Browse Topic: Data privacy

Items (45)
Cybersecurity, particularly in the automotive sector, is of paramount importance in today’s digital age. With the advent of connected commercial vehicles, which leverage telematics for efficient fleet management, the landscape of automotive cybersecurity is rapidly evolving. These vehicles, integral to logistics and transportation businesses, are becoming increasingly connected, thereby escalating the risks associated with cybersecurity threats. These commercial vehicles are becoming prime targets for cyber-attacks due to their connectivity and the valuable data they hold. The potential consequences of these cyber-attacks can range from data breaches to disruptions in fleet operations, and even safety risks. This paper analyses the unique challenges faced by the commercial vehicle sector, such as the need for robust telematics systems, secure communication channels, and stringent data protection measures. Case studies of notable cybersecurity incidents involving commercial vehicles are
Mahendrakar, ShrinidhiMadarla, ManojGangapuram, SivaDadoo, Vishal
In this research, we propose a set of reporting documents to enhance transparency and trust in artificial intelligence (AI) systems for cooperative, connected, and automated mobility (CCAM) applications. By analyzing key documents on ethical guidelines and regulations in AI, such as the Assessment List for Trustworthy AI and the EU AI Act, we extracted considerations regarding transparency requirements. Recognizing the unique characteristics of each AI system and its application sector, we designed a model card tailored for CCAM applications. This was made considering the criteria for achieving trustworthy autonomous vehicles, exposed by the Joint Research Centre (JRC), and including information items that evidence the compliance of the AI system with these ethical aspects and that are also of interest to the different stakeholders. Additionally, we propose an MLOps Card to share information about the infrastructure and tools involved in creating and implementing the AI system
Cañas, Paola NataliaNieto, MarcosOtaegui, OihanaRodriguez, Igor
The integration of software-defined approaches with software-defined battery electric vehicles brings forth challenges related to privacy regulations, such as European Union’s General Data Protection Regulation and Data Act, as well as the California Consumer Privacy Act. Compliance with these regulations poses barriers for foreign brands and startups seeking entry into these markets. Car manufacturers and suppliers, particularly software suppliers, must navigate complex privacy requirements when introducing vehicles to these regions. Privacy for Software-defined Battery Electric Vehicles aims to educate practitioners across different market regions and fields. It seeks to stimulate discussions for improvements in processes and requirements related to privacy aspects regarding these vehicles. The report covers the significance of privacy, potential vulnerabilities and risks, technical challenges, safety risks, management and operational challenges, and the benefits of compliance with
Abdul Hamid, Umar Zakir
Data privacy questions are particularly timely in the automotive industry as—now more than ever before—vehicles are collecting and sharing data at great speeds and quantities. Though connectivity and vehicle-to-vehicle technologies are perhaps the most obvious, smart city infrastructure, maintenance, and infotainment systems are also relevant in the data privacy law discourse. Facial Recognition Software and Privacy Law in Transportation Technology considers the current legal landscape of privacy law and the unanswered questions that have surfaced in recent years. A survey of the limited recent federal case law and statutory law, as well as examples of comprehensive state data privacy laws, is included. Perhaps most importantly, this report simplifies the balancing act that manufacturers and consumers are performing by complying with data privacy laws, sharing enough data to maximize safety and convenience, and protecting personal information. Click here to access the full SAE EDGETM
Eastman, Brittany
Android applications have historically faced vulnerabilities to man-in-the-middle attacks due to insecure custom SSL/TLS certificate validation implementations. In response, Google introduced the Network Security Configuration (NSC) as a configuration-based solution to improve the security of certificate validation practices. NSC was initially developed to enhance the security of Android applications by providing developers with a framework to customize network security settings. However, recent studies have shown that it is often not being leveraged appropriately to enhance security. Motivated by the surge in vehicular connectivity and the corresponding impact on user security and data privacy, our research pivots to the domain of mobile applications for vehicles. As vehicles increasingly become repositories of personal data and integral nodes in the Internet of Things (IoT) ecosystem, ensuring their security moves beyond traditional issues to one of public safety and trust. To
Zhang, LinxiMa, Di
The number of Unmanned Aircraft Systems (UAS) has been growing over the past few years and will continue to grow at a faster pace in the near future. UAS faces many challenges in certification, airspace management, operations, supply chain, and maintenance. Blockchain, defined as a distributed ledger technology for the enterprise that features immutability, traceability, automation, data privacy, and security, can help address some of these challenges. However, blockchain also has certain drawbacks and, additionally, it is still not fully mature. Hence it is essential to study how blockchain can help UAS. This Aerospace Information Report (AIR) presents the current opportunities, challenges of UAS operating at or below 400 ft Above Ground Level (AGL) altitude for commercial use and how blockchain can help meet these challenges. It also provides requirements for developing a blockchain solution for UAS along with the need for the standardization of blockchain enabled processes
Rencher, RobertManoharan, DineshR, PrithivirajGhimire, RiteshMarkou, ChrisFabre, ChrisRoboff, MarkBudeanu, DragosWalthall, RhondaVeluri, Sastry
