Browse Topic: Communication protocols

Items (981)
Recent advancements in energy efficient wireless communication protocols and low powered digital sensor technologies have led to the development of wireless sensor network (WSN) applications in diverse industries. These WSNs are generally designed using Bluetooth Low Energy (BLE), ZigBee and Wi-Fi communication protocol depending on the range and reliability requirements of the application. Designing these WSN applications also depends on the following factors. First, the environment under which devices operate varies with the industries and products they are employed in. Second, the energy availability for these devices is limited so higher signal strength for transmission and retransmission reduces the lifetime of these nodes significantly and finally, the size of networks is increasing hence scheduling and routing of messages becomes critical as well. These factors make simulation for these applications essential for evaluating the performance of WSNs before physical deployment of
Periwal, GarvitKoparde, PrashantSewalkar, Swarupanand
Ensuring secure and ultra-reliable low-latency communication (URLLC) is critical for Vehicle-to-Everything (V2X) systems, which form the backbone of autonomous transportation. This paper presents a theoretical framework for designing secure communication protocols tailored for V2X systems with stringent latency and reliability requirements. The proposed framework incorporates dynamic message prioritization, adaptive encryption, and lightweight authentication to address the unique challenges of V2X networks. The study provides mathematical models to predict latency and security performance under varying network conditions, with a focus on scalability and efficiency. This work aims to contribute a foundational approach for future advancements in URLLC protocols in autonomous vehicle ecosystems.
Imran, Shaik Moinuddin
Manufacturers need pragmatic guidance when choosing network protocols that must balance responsiveness, high data throughput, and long-term maintainability. This paper presents a step-by-step, criteria-driven framework that scores protocols on six practical dimensions, real-time behavior, bandwidth, interoperability, security, IIoT readiness, and legacy support and demonstrates the approach on both greenfield and brownfield scenarios. By combining vendor specifications, peer-reviewed studies, and field experience, the framework delivers transparent, weighted rankings designed to help engineers make defensible deployment choices. This paper explores how network protocols can be mapped to different layers of the automation pyramid, ranging from field-level communication to enterprise-level. For example, Profinet is shown to be highly effective for time-critical applications such as robotic assembly and motion control due to its deterministic, real-time ethernet capabilities. Meanwhile
Tarapure, Prasad
Time-Sensitive Networking (TSN) is a modern networking technology that promises to combine the speed, performance, and scalability of traditional best-effort Ethernet with the resilience and assurance of a safety-critical communications bus, all in a single physical network infrastructure. Although TSN is over a decade old, the collection of standards and profiles of which it consists are still evolving at a fast pace. Significant work remains to converge on a set of standardization and implementation details that will lead to meaningful interoperability in military ground vehicle applications. This paper explores the current state of TSN and how DEVCOM-GVSC’s partnership with industry, through collaborative refinement of ground combat vehicle requirements, is accelerating the adoption of this foundational MOSA-enabling technology.
Sopel, ShaneElliott, LeonardKinstler, ErikSalama, Christina
This research evaluated the practicality of implementing Post-Quantum Cryptography (PQC) algorithms onboard resource-constrained computing devices, especially those found in automotive platforms. While computational efficiency within PQC is high, memory size and bandwidth constraints become relevant upon consideration of end-to-end implementation. The Controller Area Network (CAN) protocol utilizes only eight (8) bytes of data payload per message, requiring the large keys of PQC algorithms to be split into several messages. Power efficient 32-bit ARM microcontrollers were used for testing. Comparison was made between software implementations of both PQC and modern algorithms to evaluate relative computational cost. Ultimately, this research determined that the communication overhead required by PQC algorithms such as CRYSTALS-Kyber, CRYSTALS-Dilithium, and Falcon is not so egregious as to preclude them from implementation on board vehicular networks.
