Browse Topic: Vehicle networking

Items (684)
The increased connectivity of vehicles expands the attack surface of in-vehicle networks, enabling attackers to infiltrate through external interfaces and inject malicious traffic. These malicious flows often contain anomalous semantic information, potentially leading to misleading control instructions or erroneous decisions. While most semantic-based anomaly detection methods for in-vehicle networks focus on extracting semantic context, they often overlook interactions and associations between multiple semantics, resulting in a high false positive rate (FPR). To address these challenges, the Adaptive Structure Graph Attention Network Model (AS-GAT) is proposed for in-vehicle network anomaly detection. Our approach combines a semantic extractor with a continuously updated graph structure learning method based on attention weight similarity constraints. The semantic extractor identifies semantic features within messages, while the graph structure learning module adaptively updates the
Luo, FengLuo, ChengWang, JiajiaLi, Zhihao
Modern vehicles are increasingly integrating electronic control units (ECUs), enhancing their intelligence but also amplifying potential security threats. Vehicle network security testing is crucial for ensuring the safety of passengers and vehicles. ECUs communicate via the in-vehicle network, adhering to the Controller Area Network (CAN) bus protocol. Due to its exposed interfaces, lack of data encryption, and absence of identity authentication, the CAN network is susceptible to exploitation by attackers. Fuzz testing is a critical technique for uncovering vulnerabilities in CAN network. However, existing fuzz testing methods primarily generate message randomly, lacking learning from the data, which results in numerous ineffective test cases, affecting the efficiency of fuzz testing. To improve the effectiveness and specificity of testing, understanding of the CAN message format is essential. However, the communication matrix of CAN messages is proprietary to the Original Equipment
Shen, LinXiu, JiapengZhang, ZhuopengYang, Zhengqiu
Original equipment manufacturers, Tier 1 suppliers, and the rest of the value chain, including the semiconductor industry, are reshaping their product portfolios, development processes, and business models to support this transformation to software-defined vehicles (SDVs). The focus on software is rippling out through the automotive sector, forcing the industry to rethink organization, leadership, processes, and future roadmaps. The Software-defined Vehicle: Its Current Trajectory and Execution Challenges assesses the state of SDVs and explores the potential hurdles to execution and examines the work being done in the industry. The goal is to evaluate whether the implementation of SDVs will encounter the same fate as electrification or autonomous technologies, which after some level of disillusionment, are expected to pick up momentum in a more mature way. Click here to access the full SAE EDGETM Research Report portfolio.
Goswami, Partha
Based on advanced Automotive functionality, Vehicle networks has enabled the exchange of data to multiple domains and to meet these demands, more complex software applications, some of which require service-based cloud are developed. Exposure of data creates multiple threats for attacker to tamper security and privacy. Automotive cybersecurity topic has gained momentum based on multiple gaps identified in Automotive In vehicle and around the vehicle networks. In this paper, we provide an extensive overview on V2C (Vehicle to Cloud) and In-vehicle data protection, we also highlight methods to identify threats on any vehicle network connected to V2C and identify methods to verify security functionality using Fuzz or Penetration test protocol, we have identified gaps in existing security solutions and outline possible open issues and probable solution.
Panda, JyotiprakashJain, Rushabh Deepakchand
With the development of automotive intelligence and networking, the communication architecture of automotive network is evolving toward Ethernet. To improve the real-time performance and reliability of data transmission in traditional Ethernet, time-sensitive network (TSN) has become the development direction of next-generation of automotive networks. The real-time advantage of TSN is based on accurate time synchronization. Therefore, a reliable time synchronization mechanism has become one of the key technologies for the application of automotive Ethernet technology. The protocol used to achieve accurate time synchronization in TSN is IEEE 802.1AS. This protocol defines a time synchronization mechanism suitable for automotive Ethernet. Through the master clock selection algorithm, peer link delay measurement, and clock synchronization and calibration mechanism, the time of each node in the vehicle network is synchronized to a reference master clock. In addition, the protocol clearly
Guo, YiLuo, FengWang, ZitongGan, HaotianWu, MingzhiLiu, Hongqian
