Browse Topic: Telecommunications
SAE J1978-1 specifies a complementary set of functions to be provided by an OBD-II scan tool. These functions provide complete, efficient, and safe access to all regulated OBD (on-board diagnostic) services on any vehicle which complies to SAE J1979. The content of this document is intended to satisfy the requirements of an OBD-II scan tool as required by current U.S. OBD regulations. This document specifies: A means of establishing communications between an OBD-equipped vehicle and an OBD-II scan tool. A set of diagnostic services to be provided by an OBD-II scan tool in order to exercise the services defined in SAE J1979. In addition, SAE J1978-1 covers first generation protocol functionality defined in SAE J1979 plus automatic protocol determination for all SAE J1979/J1979-2/J1979-3 application content. The presentation of the SAE J1978 document family, where SAE J1978-1 covers first generation protocol functionality defined in SAE J1979 and protocol determination for SAE J1979, SAE
The automotive industry is evolving from a reactive, independently self-determined approach to cybersecurity, complicated by a complex supply chain. Over time, this has resulted in a fragmented industry comprised of any number of proprietary solutions verses a standardized, regulated paradigm to facilitate a platform-oriented approach. This document, an update on collaborative work from the SAE Vehicle Electrical Hardware Security Task Force (TEVEES18B) and GlobalPlatform Automotive Task Force, outlines this transition strategy. An extensible number of additional examples of use cases of Global Platform Technologies are explored in this document.
The reliability of Drive Unit (DU) oil pumps is critical to the performance and safety of electric vehicles, as these pumps provide essential lubrication and thermal management. In modern EV architectures, real-time health monitoring of these pumps typically relies on indirect signals than dedicated sensing hardware, a design choice optimized for cost, weight, and system complexity. This makes early fault detection a non-trivial challenge. To address this limitation, we present a novel, data-driven anomaly detection framework that leverages large-scale customer fleet telemetry and advanced machine learning to identify incipient pump degradation that traditional diagnostic methods often fail to capture. Specifically, we develop an XGBoost regression model trained on time-series features—including commanded pump speed, oil temperature, and historical pump current—to predict expected current behavior under nominal conditions. Deviations are quantified using the Mean Absolute Percentage
SAE J1939-75 defines the set of data parameters (SPs) and messages (PGs) for information predominantly associated with monitoring and control generators and driven equipment in electric power generation and industrial applications. The data parameters (SPs) and messages (PGs) previously published within this document are published in SAE J1939DA. Applications using the SAE J1939-75 document must refer to SAE J1939DA for the SAE J1939 parameters and messages for monitoring and controlling the power units, e.g., engines and turbines, that power the generators and driven industrial equipment.
This top-level document provides a general overview of the SAE J1939 network and describes the subordinate document structure. This document includes definitions of terms and abbreviations which are used among the various SAE J1939 subordinate documents.
This SAE Recommended Practice defines a method for implementing a bidirectional, serial communications link over the vehicle power supply line among modules containing microcomputers. This document defines those parameters of the serial link that relate primarily to hardware and software compatibility such as interface requirements, system protocol, and message format that pertain to Power Line Communications (PLC) between Tractors and Trailers. This document defines a method of activating the trailer ABS Indicator Lamp that is located in the tractor.
This standard specifies the system requirements for an on-board vehicle-to-vehicle (V2V) safety communications system for light vehicles1, including standards profiles, functional requirements, and performance requirements. The system is capable of transmitting and receiving the SAE J2735-defined basic safety message (BSM) [1] over a dedicated short range communications (DSRC) wireless communications link as defined in the Institute of Electrical and Electronics Engineers (IEEE) 1609 suite and IEEE 802.11 standards [2] to [6].
The evolution of wireless communications and the miniaturization of electrical circuits have fundamentally reshaped our lives and the digital landscape. However, as we push toward higher-frequency communications in an increasingly connected world, engineers face growing challenges from multipath propagation — a phenomenon where the same radio signal reaches receiving antennas through multiple routes, usually with time delays and altered amplitudes. Multipath interference leads to many reliability issues, ranging from “ghosting” in television broadcasts to signal fading in wireless communications.
