Article

A Receding Horizon Autopilot for the Two-Lane Highway Automated Driving Application through Synergy between the Robust Behavior Planner and the Advanced Driver Assistance Features

2022-08-25
Abstract Safety is always a crucial aspect of developing autonomous systems, and the motivation behind this project comes from the need to address the traffic crashes occurring globally on a daily basis. The present work studies the coexistence of the novel rule-based behavioral planning framework with the five key advanced driver assistance system (ADAS) features as proposed in this article to fulfill the safety requirements and enhance the comfort of the driver/passengers to achieve a receding-horizon autopilot. This architecture utilizes data from the sensor fusion and the prediction module for the prediction time horizon of 2 s iteratively, which is continuously moving forward (hence, the receding horizon), and helps the behavior planner understand the intent of other vehicles on the road in advance.
Journal Article

A Systematic Mapping Study on Security Countermeasures of In-Vehicle Communication Systems

2021-11-16
Abstract The innovations of vehicle connectivity have been increasing dramatically to enhance the safety and user experience of driving, while the rising numbers of interfaces to the external world also bring security threats to vehicles. Many security countermeasures have been proposed and discussed to protect the systems and services against attacks. To provide an overview of the current states in this research field, we conducted a systematic mapping study (SMS) on the topic area “security countermeasures of in-vehicle communication systems.” A total of 279 papers are identified based on the defined study identification strategy and criteria. We discussed four research questions (RQs) related to the security countermeasures, validation methods, publication patterns, and research trends and gaps based on the extracted and classified data. Finally, we evaluated the validity threats and the whole mapping process.
Journal Article

Active Safety Control of X-by-Wire Electric Vehicles: A Survey

2022-01-24
Abstract This article presents a survey on active safety control of X-by-wire electric vehicles. The steer-by-wire (SBW) system, brake-by-wire (BBW) system, and electric drive system are three critical techniques for X-by-wire electric vehicles. As to the three systems, the structure comparison and performance analysis of existing products and prototypes are conducted. Then two kinds of X-by-wire chassis configuration, i.e., the centralized type and the distributed type, are introduced. For active safety control, various control models are summarized, including vehicle dynamics model, single-track model, path tracking model, and wheel dynamics model. Based on the proposed model, different active safety control algorithms are introduced involving longitudinal dynamics control, handling stability control, rollover prevention control, path tracking control, and active fault-tolerant control.
Journal Article

Active Safety System for Connected Vehicles

2019-10-14
Abstract The development of connected-vehicle technology, which includes vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, opens the door for unprecedented active safety and driver-enhanced systems. In addition to exchanging basic traffic messages among vehicles for safety applications, a significantly higher level of safety can be achieved when vehicles and designated infrastructure locations share their sensor data. In this article, we propose a new system where cameras installed on multiple vehicles and infrastructure locations share and fuse their visual data and detected objects in real time. The transmission of camera data and/or detected objects (e.g., pedestrians, vehicles, cyclists, etc.) can be accomplished by many communication methods. In particular, such communications can be accomplished using the emerging Dedicated Short-Range Communications (DSRC) technology.
Journal Article

An Analysis of Software Latency for a High-Speed Autonomous Race Car—A Case Study in the Indy Autonomous Challenge

2023-02-07
Abstract Autonomous driving faces the difficulty of securing the lowest possible software execution times to allow a safe and reliable application. One critical variable for autonomous vehicles is the latency from the detection of obstacles to the final actuation response of the vehicle, especially in the case of high-speed driving. A prerequisite for autonomy software is that it enables low execution times to achieve superhuman reaction times. This article presents an in-depth analysis of a full self-driving software stack for autonomous racing. A modular software stack especially developed for high-speed autonomous driving is used and the latency of the software is analyzed in four main autonomy modules: perception, prediction, planning, and control. With the help of a trace point measurement method, it is possible to investigate the end-to-end latency and runtimes of the individual modules.
Journal Article

