Browse Topic: Cybersecurity

Items (590)
As automotive electronic systems become increasingly complex, the demand for robust data security and privacy protection mechanisms has grown significantly. The AUTOSAR (Automotive Open System Architecture) standard has emerged as a widely adopted framework in the automotive industry due to its strong support for interoperability, functional safety, and cybersecurity. Within the AUTOSAR Classic Platform (CP), the Crypto Stack Service as a core component that enables critical security functionalities such as encryption, decryption, digital signature verification, and key management. However, the deployment of the Crypto Stack across heterogeneous Electronic Control Units (ECUs) introduces a series of technical challenges. These challenges stem primarily from variations in hardware resources, differences in operating system implementations, and inconsistencies in software execution environments. As a result, issues such as architectural compatibility, task scheduling efficiency, and
Wu, ShudiFan, SunjiaYu, YaqiXiu, Jiapeng
Burton, SimonChalmers, SethWishart, JeffreyZheng, Ling
This information report identifies and evaluates isolation building blocks applicable to TA sandboxing within a HPSE. These building blocks can be used to support SAE J3101 TA requirements for sandboxing of TAs and secure communication between TAs. TAs must execute within their own trust domain to prevent compromise of the HPSE and other TAs. TA trust domain isolation strength may vary depending on the risk profile of the TA deployed, hence the requirement for isolation building blocks to match the risk profile. A multitenancy TA HPSE has a higher risk profile than multiple TAs from the same source (e.g., OEM). TA multitenancy must not compromise the security properties of the HPSE (the secure integration and execution of trusted multi-vendor code). In this report, we provide information on the following: HPSE TA use cases and risk profiles HPSE TA isolation building blocks for manufacturers Threat analysis to determine the effectiveness of isolation security models As the ECU E/E
Vehicle Electrical System Security Committee
With the development of ship intelligence, network security threats are increasing day by day. This paper proposes a ship network security situation awareness algorithm based on an improved spatiotemporal attention mechanism, and constructs a supporting defense mechanism. The algorithm accurately captures changes in network security situation through dynamic weight allocation and multi-scale feature extraction. In the experimental simulation, OMNeT++ is combined with SUMO to build a ship network simulation environment, and Maritime - CPS - Dataset and other data sets are used for testing. The algorithm in this paper is compared with ARIMA, LSTM, GRU and other algorithms. The results show that in terms of situation awareness accuracy, the algorithm in this paper reaches 95.6%, which is 27.8% higher than ARIMA, 12.3% higher than LSTM, and 10.1% higher than GRU respectively; the average response time of the defense mechanism is shortened to 2.3 seconds, which is 40% faster than the
Kong, ZeyuZhou, BofeiWan, Shiyao
With the rapid development of Internet of Vehicles (IoV) and cyber-physical systems (CPS), connected autonomous vehicles (CAVs) have also developed rapidly. However, at the same time, in-vehicle networks also face more security challenges, mainly in terms of resource constraints, dynamic attacks, protocol heterogeneity, and high real-time requirements. Firstly, the trade-offs between lightweight encryption primitives and their software and hardware collaborative design in terms of performance, resource overhead, and security strength are analyzed. Secondly, the resource efficiency of AI-based intrusion detection system (IDS) is evaluated at the edge. Finally, we propose a dynamic adaptive collaborative defense framework (DACDF), which integrates federated learning with dynamic weight distillation, blockchain authentication with lightweight verifiable delay function (Light-VDF) and cross-domain IDS with hierarchical attention feature fusion to deal with collaborative attacks in resource
Zhou, YouZhang, JiguiDing, KaniYang, Guozhi
The rapid evolution of autonomy in Off-Highway Vehicles (OHVs)—spanning agriculture, mining, and construction—demands robust cybersecurity strategies. Sensor-control systems, the cognitive core of autonomous OHVs, operate in harsh, connectivity-limited environments. This paper presents a structured approach to applying threat modeling to these architectures, ensuring secure-by-design systems that uphold safety, resilience, and operational integrity.