A new Microelectromechanical system (MEMS) grating modulator has been developed, offering significant advancements in optical efficiency and scalability for communication systems. By integrating a tunable sinusoidal grating with broadside-constrained continuous ribbons, a large-scale aperture of 30 × 30 mm is achieved and supports high-speed modulation up to 250 kHz.
Modern vehicles require sophisticated, secure communication systems to handle the growing complexity of automotive technology. As in-vehicle networks become more integrated with external wireless services, they face increasing cybersecurity vulnerabilities. This paper introduces a specialized Proxy based security architecture designed specifically for Internet Protocol (IP) based communication within vehicles. The framework utilizes proxy servers as security gatekeepers that mediate data exchanges between Electronic Control Units (ECUs) and outside networks. At its foundation, this architecture implements comprehensive traffic management capabilities including filtering, validation, and encryption to ensure only legitimate data traverses the vehicle's internal systems. By embedding proxies within the automotive middleware layer, the framework enables advanced protective measures such as intrusion detection systems, granular access controls, and protected over-the-air (OTA) update
This document provides vehicle-level data collection, data analysis, and data verification procedures that may be used to verify that an instrument under test (IUT) satisfies the vehicle-level requirements specified in SAE J3161/1. For the purposes of this report, “vehicle-level requirements” primarily consist of those requirements which can be verified external to the vehicle. The IUT for these procedures is a configured LTE-V2X vehicle-to-vehicle (V2V) device as defined in SAE J3161/1 and is installed on a vehicle of class 2, 3, 4, or 5. While the IUT is conceptually separated from the vehicle it is installed on, the tests outlined in this document are primarily vehicle level, so the terms “vehicle” and “IUT” can generally be considered interchangeable. Additionally, non-vehicle-level complementary tests, not included in this document, are required to verify that the entire set of requirements specified in SAE J3161/1 is satisfied. This document also includes a Traceability Matrix to
This SAE Aerospace Recommended Practice (ARP) defines lightning strike zones and provides guidelines for locating them on particular aircraft, together with examples. The zone definitions and location guidelines described herein are applicable to Parts 23, 25, 27, and 29 aircraft. The zone location guidelines and examples are representative of in-flight lightning exposures.
RF and fiber have long co-existed within modern military and aerospace systems, with each medium dedicated to separate, mission-critical roles. Increasingly, however, system designers are turning to RF-over-fiber (RFoF) architectures to bridge the gap between over-the-air RF interfaces and the long, interference-resistant transport advantages of fiber. When it comes to over-the-air communications uses like tactical radio or satellite communications terminals, radio frequency (RF) is still the dominant signal format. RF is also commonly used at the front end of radar and electronic warfare, supporting search, tracking, fire control radar, missile seekers, jammers and electronic support measures.
NASA's Space Communications and Navigation (SCaN) Program and the Johns Hopkins Applied Physics Laboratory in Laurel, Maryland, have successfully tested wideband technology that allows spacecraft to communicate with both government and commercial networks for the first time. Launched July 23, 2025, aboard a SpaceX Falcon 9 rideshare mission, the Polylingual Experimental Terminal (PExT) is demonstrating multilingual wideband terminal technology. Hosted on a satellite from York Space Systems, PExT enhances a spacecraft's communications subsystem, enabling mission controllers to track and exchange data more efficiently across a broad range of networks and frequencies.
With the rapid advancement of connected vehicle technologies, infotainment Electronic Control Units (ECUs) have become central to user interaction and connectivity within modern vehicles. However, this enhanced functionality has introduced new vulnerabilities to cyberattacks. This paper explores the application of Artificial Intelligence (AI) in enhancing the cybersecurity framework of infotainment ECUs. The study introduces AI-powered modules for threat detection and response, presents an integrated architecture, and validates performance through simulation using MATLAB, CANoe, and NS-3. This approach addresses real-time intrusion detection, anomaly analysis, and voice command security. Key benefits include zero-day exploit resistance, scalability, and continuous protection via OTA updates. The paper references real-world automotive cyberattack cases such as OTA vulnerability patches, Connected Drive exploits, and Uconnect hack, emphasizing the critical need for AI-enabled proactive
Items per page:
50
1 – 50 of 4473