Browse Topic: Cybersecurity
This SAE Technical Information Report (TIR) establishes the instructions for the documents required for the variety of potential functions for PEV communications, energy transfer options, interoperability, and security. This includes the history, current status, and future plans for migrating through these documents created in the Hybrid Communication and Interoperability Task Force, based on functional objective (e.g., [1] If I want to do V2G with an off-board inverter, what documents and items within them do I need, [2] What do we intend for V3 of SAE J2953, …).
Cybersecurity, particularly in the automotive sector, is of paramount importance in today’s digital age. With the advent of connected commercial vehicles, which leverage telematics for efficient fleet management, the landscape of automotive cybersecurity is rapidly evolving. These vehicles, integral to logistics and transportation businesses, are becoming increasingly connected, thereby escalating the risks associated with cybersecurity threats. These commercial vehicles are becoming prime targets for cyber-attacks due to their connectivity and the valuable data they hold. The potential consequences of these cyber-attacks can range from data breaches to disruptions in fleet operations, and even safety risks. This paper analyses the unique challenges faced by the commercial vehicle sector, such as the need for robust telematics systems, secure communication channels, and stringent data protection measures. Case studies of notable cybersecurity incidents involving commercial vehicles are
Virtualization features such as digital twins and virtual patching can accelerate development and make commercial vehicles more agile and secure. There is one sure-fire way to secure commercial vehicles from cyber-attacks. “You just remove the connectivity,” quipped Brandon Barry, CEO of Block Harbor Cybersecurity and the moderator of a panel session on “cybersecurity of virtual machines” at the SAE COMVEC 2024 conference in Schaumburg, Illinois. Obviously, that train has left the station - commercial vehicles of all types, including trains, are only becoming more automated and connected, which increases the risks for cyber-attacks. “We have very connected vehicles, so attacks can be posed not just through powertrain solutions but also through telemetry, infotainment systems connected to different applications and services, and also through cloud platforms,” said Trisha Chatterjee, current product support and data specialist for fuel cell and hydrogen technology at Accelera by Cummins.
A research team led by Rice University’s Edward Knightly has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.
In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of automobile and providing more advance, safe and secure solutions e.g., Autonomous driving, E-mobility, and software driven vehicles, due to which vehicle digitization and lots of sensors inside and outside the vehicle are being used, and automobile are becoming intelligent. i.e., intelligent vehicles with advance safe and secure features but all these advancements come with significant threat of cybersecurity risk. Therefore, providing an automobile that is safe and
When cybersecurity firm Crowdstrike's platform went down in July, it became the most significant outage in the history of information technology, according to The Guardian. About 8.5 million Microsoft operating systems were affected, including almost every sector of the economy. In the wake of the crash, which was traced to a faulty software update pushed by Crowdstrike, the automotive business is among those developing new policies to avoid repeat incidents.
Data encryption is an essential part of keeping patient information private. It’s also remained relatively unchanged in recent decades — a rarity for anything in the cybersecurity space. The dawn of quantum computing will change that.
Usage of cloud technology is essential for aftersales tester providers. It eases the rollout of new tester content - for example, diagnostic data of new vehicle types, updated repair manuals or ECU software for flash programming. Cloud technology also implements security services such as user authentication information. Figure 1 shows a typical setup as it is implemented for the service of vehicles such as trucks and buses. The vehicle is parked (vehicle speed = zero) in the service workshop, and its E/E system is connected to the vehicle communication interface (VCI) via CAN or Ethernet. On the tester (TST) side, the TST-to-VCI connection is either USB or WiFi.
In the increasingly connected and digital world, businesses are sprinting to integrate technological advancements into their corporate fabric. This is evident with the emerging concept of “digital twinning.” Digital twins are virtual representations of real-world objects or systems used to digitally model performance, identify inefficiencies, and design solutions. This helps improve the “real world” product, reduces costs, and increases efficiency. However, this replication of a physical entity in the digital space is not without its challenges. One of the challenges that will become increasingly prevalent is the processing, storing, and transmitting of Controlled Unclassified Information (CUI). If CUI is not protected properly, an idea to save time, money, and effort could result in the loss of critical data. The Department of Defense's (DoD) CUI Program website defines CUI as “government-created or owned unclassified information that allows for, or requires, safeguarding and
Smart devices can be hacked. That makes the electric grid vulnerable to bad actors who might try to turn off the power, damage the system, or worse. Recently, a team of experts at the Department of Energy’s Pacific Northwest National Laboratory put forth a new approach to protect the grid.