Kotal, Amit
Manufacturers need pragmatic guidance when choosing network protocols that must balance responsiveness, high data throughput, and long-term maintainability. This paper presents a step-by-step, criteria-driven framework that scores protocols on six practical dimensions, real-time behavior, bandwidth, interoperability, security, IIoT readiness, and legacy support and demonstrates the approach on both greenfield and brownfield scenarios. By combining vendor specifications, peer-reviewed studies, and field experience, the framework delivers transparent, weighted rankings designed to help engineers make defensible deployment choices. This paper explores how network protocols can be mapped to different layers of the automation pyramid, ranging from field-level communication to enterprise-level. For example, Profinet is shown to be highly effective for time-critical applications such as robotic assembly and motion control due to its deterministic, real-time ethernet capabilities. Meanwhile
Tarapure, Prasad
In view of the complexity of railway engineering structure, the systematicness of professional collaboration and the high reliability of operation safety, this paper studied the spatial-temporal information data organization model with all elements in whole domain for Shuozhou-Huanghua Railway from the aspect of Shuozhou-Huanghua Railway spatial-temporal information security. Taking the unique spatial-temporal benchmark as the main line, the paper associated different spatial-temporal information to form an efficient organization model of Shuozhou-Huanghua Railway spatial-temporal information with all elements in the whole domain, so as to implement the effective organization of massive spatial-temporal information in various specialties and fields of Shuozhou-Huanghua Railway; By using GIS (Geographic Information System) visualization technology, spatial analysis technology and big data real-time dynamic rendering technology, it was realized the real-time dynamic visualization display
Liu, KunYu, HongshengZhu, PanfengLiu, WenbinWang, Yaoyao
The automotive industry's rapid shift towards electric and connected vehicles intensifies the demand for robust solutions addressing software integrity, cybersecurity, and stringent regulatory compliance, particularly concerning powertrain components and related control units. This paper addresses the significant challenge faced by automotive companies in efficiently managing and deploying an exponentially increasing number of software and hardware variants under the rigorous requirements of UNECE Regulation No. 156. This regulation mandates secure, traceable, and systematic software update processes for new vehicles and their components [1]. The proposed solution demonstrates a transformative approach that significantly reduces the software release cycle for Over-The-Air (OTA) updates which usually take 6 to 8 months to emerge [2]. By leveraging advanced techniques in automated compliance tracking, efficient parameter management, and centralized documentation, this approach bridges
Sammer, GeraldSchuch, NikolasKammerhofer, Markus
As mission-critical systems demand more processing power, real-time data movement, and multi-domain interoperability, rugged embedded systems are being transformed. Today's military and aerospace applications increasingly demand the merging of AI computing, enhanced sensor interfaces, and cybersecurity - all under harsh environmental conditions. At the heart of this evolution is the 3U OpenVPX form factor, a modular, compact, and ruggedized hardware standard and increasingly the SOSA aligned subset of the architecture. However, next-generation systems need to go further: supporting higher bandwidth, better thermal efficiency, improved security, while maintaining multi-vendor interoperability and long-term sustainability. We'll discuss some of today's enclosure solutions as well as emerging technologies.
Several information security problems currently require the vigilance of the defender to prevent exploitation or misclassification of information, specifically code injection vulnerabilities and enforcement of Security Classification Guides. This paper discusses a potential solution that can enforce some of these rules by computer mechanism, reducing the potential for security problems. The solution is to replace using simple text strings with data structures containing both a string and a key-value data store. This metadata allows the computer to apply automated rules to enforce data sanitization and classification.
Czerniak, Gregory P.