Smith, SethOwens, KyleKozan, Katherine
Nowadays, Software-in-the-Loop (SIL) represents a crucial methodology in the development and validation of control systems, particularly in sectors such as automotive, marine, and aerospace. It involves creating a virtual representation of a real environment with varying levels of accuracy. Using SIL techniques, engineers can develop and test software in the early stages of the development cycle, reducing overall time-to-market and costs. Typically, to simulate complex control systems, a primary tool is used to manage and integrate an entire application-specific environment composed of application software, plants, sensors and actuators, and communication protocols. Although several commercial solutions are currently available on the market to support SIL activities, Dumarey Softronix wanted to explore the possibility of developing an in-house software tool to leverage the benefits of SIL. This paper provides a high-level overview of the main steps involved in developing a complete SIL
Mancuso, ClaudioTesconi, CristianAutieri, Fabio
The rapid evolution of electric vehicles (EVs) necessitates advanced electronic control units (ECUs) for enhanced safety, monitoring, and performance. This study introduces an innovative ECU system designed with a modular architecture, incorporating real-time monitoring, cloud connectivity, and crash sensing. The methodology includes cost-effective design strategies, integrating STM32 controllers, CAN bus systems, and widely available sensors for motor RPM and temperature monitoring. Key findings demonstrate that the proposed ECU system improves data reliability, enhances vehicle safety through crash response systems, and enables predictive maintenance via cloud connectivity. This scalable and affordable ECU is adaptable to a broad range of EV models.
Padma Priya, S.R.Santhipkumar, S.Sasipriya, S.Srivisweswara, M.S.
This SAE Aerospace Recommended Practice (ARP) describes terminology specific to unmanned systems (UMSs) and definitions for those terms. It focuses only on terms used exclusively for the development, testing, and other activities regarding UMSs. It further focuses on the autonomy and performance measures aspects of UMSs and is based on the participants’ earlier work, the Autonomy Levels for Unmanned Systems (ALFUS) Framework, published as NIST Special Publication 1011-I-2.0 and NIST Special Publication 1011-II-1.0. This Practice also reflects the collaboration results with AIR5665. Terms that are used in the community but can be understood with common dictionary definitions are not included in this document. Further efforts to expand the scope of the terminology are being planned.
AS-4JAUS Joint Architecture for Unmanned Systems Committee
Researchers have created a 98-milligram sensor system — about one tenth the weight of a jellybean or less than one-hundredth of an ounce — that can ride aboard a small drone or an insect, such as a moth, until it gets to its destination. Then, when a researcher sends a Bluetooth command, the sensor is released from its perch and can fall up to 72 feet — from about the sixth floor of a building — and land without breaking. Once on the ground, the sensor can collect data, such as temperature or humidity, for almost three years.
Increasing digitalization of the aircraft cabin, driven by the need for improved operational efficiency and an enhanced passenger experience, has led to the development of data-driven services. In order to implement these services, information from different systems is often required, which leads to a multi-system architecture. When designing a network that interconnects these systems, it is important to consider the heterogeneous device and supplier landscape as well as variations in the network architecture resulting from airline customization or cabin upgrades. The novel ARINC 853 Cabin Secure Media-Independent Messaging (CSMIM) standard addresses this challenge by specifying a communication protocol that relies on a data model to encode provided and consumed information. This paper presents an approach to integrate CSMIM-specific communication concepts into a Model-Based Systems Engineering (MBSE) framework using the Systems Modeling Language (SysML). This enables a streamlined
Giertzsch, FabianBlecken, MarvinGod, Ralf
IEEE-1394b, Interface Requirements for Military and Aerospace Vehicle Applications, establishes the requirements for the use of IEEE Std 1394™-2008 as a data bus network in military and aerospace vehicles. The portion of IEEE Std 1394™-2008 standard used by AS5643 is referred to as IEEE-1394 Beta (formerly referred to as IEEE-1394b.) It defines the concept of operations and information flow on the network. As discussed in 1.4, this specification contains extensions/restrictions to “off-the-shelf” IEEE-1394 standards and assumes the reader already has a working knowledge of IEEE-1394. This document is referred to as the “base” specification, containing the generic requirements that specify data bus characteristics, data formats, and node operation. It is important to note that this specification is not designed to be stand-alone; several requirements leave the details to the implementations and delegate the actual implementation to be specified by the network architect/integrator for a
AS-1A Avionic Networks Committee
This standard establishes the design requirements for a fiber optic serial interconnect protocol, topology, and media. The application target for this standard is the interconnection of multiple aerospace sensors, processing resources, bulk storage resources and communications resources onboard aerospace platforms. The standard is for subsystem interconnection, as opposed to intra-backplane connection.
