Browse Topic: Communication protocols

Items (917)
In an era where automotive technology is rapidly advancing towards autonomy and connectivity, the significance of Ethernet in ensuring automotive cybersecurity cannot be overstated. As vehicles increasingly rely on high-speed communication networks like Ethernet, the seamless exchange of information between various vehicle components becomes paramount. This paper introduces a pioneering approach to fortifying automotive security through the development of an Ethernet-Based Intrusion Detection System (IDS) tailored for zonal architecture. Ethernet serves as the backbone for critical automotive applications such as advanced driver-assistance systems (ADAS), infotainment systems, and vehicle-to-everything (V2X) communication, necessitating high-bandwidth communication channels to support real-time data transmission. Additionally, the transition from traditional domain-based architectures to zonal architectures underscores Ethernet's role in facilitating efficient communication between
Appajosyula, kalyanSaiVitalVamsi
ABSTRACT A simulation capable of modeling grid-tied electrical systems, vehicle-to-grid (V2G) and vehicle-to-vehicle(V2V) resource sharing was developed within the MATLAB/Simulink environment. Using the steady state admittance matrix approach, the unknown currents and voltages within the network are determined at each time step. This eliminates the need for states associated with the distributed system. Each vehicle has two dynamic states: (1) stored energy and (2) fuel consumed while the generators have only a single fuel consumed state. One of its potential uses is to assess the sensitivity of fuel consumption with respect to the control system parameters used to maintain a vehicle-centric bus voltage under dynamic loading conditions
Jane, Robert S.Parker, Gordon G.Weaver, Wayne W.Goldsmith, Steven Y.
ABSTRACT Modern ground vehicles rely on Controller Area Network (CAN) bus for communication between Electronic Control Units (ECUs) as a vital component to connect sensors and actuators together in a mission-critical distributed real-time vehicle control system. CAN is well-suited to this task and over the more than three decades since its inception it has become a proven and ubiquitous technology. But its age means that it was not designed for modern security threats of local and remote attacks and special techniques must be deployed to protect CAN. This paper provides a simple taxonomy of attacks on CAN, including how an attack accesses a CAN bus, and discusses four techniques used to defend against these attacks. Citation: K Tindell, “Defending In-vehicle CAN Buses From Attacks,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022
Tindell, Kenneth
ABSTRACT This paper describes the strategies and challenges involved to secure vehicles which use automotive Ethernet-based networks. Since the early 1990’s, the Controller Area Network (CAN) bus has been the standard in automotive networking systems. However, automotive Ethernet is becoming more common in recent years and is considered the future in automotive networking. This new technology has unique advantages over traditional CAN bus networks (e.g. higher bandwidth that can support hashing and encryption), and it still requires additional security measures such as monitoring and detection of anomalies to better secure the vehicle. Southwest Research Institute (SwRI) has previously developed a CAN-only intrusion detection system (IDS) which protects a vehicle’s CAN bus by actively monitoring traffic and flagging messages that are identified as anomalies. SwRI successfully implemented the ability to read, train, and detect on automotive Ethernet data in the IDS. The integration of
Moldenhauer, PeterEsquivel, Jonathan
ABSTRACT Predictive analysis of vehicle electrical systems is achievable by combining condition based maintenance (CBM) techniques and testing for statistical significance (TSS). When paired together, these two fundamentally sound sciences quantify the state of health (SOH) for batteries, alternators, starters, and electrical systems. The use of a communication protocol such as SAE J1939 allows for scheduling maintenance based on condition and not a traditional time schedule
Rini, GuyZachos, Mark
ABSTRACT This paper discusses how programs can leverage VICTORY architecture and specifications in order to achieve interoperability between electronics systems integrated with ground vehicles. It explains the contents of the VICTORY architecture, and the concept of compliance with the VICTORY system and component type specifications. It suggests a model for Army ground vehicle programs to utilize the VICTORY architecture and specifications, and a process called guided self-verification to test components for compliance with VICTORY specifications
Moore, Michael S.Price, Jeremy C.Griffith-Boyle, Kay