The integration of ergonomics and artificial intelligence (AI) in the automotive industry has the potential to revolutionize the way how vehicles are designed, manufactured and used. The aim of this article is to review the recent literature on the subject and discuss the opportunities and challenges presented by the integration of these two fields. The paper begins defining the ergonomics and the AI and providing an overview of their respective roles in the automotive industry. It then examines the benefits of the integration of ergonomics and AI in the automotive industry, including the optimization of vehicle design and manufacturing process. The enhancement of the driver experience, and improvement of safety accessibility, and customization, however, the integration of ergonomics and AI in the automotive industry also presents challenges, including ethical and legal considerations, data privacy, liability, and the impact on the employment in the automotive industry. The paper
Puertas, Carlos Augusto PalermoGalhardi, Antonio Cesar
The concerns surrounding AV adoption encompass the data protection factor. An online survey was conducted to gain insights into this concern, targeting UAE residents with knowledge about Autonomous Vehicle (AV) technology. The collected data were subjected to statistical analysis to provide valuable information for the UAE government and private sectors. To achieve this goal, we conducted a statistical analysis of the collected data, which resulted in further insights regarding the obstacles impeding the adoption of AV technologies in the United Arab Emirates. This analysis further quantifies the factors that contributed to UAE public concerns. We also examined user group evaluations in terms of their propensity to employ the technology in the future
shweky, shuq hussenNasiruddeen Muhammad, Nasiruddeen MuhammadEman Abu Shabab, EmanSaad Amin, SaadHussain Al-Ahmad, HussainMukhtar, HusameldinMohammad Rababa, MohammadBurkhard Schafer, Burkhard
Unmanned Aircraft Systems (UAS) have been growing over the past few years and will continue to grow at a faster pace in future. UAS faces many challenges in certification, airspace management, operations, supply chain, and maintenance. Blockchain, defined as a distributed ledger technology for the enterprise that features immutability, traceability, automation, data privacy, and security, can help address some of these challenges. However, blockchain also has certain challenges and is still evolving. Hence it is essential to study on how blockchain can help UAS. G-31 technical committee of SAE International responsible for electronic transactions for aerospace has published AIR 7356 [1] entitled Opportunities, Challenges and Requirements for use of Blockchain in Unmanned Aircraft Systems Operating below 400ft above ground level for Commercial Use. This paper is a teaser for AIR 7356 [1] document. It presents the current opportunities, challenges of UAS operating at or below 400 ft
Manoharan, DineshG.V.V., Ravi KumarR, PrithivirajGhimire, RiteshRencher, RobertMarkou, ChrisFabre, ChrisRoboff, MarkBudeanu, DragosRajamani, RaviWalthall, RhondaVeluri, Sastry
By 2030, about 95% of new vehicles sold globally will be connected, up from around 50% today. Around 45% of these vehicles will have intermediate and advanced connectivity features (source: McKinsey, 2021). Modernization, standardization, and automation are the key steps in the roadmap of data handling for connected vehicles. Vehicle software increasingly sits within a connected ecosystem of devices. Consumer expectations are shifting more towards digital compatibility, connectivity, and new functionalities offered in autonomous vehicles. Digitalization is turning the vehicles of the future into commodities that are as experimental as they are useful. Many OEMs are at the beginning of this transformation journey and have struggled on the software side of things. The entire automotive industry is putting its efforts into effectively monetizing the data captured during the development and management of autonomous vehicles. It is not easy to handle the complexity, elasticity, and volume
Samantaray, Rojalin
This SAE Aerospace Information Report (AIR) focuses on opportunities, challenges, and requirements in use of blockchain for Unmanned Aircraft Systems (UAS) operating at and below 400 feet above ground level (AGL) for commercial use. UAS stakeholders like original equipment manufacturers (OEMs), suppliers, operators, owners, regulators, and maintenance repair and overhaul (MRO) providers face many challenges in certification, airspace management, operations, supply chain, and maintenance. Blockchain—defined as a distributed ledger technology that includes enterprise blockchain—can help address some of these challenges. Blockchain technology is evolving and also poses certain concerns in adoption. This AIR provides information on the current UAS challenges and how these challenges can be addressed by deploying blockchain technology along with identified areas of concern when using this technology. The scope of this AIR includes elicitation of key requirements for blockchain in UAS across
G-31 Digital Transactions for Aerospace
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and
Eastman, Brittany
Curtiss-Wright Defense Solutions Ashburn, VA 703-779-7800
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact
Dukarski, Jennifer
This SAE Aerospace Recommended Practice (ARP) provides insights on how to perform a Cost Benefit Analysis (CBA) to determine the Return on Investment (ROI) that would result from implementing a blockchain solution to a new or an existing business process. The word “blockchain” refers to a method of documenting when data transactions occur using a distributed ledger with desired immutable qualities. The scope of the current document is on enterprise blockchain which gives the benefit of standardized cryptography, legal enforceability and regulatory compliance. The document analyzes the complexity involved with this technology, lists some of the different approaches that can be used for conducting a CBA, and differentiates its analysis depending on whether the application uses a public or a private distributed network. This document is intended for people who do not have a deep technical understanding or familiarity with blockchain solutions to qualify and quantify its economic benefits