AS-1A Avionic Networks Committee
This Handbook is intended to accompany or incorporate AS5643, AS5643/1, AS5657, AS5706, and ARD5708. In addition, full understanding of this Handbook also requires knowledge of IEEE-1394-1995, IEEE-1394a, and IEEE-1394b standards. This Handbook contains detailed explanations and architecture analysis on AS5643, bus timing and scheduling considerations, system redundancy design considerations, suggestions on AS5643-based system configurations, cable selection guidance, and lessons learned on failure modes.
AS-1A Avionic Networks Committee
This document defines a set of standard application layer interfaces called JAUS Unmanned Ground Vehicle Services. JAUS Services provide the means for software entities in an unmanned system or system of unmanned systems to communicate and coordinate their activities. The Unmanned Ground Vehicle Services represent the platform-specific capabilities commonly found in UGVs, and augment the Mobilty Service Set [AS6009] which is platform-agnostic. At present ten (10) services are defined in this document. These services are categorized as:
AS-4JAUS Joint Architecture for Unmanned Systems Committee
This document defines a set of standard application layer interfaces called JAUS Autonomous Capabilities Services. JAUS Services provide the means for software entities in an unmanned system or system of unmanned systems to communicate and coordinate their activities. The Autonomous Behaviors Services represent the platform-independent capabilities commonly found in platforms across domains, including air, maritime, and ground. At present five (5) services are defined in this document. These services are: Comms Lost Policy Manager: Detect and recover from loss of communications with a control station Retrotraverse: Return along a path previously traveled Self-Righting: Attempt to recover from a tip over condition Cost Map 2D: Provides information about the current operating environment of the platform Path Reporter: Provides information about the previous or future planned path of the platform
AS-4JAUS Joint Architecture for Unmanned Systems Committee
The SAE Aerospace Information Report AIR5315 – Generic Open Architecture (GOA) defines “a framework to identify interface classes for applying open systems to the design of a specific hardware/software system.” [sae] JAUS Service (Interface) Definition Language defines an XML schema for the interface definition of services at the Class 4L, or Application Layer, and Class 3L, or System Services Layer, of the Generic Open Architecture stack (see Figure 1). The specification of JAUS services shall be defined according to the JAUS Service (Interface) Definition Language document.