Anomaly-Based Intrusion Detection Using the Density Estimation of Reception Cycle Periods for In-Vehicle Networks

2018-05-16
Abstract The automotive industry intends to create new services that involve sharing vehicle control information via a wide area network. In modern vehicles, an in-vehicle network shares information between more than 70 electronic control units (ECUs) inside a vehicle while it is driven. However, such a complicated system configuration can result in security vulnerabilities. The possibility of cyber-attacks on vehicles via external services has been demonstrated in many research projects. As advances in vehicle systems (e.g., autonomous drive) progress, the number of vulnerabilities to be exploited by cyber-attacks will also increase. Therefore, future vehicles need security measures to detect unknown cyber-attacks. We propose anomaly-based intrusion detection to detect unknown cyber-attacks for the Control Area Network (CAN) protocol, which is popular as a communication protocol for in-vehicle networks.
Journal Article

CAVTest: A Closed Connected and Automated Vehicles Test Field of Chang’an University in China

2021-11-16
Abstract Closed field testing of Connected and Automated Vehicles (CAV) is an essential pillar for verifying the functionality and performance of CAV and promoting its large-scale deployment. Recently, many closed test fields in the world have been newly built or rebuilt for testing CAV such as M-City in USA and AstaZero in Sweden. However, few construction methods, standards, and specifications of closed test fields for testing CAV were reported with details. We propose the construction practice of the Closed Connected and Automated Vehicles Test Field (CAVTest) of Chang’an University in China. The CAVTest has a multilayer architecture, from down to the top, which consists of an application scenario layer, a perception and a physical communication layer, a network link layer, and a management service layer, respectively.
Journal Article

Cyberattacks and Countermeasures for Intelligent and Connected Vehicles

2019-10-14
Abstract ICVs are expected to make the transportation safer, cleaner, and more comfortable in the near future. However, the trend of connectivity has greatly increased the attack surfaces of vehicles, which makes in-vehicle networks more vulnerable to cyberattacks which then causes serious security and safety issues. In this article, we therefore systematically analyzed cyberattacks and corresponding countermeasures for in-vehicle networks of intelligent and connected vehicles (ICVs). Firstly, we analyzed the security risk of ICVs and proposed an in-vehicle network model from a hierarchical point of view. Then, we discussed possible cyberattacks at each layer of proposed network model.
Journal Article

Data Privacy in the Emerging Connected Mobility Services: Architecture, Use Cases, Privacy Risks, and Countermeasures

2019-10-14
Abstract The rapid development of connected and automated vehicle technologies together with cloud-based mobility services is transforming the transportation industry. As a result, huge amounts of consumer data are being collected and utilized to provide personalized mobility services. Using big data poses serious challenges to data privacy. To that end, the risks of privacy leakage are amplified by data aggregations from multiple sources and exchanging data with third-party service providers, in face of the recent advances in data analytics. This article provides a review of the connected vehicle landscape from case studies, system characteristics, and dataflows. It also identifies potential challenges and countermeasures.
Journal Article

Design and Control Co-optimization of a Mixed Hybrid Electric Powertrain Architecture

2022-08-02
Abstract Electrification of vehicles can improve energy efficiency and reduce emissions in vehicle operations. Studies have focused on designing powertrains of several topologies, including serial, parallel, and power-split hybrid powertrains. In this study, a design and control co-optimization is demonstrated for a novel mixed-powertrain architecture. The component sizes of the mixed powertrain are optimized to minimize the fuel and component costs. Nested optimization is applied with a surrogate integrated operation and control model that evaluates powertrain performance in the inner loop. The surrogate model is trained to capture the powertrain performance under a near-optimal power management approach, namely, the equivalent consumption minimization strategy (ECMS). Using sequential quadratic programming, optimal results are obtained and verified using a high-fidelity powertrain model which is equipped with ECMS control.
Journal Article