Advanced two-dimensional materials discovered in the last two decades are now being produced at scale and are contributing to a wide range of performance enhancements in engineering applications. The most well known of these novel materials is graphene, a nearly transparent nanomaterial comprising a single layer of bonded carbon atoms. In relative terms, it has the highest level of heat and electrical conductivity, protects against ultraviolet rays, and is the strongest material ever measured. These properties have made graphene an attractive potential material for a variety of applications, particularly for transportation-related uses, and especially for aerospace engineering. The goals of reducing greenhouse gas emissions and creating a world that achieves net-zero emissions have prioritized the electrification of transportation, the decarbonization of industry, and the development of products that require less energy to make, last longer, and are fully recyclable. These aspects have
On-road vehicles equipped with driving automation features are entering the mainstream public space. This category of vehicles is now extending to include those where a human might not be needed for operation on board. Several pilot programs are underway, and the first permits for commercial usage of vehicles without an onboard operator are being issued. However, questions like “How safe is safe enough?” and “What to do if the system fails?” persist. This is where remote operation comes in, which is an additional layer to the automated driving system where a human assists the so-called “driverless” vehicle in certain situations. Such remote-operation solutions introduce additional challenges and potential risks as the entire chain of “automated vehicle, communication network, and human operator” now needs to work together safely, effectively, and practically. And as much as there are technical questions regarding network latency, bandwidth, cybersecurity, etc., aspects like human
On-road vehicles equipped with driving automation features are entering the mainstream public space. This category of vehicles is now extending to include those where a human might not be needed for operation on board. Several pilot programs are underway, and the first permits for commercial usage of vehicles without an onboard operator are being issued. However, questions like “How safe is safe enough?” and “What to do if the system fails?” persist. This is where remote operation comes in, which is an additional layer to the automated driving system where a human assists the so-called “driverless” vehicle in certain situations. Such remote-operation solutions introduce additional challenges and potential risks as the entire chain of “automated vehicle, communication network, and human operator” now needs to work together safely, effectively, and practically. And as much as there are technical questions regarding network latency, bandwidth, cybersecurity, etc., aspects like human
This chapter delves into the field of multi-agent collaborative perception (MCP) for autonomous driving: an area that remains unresolved. Current single-agent perception systems suffer from limitations, such as occlusion and sparse sensor observation at a far distance. To address this, three unsettled topics have been identified that demand immediate attention. First, it is crucial to establish normative communication protocols to facilitate seamless information sharing among vehicles. Second, collaboration strategies need to be defined, including identifying the need for specific collaboration projects, determining the collaboration partners, defining the content of collaboration, and establishing the integration mechanism. Finally, collecting sufficient data for MCP model training is vital. This includes capturing diverse modal data and labeling various downstream tasks as accurately as possible.
The U.S. Air Force (USAF) deploys flying units with readiness spares packages (RSPs) to try to ensure that the units are stocked with enough parts to be self-sufficient for 30 days. This report is the third in a five-volume series addressing how AI could be employed to assist warfighters in four distinct areas: cybersecurity, predictive maintenance, wargames, and mission planning, with predictive maintenance in focus. Predicting which parts are likely to fail - and, therefore, which parts should be included in the RSPs - is important because overstocking can be expensive and understocking can threaten mission readiness. This report presents a discussion of whether and when artificial intelligence (AI) methods could be used to improve parts failure analysis, which currently uses a model that assumes a probability distribution. To do this, several machine learning (ML) models were developed and tested on historical data to compare their performance with the optimization and prediction
Following its annual report detailing the growing cybersecurity threats to vehicles, fleets, and the networks they rely on, Upstream Security announced the launch of a generative AI tool to enhance its ability to reduce the risk posted by global threats. Israel-based Upstream, which has a vehicle security operations center (VSOC) in Ann Arbor, Mich., monitors millions of connected vehicles and Internet of Things (IoT) devices and billions of API transactions monthly. Ocean AI is built into the company's detection and response platform, called M-XDR, enabling its analysts, as well as those from OEMs and IoT vendors, to efficiently detect threat patterns and automate investigations before prioritizing a response.
Items per page:
50
1 – 50 of 528