AS-4JAUS Joint Architecture for Unmanned Systems Committee
This document defines a set of standard application layer interfaces called JAUS Manipulator Services. JAUS Services provide the means for software entities in an unmanned system or system of unmanned systems to communicate and coordinate their activities. The Manipulator Services represent platform-independent capabilities commonly found across domains and types of unmanned systems. At present, twenty-five (25) services are defined in this document. These services are categorized as: Low Level Manipulator Control Services – The one service in this category allows for low-level command of the manipulator joint actuation efforts. This is an open-loop command that could be used in a simple tele-operation scenario. The service in this category is listed as follows: Primitive Manipulator Service Manipulator Sensor Services – These services, when queried, return instantaneous sensor data. Three services are defined that return respectively joint positions, joint velocities, and joint
AS-4JAUS Joint Architecture for Unmanned Systems Committee
SAE J1939 is a CAN-based standard used for connecting various ECUs together within a vehicle. There are also some related protocols sharing many of the features of SAE J1939 across other industries including ISO11783, RVC and NMEA 2000. The standard has enabled the easy integration of electronic devices into a vehicle. However, as with all CAN-based protocols, several vulnerabilities to cyberattacks have been identified and are discussed in this paper. Many are at the CAN-level, whilst others are in common with those protocols from the SAE J1939 family of protocols. This paper reviews the known vulnerabilities that have been identified with the SAE J1939 protocol at CAN and J1939-levels, along with proposed mitigation strategies that can be implemented in software. At the CAN-level, the weaknesses include ways to spoof the network by exploiting parts of the protocol. Denial of Service is also possible at the CAN-level. At the SAE J1939-level, weaknesses include Denial of Service type
Quigley, Christopher
The added connectivity and transmission of personal and payment information in electric vehicle (EV) charging technology creates larger attack surfaces and incentives for malicious hackers to act. As EV charging stations are a major and direct user interface in the charging infrastructure, ensuring cybersecurity of the personal and private data transmitted to and from chargers is a key component to the overall security. Researchers at Southwest Research Institute® (SwRI®) evaluated the security of direct current fast charging (DCFC) EV supply equipment (EVSE). Identified vulnerabilities included values such as the MAC addresses of both the EV and EVSE, either sent in plaintext or encrypted with a known algorithm. These values allowed for reprogramming of non-volatile memory of power-line communication (PLC) devices as well as the EV’s parameter information block (PIB). Discovering these values allowed the researchers to access the IPv6 layer on the connection between the EV and EVSE
Kozan, Katherine
The increasing complexity of software-defined vehicles (SDVs) necessitates robust and secure communication protocols to protect against cyber threats. This paper explores the utilization of Generative Adversarial Networks (GANs) to enhance the security of communication protocols in SDVs. GANs, consisting of a generator and a discriminator network, are employed to create and evaluate secure communication sequences, ensuring that unauthorized access and potential attacks are effectively mitigated. In this study, we develop a GAN-based framework that generates secure communication protocols tailored for the dynamic environment of SDVs. The generator is trained to produce communication sequences that are indistinguishable from authentic, secure sequences, while the discriminator is tasked with identifying any anomalies or potential vulnerabilities. By iteratively improving both networks, the framework learns to produce highly secure and resilient communication protocols. The performance of
Namburi, Venkata Lakshmi
This paper describes a novel invention which is an Intrusion Detection System based on fingerprints of the CAN bus analogue features. Clusters of CAN message analogue signatures can be associated with each ECU on the network. During a learning mode of operation, fingerprints can be learnt with the prior knowledge of which CAN identifier should be transmitted by each ECU. During normal operation, if the fingerprint of analogue features of a particular CAN identifier does not match the one that was learnt then there is a strong possibility that this particular CAN identifier’s message is symptomatic of a problem. It could be that the message has been sent by either an intruder ECU or an existing ECU has been hacked to send the message. In this case an intruder can be defined as a device that has been added to the CAN bus OR a device that has been hacked/manipulated to send CAN messages that it was not designed to (i.e. could be originally transmitted by another device). It could also be
Quigley, ChristopherCharles, David