The controller area network (CAN) bus, the prevailing standard for in-vehicle networking (IVN), has been used for more than four decades, despite its simple architecture, to establish communications between electronic control units (ECUs). Weight, maintenance overheads, improved flexibility, and wiring complexity escalate as the quantity of ECUs rises, especially for high-demand autonomous vehicles (AVs). The primary objective of this study is to examine and discuss the significant challenges that arise during the migration from a wired CAN to a wireless CAN (WCAN). Suggested remedies include changing the configuration of the conventional ECU, creating a hidden wireless communication domain for each AV, and developing a plan to counteract the jamming signals. The simulation of the proposed WCAN was done using MATLAB and validated using OPNET analysis. The results showed that the packet loss of the eavesdropping electronic control unit ranged from 63% to 100%. Anti-jamming results show
Ali, ZeinaIbrahim , Qutaiba
Axiomatic AX141155, compact CAN-Bluetooth® Low Energy Converter, is IP67-rated, CE, FCC, and vibration compliant for off-highway. Operate in SAE J1939 interface or CAN (protocol independent) Bridge modes. Power from 12V, 24V or 48Vdc and temperature range from 30 to +85°C. Configure via the Axiomatic CAN2BT app on compatible Apple iOS or Android devices. axiomatic.com
Connected and autonomous vehicles (CAVs) and their productization are a major focus of the automotive and mobility industries as a whole. However, despite significant investments in this technology, CAVs are still at risk of collisions, particularly in unforeseen circumstances or “edge cases.” It is also critical to ensure that redundant environmental data are available to provide additional information for the autonomous driving software stack in case of emergencies. Additionally, vehicle-to-everything (V2X) technologies can be included in discussions on safer autonomous driving design. Recently, there has been a slight increase in interest in the use of responder-to-vehicle (R2V) technology for emergency vehicles, such as ambulances, fire trucks, and police cars. R2V technology allows for the exchange of information between different types of responder vehicles, including CAVs. It can be used in collision avoidance or emergency situations involving CAV responder vehicles. The
Abdul Hamid, Umar ZakirRoth, ChristianNickerson, JeffreyLyytinen, KalleKing, John Leslie
A new industry-first open platform for developing the software-defined vehicle (SDV) combines processing, vehicle networking and system power management with integrated software. NXP Semiconductors' new S32 CoreRide Platform was designed to run “multiple time-critical, safety-critical, security-critical applications in parallel,” Henri Ardevol, executive vice president and general manager of Automotive Embedded Systems for NXP Semiconductors, told SAE Media. NXP's new foundation platform for SDVs differs from the traditional approach of using multiple electronic control units (ECUs), each designed to handle specific vehicle system control tasks. Since each unit requires its own integration work, the integration workload exponentially increases with each additional ECU on a vehicle.
Buchholz, Kami
Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to secure intra-vehicle networks. Zero Trust (ZT) originated as an Information Technology (IT) principle of “never trust, always verify”; it is the concept that a network must never assume assets can be trusted regardless of their ownership or network location. This research focused on drastically improving security of the cyber-physical vehicle network, with minimal performance impact measured as timing, bandwidth, and processing power. The automotive ZTA was tested using a software-in-the-loop vehicle simulation paired with resource constrained hardware that closely emulated a production vehicle network. For example, the vehicle’s Advanced Gateway electronic control unit (ECU) is utilized to enforce cyber policy
Shipman, Maggie E.Millwater, NathanOwens, KyleSmith, Seth
The NMFTA’s Vehicle Cybersecurity Requirements Woking Group (VCRWG), comprised of fleets, OEMs and cybersecurity experts, has worked the past few years to produce security requirements for Vehicle Network Gateways. Vehicle Network Gateways play an important role in vehicle cybersecurity – they are the component responsible for assuring vehicle network operations in the presence of untrustworthy devices on the aftermarket or diagnostics connectors. This paper offers security requirements for these gateways in design, implementation and operation. The requirements are specified at levels of abstraction applicable to all vehicle networks down to CAN networks specifically. These requirements were captured using the https://github.com/strictdoc-project/strictdoc requirements management tool and will be made available also as a ReqIF format along with the paper at https://github.com/nmfta-repo/vcr-experiment.