Design and Experiment Research on Mass Trim Mechanism of Satellite

2023-03-23
Abstract The mass trim mechanism (MTM) is used to precisely trim the mass characteristics of satellite in orbit and ensure that the satellite can provide high-precision orientation and orbit control and part of the payload can work normally. In order to ensure high-precision trim and light miniaturization, the mass trim scheme of the satellite and the MTM are designed, and the mass block moving range of the mechanism is ±145 mm. The adjusting scheme, system composition, and working principle are introduced particularly, and the screw-guide mechanism is proposed to realize the trim function. The position precision can satisfy the requirement of the design index by the theoretical calculation to get the precision of the trim mechanism. The data before and after the environmental experiments indicate that the displacement error is less than 0.06 mm and the movement parallelism of the mass block is less than 0.04 mm, which meets the requirement for use.
Journal Article

Designing an Uncrewed Aircraft Systems Control Model for an Air-to-Ground Collaborative System

2024-02-19
Abstract In autonomous technology, uncrewed aircraft systems have already become the preferred platform for the research and development of flight control systems. Although they are subjected to following and satisfying complicated scenarios of control stations, this high dependency on a specific control framework limits them in their application process and reduces the flight self-organizing network. In this article, we present a developed multilayer control system protocol with the additional supportive manned aircraft layer (Tender). The novelty of the introduced model is that uncrewed aircraft systems are monitored and navigated by the tender, and then based on the suggested scheme, data flows are controlled and transferred across the network by the developed cloud–robotics approach in the ground station layer.
Journal Article

Developing Fuel Cell Electric Powertrain Architectures for Commercial Vehicles

2022-12-07
Abstract This article addresses the architecture development for a commercial vehicle fuel cell electric powertrain by establishing a clear multi-step formalized workflow that employs a unique technoeconomic solution for architecture selection. The power capability of the fuel cell, the energy capacity and chemistry of the electrical energy storage (battery), the DC-DC converter (including the input current rating and isolation resistance requirements), the traction drive solution, the on-board hydrogen storage solution, and the real-time power-split management of the fuel cell and the battery are all considered and developed in this effort. The methods were used to select architecture for Class 8 urban, regional, and line haul applications. When compared to traditional load-following power-split controllers, an energy management power-split controller can increase system energy efficiency by up to 19.5%.
Journal Article

Development of a Learning Capability in Virtual Operator Models

2019-03-14
Abstract This research developed methods for a virtual operator model (VOM) to learn the optimal control inputs for operation of a virtual excavator. Virtual design, used to model, simulate, and test new features, has often been limited by the fidelity of the virtual model of human operators. Human operator learns, over time, the capability, limits, and control characteristics of new vehicles to develop the best strategy to maximize the efficiency of operation. However, VOMs are developed with fixed strategies and for specific vehicle models (VMs) and require time-consuming re-tuning of the VOM for each new vehicle design. Thus, there typically is no capability to optimize strategies, taking account of variation in vehicle capabilities and limitations. A VOM learning capability was developed to optimize control inputs for the swing-to-pile task of a trenching operation. Different control strategies consisted of varied combinations of speed control, position control, and coast.
Journal Article

Discussion on Charging Control Strategy for Power Battery at Low Temperatures

2017-10-08
Abstract In the case of electric vehicles, due to the charging current limitation of lithium battery at low temperatures (below -20°C), it has been proposed to heat the battery pack up to a suitable temperature range before charging through a liquid-heating plate with PTC. However, at a low state of charge (SOC), there is a question which one could take the place of battery pack to supply power for PTC when heating. So that off-board charger (OFC) has been considered to supply power for PTC in this paper. In order to control the current charging into the battery pack as less as possible at low temperatures, three control schemes of battery management system (BMS) are proposed and compared. Scheme 1: BMS controls the value of charging current request close to the working current of PTC. Scheme 2: BMS controls the value of charging voltage request to reach a state of relative balance. Scheme 3: BMS disconnects the pack from the charger and keeps the connection between PTC and charger.
X