It is becoming increasingly common for bicyclists to record their rides using specialized bicycle computers and watches, the majority of which save the data they collect using the Flexible and Interoperable Data Transfer (.fit) Protocol. The contents of .fit files are stored in binary and thus not readily accessible to users, so the purpose of this paper is to demonstrate the differences induced by several common methods of analyzing .fit files. We used a Garmin Edge 830 bicycle computer with and without a wireless wheel speed sensor to record naturalistic ride data at 1 Hz. The .fit files were downloaded directly from the computer, uploaded to the chosen test platforms - Strava, Garmin Connect, and GoldenCheetah - and then exported to .gpx, .tcx and .csv formats. Those same .fit files were also parsed directly to .csv using the Garmin FIT Software Developer Kit (SDK) FitCSVTool utility. The data in those .csv files (henceforth referred to as “SDK data”) were then either directly
Sweet, DavidBretting, Gerald
In the automotive industry, the zonal architecture is a design approach that organizes a vehicle’s electronic and communication systems into specific zones. These zones group components based on their function and physical location, enabling more efficient integration and simplified communication between the vehicle’s various systems. An important aspect of this architecture is the implementation of the Controller Area Network (CAN) protocol. CAN is a serial communication protocol developed specifically for automotive applications, allowing various electronic devices within a vehicle, such as sensors, actuators, and Electronic Control Units (ECUs), to communicate with each other quickly and reliably, sharing information essential for the vehicle’s operation. However, due to its limitations, there is a need for more efficient protocols like Automotive Ethernet and Controller Area Network Flexible (CAN FD), which allow for higher transmission rates and larger data packets. To centralize
Santos, Felipe CarvalhoSilva, Antônio LucasPaterlini, BrunoPedroso, Henrique GomesAlves, Joyce MartinsMilani, Pedro Henrique PiresKlepa, Rogério Bonette
Modern vehicles are increasingly integrating electronic control units (ECUs), enhancing their intelligence but also amplifying potential security threats. Vehicle network security testing is crucial for ensuring the safety of passengers and vehicles. ECUs communicate via the in-vehicle network, adhering to the Controller Area Network (CAN) bus protocol. Due to its exposed interfaces, lack of data encryption, and absence of identity authentication, the CAN network is susceptible to exploitation by attackers. Fuzz testing is a critical technique for uncovering vulnerabilities in CAN network. However, existing fuzz testing methods primarily generate message randomly, lacking learning from the data, which results in numerous ineffective test cases, affecting the efficiency of fuzz testing. To improve the effectiveness and specificity of testing, understanding of the CAN message format is essential. However, the communication matrix of CAN messages is proprietary to the Original Equipment
Shen, LinXiu, JiapengZhang, ZhuopengYang, Zhengqiu
The term Software-Defined Vehicle (SDV) describes the vision of software-driven automotive development, where new features, such as improved autonomous driving, are added through software updates. Groups like SOAFEE advocate cloud-native approaches – i.e., service-oriented architectures and distributed workloads – in vehicles. However, monitoring and diagnosing such vehicle architectures remain largely unaddressed. ASAM’s SOVD API (ISO 17978) fills this gap by providing a foundation for diagnosing vehicles with service-oriented architectures and connected vehicles based on high-performance computing units (HPCs). For service-oriented architectures, aspects like the execution environment, service orchestration, functionalities, dependencies, and execution times must be diagnosable. Since SDVs depend on cloud services, diagnostic functionality must extend beyond the vehicle to include the cloud for identifying the root cause of a malfunction. Due to SDVs’ dynamic nature, vehicle systems
Boehlen, BorisFischer, DianaWang, Jue
This SAE Technical Information Report (TIR) establishes the instructions for the documents required for the variety of potential functions for PEV communications, energy transfer options, interoperability, and security. This includes the history, current status, and future plans for migrating through these documents created in the Hybrid Communication and Interoperability Task Force, based on functional objective (e.g., [1] If I want to do V2G with an off-board inverter, what documents and items within them do I need, [2] What do we intend for V3 of SAE J2953, …).
Hybrid - EV Committee
In an era where automotive technology is rapidly advancing towards autonomy and connectivity, the significance of Ethernet in ensuring automotive cybersecurity cannot be overstated. As vehicles increasingly rely on high-speed communication networks like Ethernet, the seamless exchange of information between various vehicle components becomes paramount. This paper introduces a pioneering approach to fortifying automotive security through the development of an Ethernet-Based Intrusion Detection System (IDS) tailored for zonal architecture. Ethernet serves as the backbone for critical automotive applications such as advanced driver-assistance systems (ADAS), infotainment systems, and vehicle-to-everything (V2X) communication, necessitating high-bandwidth communication channels to support real-time data transmission. Additionally, the transition from traditional domain-based architectures to zonal architectures underscores Ethernet's role in facilitating efficient communication between
Appajosyula, kalyanSaiVitalVamsi
Items per page:
1 – 50 of 981