Gardiner, BenMaag, JohnTindell, Ken
The automotive industry is currently undergoing a significant transformation characterized by technological and commercial trends involving autonomous driving, connectivity, electrification, and shared service. Vehicles are becoming an integral part of a much broader ecosystem. In light of various new developments, the Software-Defined Vehicle (SDV) concept is gaining substantial attention and momentum. SDV emphasizes the central role of software in realizing and enhancing vehicle functions, enriching features, improving performance, adapting to surrounding environment and external conditions, customizing user experience, addressing changing customer needs, and enabling vehicles to dynamically evolve over their entire life cycle. The advancements in vehicle Electrical/Electronic (E/E) architecture and various key technologies serve as the technical foundation for the emergence of SDV. This paper gives a definition of the SDV concept, provides views from different aspects, discusses the
Jiang, Shugang
Inverter is the power electronics component that drives the electrical motor of the electrical driven compressor (EDC) and communicates with the car network. The main function of the inverter is to convert the direct current (DC) voltage of the car battery into alternating current (AC) voltage, which is used to drive the three-phase electric motor. In recent days, inverters are present in all automotive products due to electrification. Inverter contains a printed circuit board (PCB) and electronic components, which are mounted inside a mechanical housing and enclosed by a protective cover. The performance of the electrical drive depends upon the functioning of the inverter. There is a strong demand from the customer to withstand the harsh environmental and testing conditions during its lifetime such as leakage, dust, vibration, thermal tests etc. The failure of the inverter leads to malfunction of the product, hence proper sealing and validation is necessary for inverters to protect
Duraipandi, Arumuga PandianLeon, RenanRibot, HerveRaja, Antony VinothFarooqui, AltafhussainChandrasekaran, Vinoth-Roy
Connectivity in ground vehicles allows vehicles to share crucial vehicle data, such as vehicle acceleration and speed, with each other. Using sensors such as radars and lidars, on the other hand, the intravehicular distance between a leader vehicle and a host vehicle can be detected. Cooperative Adaptive Cruise Control (CACC) builds upon ground vehicle connectivity and sensor information to form convoys with automated car following. CACC can also be used to improve fuel economy and mobility performance of vehicles in the said convoy. In this paper, a CACC system is presented, where the acceleration of the lead vehicle is used in the calculation of desired vehicle speed. In addition to the smooth car following abilities, the proposed CACC also has the capability to calculate a speed profile for the ego vehicle that is fuel efficient, making it an Ecological CACC (Eco-CACC) model. Simulations were run to model and test the Eco-CACC algorithms with different lead vehicle driving behaviors
Kavas-Torris, OzgenurGuvenc, Levent
This SAE Recommended Practice defines a method for implementing a bidirectional, serial communications link over the vehicle power supply line among modules containing microcomputers. This document defines those parameters of the serial link that relate primarily to hardware and software compatibility such as interface requirements, system protocol, and message format that pertain to Power Line Communications (PLC) between Tractors and Trailers. This document defines a method of activating the trailer ABS Indicator Lamp that is located in the tractor.
Truck and Bus Control and Communications Network Committee
With the increased demand for electricity due to the rapid expansion of EV charging infrastructure, weather events, and a shift towards smaller, more environmentally responsible forms of renewable sources of energy, Microgrids are increasing in growth and popularity. The integration of real time communication between all PGSs (Power Generating Sources) and loadbanks has allowed the re-utilization of waste electricity. Pop-up Microgrids in PSPS events have become more popular and feasible in providing small to medium size transmission and distribution. Due to the differing characteristics of the PGSs, it is a challenge to efficiently engage the combined PGSs in harmony and have them share and carry the load of the microgrid with minimal ‘infighting.’ Different Power generating sources each have their own personality and unique ‘quirks.’ With loadbanks being able to perform various functions automatically by monitoring and responding to individual PGSs needs and demands, efficiency is
Tyne, Shelby
The purpose of this SAE Aerospace Information Report (AIR) is to provide guidance for aircraft engine and propeller systems (hereafter referred to as propulsion systems) certification for cybersecurity. Compliance for cybersecurity requires that the engine control, propeller control, monitoring system, and all auxiliary equipment systems and networks associated with the propulsion system (such as nacelle systems, overspeed governors, and thrust reversers) be protected from intentional unauthorized electronic interactions (IUEI) that may result in an adverse effect on the safety of the propulsion system or the airplane. This involves identification of security risks, their mitigation, verification of protections, and their maintenance in service. This document is intended to serve as suitable guidance for propulsion system manufacturers and applicants for propulsion system type certification. It is also intended to provide guidance for subsequent propulsion system integration into
E-36 Electronic Engine Controls Committee
Elektrobit CEO discusses the landscape of automotive software development and explains why a lot of software doesn't have to be all that transformational. The phrase “software-defined vehicle” has embedded in the vehicle-development lexicon as the catchall for a new era of digitally driven products. But there is persistent disagreement about even the phrase's definition, much less the engineering scope required to transition from the industry's hardware-intensive history to a software-driven environment.