This research evaluated the practicality of implementing Post-Quantum Cryptography (PQC) algorithms onboard resource-constrained computing devices, especially those found in automotive platforms. While computational efficiency within PQC is high, memory size and bandwidth constraints become relevant upon consideration of end-to-end implementation. The Controller Area Network (CAN) protocol utilizes only eight (8) bytes of data payload per message, requiring the large keys of PQC algorithms to be split into several messages. Power efficient 32-bit ARM microcontrollers were used for testing. Comparison was made between software implementations of both PQC and modern algorithms to evaluate relative computational cost. Ultimately, this research determined that the communication overhead required by PQC algorithms such as CRYSTALS-Kyber, CRYSTALS-Dilithium, and Falcon is not so egregious as to preclude them from implementation on board vehicular networks.
Smith, SethOwens, KyleKozan, Katherine
Data security remains an issue of the utmost concern in contested environments. Mechanisms such as data encryption, beam-forming antennas, and frequency-hopping radio have emerged to mitigate some of the concerns in radio-frequency (RF) communications, but they do not remove all risk. Consequently, there is still a consistent appetite for alternative solutions. This paper presents a case for the use of the free-space optical (FSO) communications technology ImpLi-Fi as one such alternative. FSO communication is promising because of the ease with which the signal beam may be steered and limited, making detection and interception more difficult than with RF, and ImpLi-Fi in particular is desirable for its exceptional outdoor performance and ease of integration into existing light sources. The paper briefly illustrates the origins of the contested logistics (CL) problem and CL use cases for secure communication channels, before describing the ImpLi-Fi technology in some detail; exploring
Brzozowski, AaronReimann, JethroLakshmanan, SridharMarrero, Pedro “Pete”Moyer, Benjamin D.
The automotive industry’s systems and over-the-air (OTA) updates have vulnerabilities in its software supply chain (SSC). Although frameworks like Uptane have improved OTA security, gaps remain in ensuring software integrity and provenance. In this paper, we examine challenges securing the automotive SSC and introduce a framework, GUIXCHAIN, that integrates version control, reproducible builds, blockchain technology, and software bills of materials (SBoMs) for transparency, auditability, and resilience. Reproducible builds guarantee identical resulting binaries when compiling the same source code in different environments, as any deviation in the final output indicates a potential compromise in the build process, such as malware injection. Our preliminary study shows Guixchain’s use of reproducible builds ensures consistent and integrity-secured software across various build environments. The blockchain provides forensic capabilities, offering a history of the what, who and where of
Aideyan, IwinosaPesé, Mert D.Brooks, Richard
As unmanned vehicular networks become more prevalent in civilian and defense applications, the need for robust security solutions grows in parallel. While ROS 2 offers a flexible platform for robotic operations, its security model lacks the adaptability required for dynamic trust management and proactive threat mitigation. To address these shortcomings, we propose a novel framework that integrates containerized ROS 2 nodes with Kubernetes-based orchestration, a dynamic trust management subsystem, and integrability with simulators for real-time and protocol-flexible network simulation. By embedding trust management directly within each ROS 2 container and leveraging Kubernetes, we overcome ROS 2’s security limitations by enabling real-time monitoring and machine learning-driven anomaly detection (via an autoencoder trained on custom data), facilitating the isolation or removal of suspicious nodes. Additionally, Kubernetes policies allow seamless scaling and enforcement of trust-based
Tinker, NoahBoone, JuliaWang, Kuang-Ching
The scope of the analysis is on the GlobalPlatform Secure Element (SE) and Trusted Execution Environment (TEE) standard specifications correspondence to SAE J3101 recommended practices. This analysis includes focuses on the platform specifications but not the scope of any future security application/applets. Both of these GlobalPlatform specifications have associated protection profiles to validate compliance, although GlobalPlatform does not currently have any specific SAE J3101 protection profiles. GlobalPlatform has communicated that it is assessing whether or not to develop application-level protection profiles to more explicitly cover the remaining requirements of SAE J3101 in order to allow for standardized testing and certification of complete solutions.