G-31 Digital Transactions for Aerospace
Even though ultrasound has been studied by scientists for many years, its capabilities in practical applications are yet to be fully harnessed
Access mechanisms to system data and/or control is a primary use case of the hardware protected security environment (hardware protected security environment) during different uses and stages of the system. The hardware protected security environment acts as a gatekeeper for these use cases and not necessarily as the executor of the function. This section is a generalization of such use cases in an attempt to extract common requirements for the hardware protected security environment that enable it to be a gatekeeper. Examples are: Creating a new key fob Re-flashing ECU firmware Reading/exporting PII out of the ECU Using a subscription-based feature Performing some service on an ECU Transferring ownership of the vehicle Some of these examples are discussed later in this section and some have detailed sections of their own. This list is by no means comprehensive. Other use cases that require hardware protected security environment-based access control may be used by each manufacturer
Vehicle Electrical System Security Committee
The rapid development of connected and automated vehicle technologies together with cloud-based mobility services is transforming the transportation industry. As a result, huge amounts of consumer data are being collected and utilized to provide personalized mobility services. Using big data poses serious challenges to data privacy. To that end, the risks of privacy leakage are amplified by data aggregations from multiple sources and exchanging data with third-party service providers, in face of the recent advances in data analytics. This article provides a review of the connected vehicle landscape from case studies, system characteristics, and dataflows. It also identifies potential challenges and countermeasures
Li, HuaxinMa, DiMedjahed, BrahimKim, Yu SeungMitra, Pramita
The connected car has already become a reality. It is a subject not just electrifying customers and manufacturers but also security researchers and IT experts. And in a worst-case scenario, criminal hackers as well. For years, security experts have observed the fact that the desktop PC is not the only target of digital attacks anymore. A large part of the malware is now customized to hit mobile devices. It would be negligent to believe that this development would leave the connected car unmolested
The rapid development of connected and automated vehicle technologies together with cloud-based mobility services are revolutionizing the transportation industry. As a result, huge amounts of data are being generated, collected, and utilized, hence providing tremendous business opportunities. However, this big data poses serious challenges mainly in terms of data privacy. The risks of privacy leakage are amplified by the information sharing nature of emerging mobility services and the recent advances in data analytics. In this paper, we provide an overview of the connected vehicle landscape and point out potential privacy threats. We demonstrate two of the risks, namely additional individual information inference and user de-anonymization, through concrete attack designs. We also propose corresponding countermeasures to defend against such privacy attacks. We evaluate the feasibility of such attacks and our defense strategies using real world vehicular data
Li, HuaxinMa, DiMedjahed, BrahimKim, Yu SeungMitra, Pramita
Autonomous vehicles might one day be able to implement privacy preserving driving patterns which humans may find too difficult to implement. In order to measure the difference between location privacy achieved by humans versus location privacy achieved by autonomous vehicles, this paper measures privacy as trajectory anonymity, as opposed to single location privacy or continuous privacy. This paper evaluates how trajectory privacy for randomized driving patterns could be twice as effective for autonomous vehicles using diverted paths compared to Google Map API generated shortest paths. The result shows vehicles mobility patterns could impact trajectory and location privacy. Moreover, the results show that the proposed metric outperforms both K-anonymity and KDT-anonymity
Banihani, AbdelnasserZaiter, AbdulrahmanCorser, George P.Fu, HuirongAlzahrani, Abdulrahman
Electrified vehicles including Battery Electric Vehicles (BEVs) and Plug-In Hybrid Vehicles (PHEVs) made by Ford Motor Company are fitted with a telematics modem to provide customers with the means to communicate with their vehicles and, at the same time, receive insight on their vehicle usage. These services are provided through the “MyFordMobile” website and phone applications, simultaneously collecting information from the vehicle for different event triggers. In this work, we study this data by using Big Data Methodologies including a Hadoop Database for storing data and HiveQL, Pig Latin and Python scripts to perform analytics. We present electrified vehicle customer behaviors including geographical distribution, trip distances, and daily distances and compare these to the Atlanta Regional Survey data. We discuss customer behaviors pertinent to electrified vehicles including charger types used, charging occurrence, charger plug-in times etc. Throughout this discussion, we
Ahmed, N. KhalidKapadia, Jimmy
AN/GSN-5 mobile automatic landing system is a low approach and landing aid for modern aviation, providing capabilities for ground controlled talk-down approach, automatic or pilot-coupled low approach, and fully automatic landing for aircraft having suitable autopilots. Precise-tracking conical-scanning radar determines aircraft position and transfers data to computer which selects desired glide slope, glide angle, and determines altitude command as a function of range to touch-down. Alternate methods of transmission provided by GSN-5A - ILS and radar beam coding-are described. The beacon and decoder provide a system combining high tracking accuracy with a high capacity private data link
Powell, F. D.
Items per page:
1 – 45 of 45