In an embedded world gone SOSA sensational, one might believe that centralized ATR-style OpenVPX systems are the best way to architect your next rugged system. While these chassis are routinely and successfully deployed on airborne, shipboard, and vetronics platforms, they are big, heavy, costly, and a real challenge to cool and connect. An alternate but equivalent rugged, deployable approach uses one or more small form factor chassis modules, distributed into any available space in the vehicle, interconnected via Apple® and Intel's® 40Gbps Thunderbolt™ 4, a commercial open standard that uses USB Type-C connectors with a single, thin bi-directional copper or fiber cable. With 4, 8, even 16 3U or 6U LRU (line replacement unit) boards inside an ATR chassis, 600 watts is on the low end of systems that can push well over 2,000 watts in a 200 square inch footprint or less. Assuming one can find the space for such a chassis in the vehicle or platform, there's also the issue of cooling it
ABSTRACT Automotive electrical/electronic (E/E) architectures are continuously evolving to meet the technological challenges of the highly connected, software-defined vehicle. Advances are being made in µController/µProcessor compute hardware, software, and cyber security methodologies, to provide enhanced security, safety, flexibility and functionality. These advancements will mature through millions of miles of road/lab testing and reach TRLs suitable for use by the Army to implement safe and secure cyber-resilient platforms for manned and unmanned ground vehicle systems. This paper will describe three specific advances that will benefit Army vehicle programs of the future: Software that leverages the Modular Open Systems Approach (MOSA) as a secure and flexible Service Oriented Architecture (SOA) framework; Hardware-based Communication Engines for high bandwidth/low latency network communications; and a Hardware Security Module (HSM) that enhances the cyber-resilience of the next
Cates, JameyNielson, KarlStempnik, Joe
SAE J2461 specifies the recommended practices of a Vehicle Electronics Programming Stations (VEPS) architecture.in a Win32® environment. This system specification, SAE J2461, was a revision of the requirements for Vehicle Electronics Programming Stations (VEPS) set forth in SAE J2214, Vehicle Electronics Programming Stations (VEPS) System Specification for Programming Components at OEM Assembly Plants (Cancelled Jun 2004). The J2214 standard has been cancelled indicating that it is no longer needed or relevant.
Truck and Bus Control and Communications Network Committee
This standard covers ultra-thin wall low voltage primary cable intended for use at a nominal system voltage of 60 VDC (60 VAC rms) or less in surface vehicle electrical systems. The tests are intended to qualify cables for normal applications with limited exposure to fluids and physical abuse. This standard covers SAE conductor sizes which usually differ from ISO conductor sizes.
Cable Standards Committee
Recently, there has been a slight increase in interest in the use of responder-to-vehicle (R2V) technology for emergency vehicles, such as ambulances, fire trucks, and police cars. R2V technology allows for the exchange of information between different types of responder vehicles, including connected and automated vehicles (CAVs). It can be used in collision avoidance or emergency situations involving CAV responder vehicles. The benefits of R2V are not limited to fully autonomous vehicles (e.g., SAE Level 4), but can also be used in Level 2 CAV scenarios. However, despite the potential benefits of R2V, discussions on this topic are still limited. Responder-to-Vehicle Technologies for Connected and Autonomous Vehicles aims to provide an overview of R2V technology and its applications for CAV systems, particularly in the context of collision avoidance features. The responder vehicles in question can be autonomous or non-autonomous. It is hoped that it will provide valuable information
Abdul Hamid, Umar Zakir
Android Automotive OS (AAOS) has been gaining popularity in recent years, with several OEMs across the world already deploying it or planning to in the near future. Besides the benefit of a well-known, customizable and secure operating system for OEMs, AAOS allows third-party app developers to offer their apps on vehicles of several manufacturers at the same time. Currently, there are 55 apps for AAOS that can be categorized as media, navigation or point-of-interest apps. Specifically the latter two categories allow the third-parties to collect certain sensor data directly from the vehicle. Furthermore, the latest version of AAOS also allows the OEM to configure and collect In-Vehicle Infotainment (IVI) and vehicle data (called OEM telemetry). However, increasing connectivity and integration with the in-vehicle network comes at the expense of user privacy. Previous works have shown that vehicular sensor data often contains personally identifiable information (PII). New privacy
Pese, Mert D.