Vehicle Electrical System Security Committee
This article introduces a comprehensive cooperative navigation algorithm to improve vehicular system safety and efficiency. The algorithm employs surrogate optimization to prevent collisions with cooperative cruise control and lane-keeping functionalities. These strategies address real-world traffic challenges. The dynamic model supports precise prediction and optimization within the MPC framework, enabling effective real-time decision-making for collision avoidance. The critical component of the algorithm incorporates multiple parameters such as relative vehicle positions, velocities, and safety margins to ensure optimal and safe navigation. In the cybersecurity evaluation, the four scenarios explore the system’s response to different types of cyberattacks, including data manipulation, signal interference, and spoofing. These scenarios test the algorithm’s ability to detect and mitigate the effects of malicious disruptions. Evaluate how well the system can maintain stability and avoid
Khan, Rahan RasheedHanif, AtharAhmed, Qadeer
With many stakeholders involved, and major investments supporting it, the advancements in automated driving (AD) are undoubtedly there. Generally speaking, the motivation for advancing AD is driver convenience and road safety. Regarding the development of AD, original equipment manufacturers, technology start-ups, and AD systems developers have taken different approaches for automated vehicles (AVs). Some manufacturers are on the path toward stand-alone vehicles, mostly relying on onboard sensors and intelligence. On the other hand, the connected, cooperative, and automated mobility (CCAM) approach relies on additional communication and information exchange to ensure safe and secure operation. CCAM holds great potential to improve traffic management, road safety, equity, and convenience. In both approaches, there are increasingly large amounts of data generated and used for AD functions in perception, situational awareness, path prediction, and decision-making. The use of artificial
Van Schijndel-de Nooij, MargrietBeiker, Sven
This document specifically pertains to cybersecurity for vehicles. It has been developed by SAE International (SAE) Committee Technical Committee on Vehicle Electrical and Electronic Systems, “Cybersecurity Testing Task Force,” a subcommittee of SAE Committee, “Vehicle Cybersecurity Systems Engineering Committee.” This committee is authorized under the scope and authority of the SAE Electronic Design Automation Steering Committee, which is organized under the scope and authority of the SAE Electrical Systems Committee (also known as the Electrical Systems Group), which is directly under the scope and authority of the SAE Motor Vehicle Council. The SAE Motor Vehicle Council’s stated scope of influence and authority, as defined by SAE, includes, “passenger car and light truck.” By definition, this excludes motorcycles, certain trailers, heavy trucks, buses, snowmobiles, watercraft, marine vessels, off-road, multi-purpose vehicles, certain other specialty vehicles, and aircraft.
Vehicle Cybersecurity Systems Engineering Committee
Airworthiness certification of aircraft requires an Airworthiness Security Process (AWSP) to ensure safe operation under potential unauthorized interactions, particularly in the context of growing cyber threats. Regulatory authorities mandate the consideration of Intentional Unauthorized Electronic Interactions (IUEI) in the development of aircraft, airborne software, and equipment. As the industry increasingly adopts Model-Based Systems Engineering (MBSE) to accelerate development, we aim to enhance this effort by focusing on security scope definitions – a critical step within the AWSP for security risk assessment that establishes the boundaries and extent of security measures. However, our findings indicate that, despite the increasing use of model-based tools in development, these security scope definitions often remain either document-based or, when modeled, are presented at overly abstract levels, both of which limit their utility. Furthermore, we found that these definitions
Hechelmann, AdrianMannchen, Thomas
Aircraft cabin management is characterized by operational and business processes. Both are defined as a logical sequence of activities that occur during the flight. While the operational process includes activities to ensure flight safety, such as take-off, cruise and landing, the business process activities are related to adding value to the customer, i.e. the passenger. They are to be certified by the authority as a part of the aircraft type certification. These processes are defined by the airline and are described as part of the airline’s business model. While the scope of operational processes for passenger safety within the aircraft cabin should remain as unchanged as possible, the increasing competitive pressure on airlines is leading to a constantly rising number of services in the cabin. To prevent compromising cabin safety from increased cabin crew workload during the cruise phase, there is a growing trend toward digitizing operational and business processes. The digitized
Hintze, HartmutBlecken, MarvinGod, RalfPereira, Daniel
Items per page:
1 – 50 of 590