People are exposed to disproportionately high concentrations of air pollutants daily on and near the road during their ride, walk, and residency. Currently air quality monitoring is performed mostly at background locations far away from the road and distinctive point, line, and area emission sources, failing to report concentrations on the road. This study presents an innovative air quality monitoring method using a network of vehicles equipped with air quality sensors (AQSs). Vehicles are connected to internet through either cell link or apps used by drivers. A cloud server collects the data and updates air quality concentration maps every 10 minutes. The study presents very high temporal and spatial resolution maps at a fraction of the cost of previous studies. These high spatiotemporal resolution air quality maps can be used to reduce public exposure in many ways including but not limited to cabin air flap door control, eco-driving route for navigation, and daily exposure monitoring
Jung, HeejungBorrel, HerveTaddonio, Paolo
The new generation vehicles these days are managed by networked controllers. A large portion of the networks is planned with more security which has recently roused researchers to exhibit various attacks against the system. This paper talks about the liabilities of the Controller Area Network (CAN) inside In-vehicle communication protocol and a few potentials that could take due advantage of it. Moreover, this paper presents a few security measures proposed in the present examination status to defeat the attacks. In any case, the fundamental objective of this paper is to feature a comprehensive methodology known as Intrusion Detection System (IDS), which has been a significant device in getting network data in systems over many years. To the best of our insight, there is no recorded writing on a through outline of IDS execution explicitly in the CAN transport network system. Therefore, we proposed a top-down examination of IDS through a write-up based on the following perspectives
Appajosyula, Kalyan Sai Vital VamsiPacharla, Sreedhar Reddy
The lack of inherent security controls makes traditional Controller Area Network (CAN) buses vulnerable to Machine-In-The-Middle (MitM) cybersecurity attacks. Conventional vehicular MitM attacks involve tampering with the hardware to directly manipulate CAN bus traffic. We show, however, that MitM attacks can be realized without direct tampering of any CAN hardware. Our demonstration leverages how diagnostic applications based on RP1210 are vulnerable to Machine-In-The-Middle attacks. Test results show SAE J1939 communications, including single frame and multi-framed broadcast and on-request messages, are susceptible to data manipulation attacks where a shim DLL is used as a Machine-In-The-Middle. The demonstration shows these attacks can manipulate data that may mislead vehicle operators into taking the wrong actions. A solution is proposed to mitigate these attacks by utilizing machine authentication codes or authenticated encryption with pre-shared keys between the communicating
Kumar, SharikaDaily, JeremyAhmed, QadeerArora, Anish
Intrusion Detection Systems (IDS), technically speaking, is to monitor the network, system, and operation status according to certain security policies, and try to find various attack attempts, attacks or attack results to ensure the confidentiality, integrity and availability of network system resources. Automotive intrusion detection systems can identify and alert by analyzing in-vehicle traffic and log when software applications or devices with malicious activity exist, or the in-vehicle network is tampered and injected. But unfortunately, automotive cybersecurity researchers hardly produce a comprehensive detection method due to the confidential nature of Controller Area Network (CAN) DBC format files, which is a standard long maintained by car manufacturers. In this paper, an enhanced intrusion detection method is proposed based on the double-decision-tree to classify different attack models for in-vehicle CAN network without the need to obtain complete DBC files. Unlike the
Wang, BowenZhang, YuanceZhang, ZhaojingHu, HongxingPu, Geguang
Due to increase in complexity of vehicle functionality and involvement of electronic components, the use of complex electronic control units is prevalent in today’s vehicles. This has led to increased amount of Electronic Control Unit (ECU) data, and in turn increased Diagnostic data. This Diagnostic data is described in the Automotive Open System Architecture Diagnostic Exchange Template (AUTOSAR DEXT), which is a standard diagnostic data format specified in AUTOSAR 4.2.1 for Unified Diagnostic Services and fault memory. It enables consistent exchange of Diagnostic information across Original Equipment manufacturer OEMs and between OEM and Suppliers, thereby aiding uniformity in configuration of basic software modules described in Automotive Open System Architecture (AUTOSAR) Layered Architecture across enterprise boundaries. DEXT provides the possibility to describe the data to be transported, using respective protocol, along with origin of data in ECU’s application software. When
Kadu, VedantiDambhare, SanjayUjjir, AbhinavYadav, Vineet
Fuel economy improvement of Class 8 long-haul trucks has been a constant topic of discussion in the commercial vehicle industry due to the significant potential it offers in reducing GHG emissions and operational costs. Among the different vehicle categories in on-road transportation, Class 8 long-haul trucks are a significant contributor to overall GHG emissions. Furthermore, with the upcoming 2027 GHG emission and low-NOx regulations, advanced powertrain technologies will be needed to meet these stringent standards. Connectivity-based powertrain optimization is one such technology that many fleets are adopting to achieve significant fuel savings at a relatively lower technology cost. With advancements in vehicle connectivity technologies for onboard computing and sensing, the full potential of connected vehicles in reducing fuel consumption can be realized through V2X (Vehicle-to-Everything) communication. Upcoming road grade, traffic lights and lead vehicle speeds can be utilized to
Paul, SumitGoyal, VasuJoshi, SatyumFranke, MichaelTomazic, DeanZeman, Jonathan
Items per page:
1 – 50 of 684