ABSTRACT The Controller Area Network (CAN) protocol is still a de-facto standard for in-vehicle communication between Electronic Control Units (ECUs). The CAN protocol lacks basic security features such as absence of sender node information, absence of authentications mechanism and the plug and play nature of the network. The payload in a CAN data packet is very small i.e. 8 bytes, therefore, implementation of cryptographic solutions for data integrity verification is not feasible. Various methods have been proposed for ECU identification, one of the methods is clock intrusion detection system (CIDS) [14]. The proposed method is based on authenticating the message sender by estimating the unique characteristics of the clock crystal. In an asynchronous network, the clocking information in a transmitted payload is entirely dependent upon the crystal which invokes the clock. These unique characteristics exists because of the asymmetry in the microstructure of the material. The challenge
Tayyab, MuhammadHafeez, AzeemMalik, Hafiz
ABSTRACT With recent advancements in the automotive world and the introductions of autonomous vehicles, automotive cybersecurity has become a main and primary issue for every automaker. In order to come up with measures to detect and protect against malicious attacks, intrusion detection systems (IDS) are commonly used. These systems identify attacks while comparing normal behavior with abnormalities. In this paper, we propose a novel, two-stage IDS based on deep-learning and rule-based systems. The objective of this IDS is to detect malicious attacks and ensure CAN security in real time. Deep Learning has already been used in CAN IDS and is already proven to be a successful algorithm when it comes to extensive datasets but comes with the cost of high computational requirements. The novelty of this paper is to use Deep Learning to achieve high predictability results while keeping low computational requirements by offsetting it with rule-based systems. In addition, we examine the
Zhang, LinxiKaja, NevrusShi, LyndonMa, Di
ABSTRACT This paper describes strategies to secure military ground vehicles by using digital fingerprinting, detection algorithms, and bus segmentation to identify and remove anomalous messages from the Controller Area Network (CAN) bus. Modern automotive buses were designed for reliability rather than security. This lack of security means that any node on the bus can transmit a message to any other node, and the receiver cannot verify the sender or that the message is unaltered. The intrusion defense system (IDS) protects the bus by actively monitoring traffic on all connected busses and removing messages identified as anomalies. Digital fingerprinting combined with various detection algorithms identifies these anomalies while bus segmentation simultaneously defends the CAN bus by removing anomalous messages. Citation: J. Wolford, C. Westrick, P. Moldenhauer, “Cyberattack Defense Through Digital Fingerprinting, Detection Algorithms, and Bus Segmentation in Ground Vehicles”, In
Wolford, JonathanWestrick, CourtneyMoldenhauer, Peter
ABSTRACT This paper focuses on the use of PKI within intra vehicle networks in compliance with the VICTORY specification. It will describe how the use of PKI within vehicle networks can leverage and integrate with the other PKI efforts across the Army to ensure a consistent and interoperable solution. It will also describe some of the challenges with implementing PKI as part of VICTORY and introduce possible solutions to address these challenges
Fedorchak, Bob
ABSTRACT The Vehicular Integration for C4ISR/EW Interoperability (VICTORY) Standard adopts many protocols that are traditionally used for developing enterprise application software deployed on general-purpose or server/workstation based computing platforms. This has led to discussions regarding the suitability of the VICTORY Standard for deployment to embedded and resource-constrained platforms. An independent software implementation of VICTORY core services was developed within the U.S Army Tank and Automotive Research, Development and Engineering Center (TARDEC) VICTORY System Integration Lab (SIL). These services were ported from a general-purpose computing platform to an embedded environment. Test procedures were developed and extensive performance tests were conducted to determine the feasibility of operating in this resource-constrained environment. This paper discusses the development procedures, implementation, test procedures, and performance results
Russell, Mark
ABSTRACT Curtiss-Wright has developed an open-standard approach for real time control over Ethernet, incorporating VICTORY .specifications. The paper presents definitions for Real Time, traditional perceptions of Ethernet for real-time usage, solutions for real time, a comparison to MIL-STD-1553, and suggestions for additional specifications to include in VICTORY
Jedynak, David
ABSTRACT Improved combat and tactical radios along with battle command systems that provide real-time communication and situation awareness information are frequently appliqued into the Army’s ground combat vehicles to support its modernization initiatives. During the integration of these devices within the vehicle it is often the case that the additional components cannot be placed in a readily accessible proximity to the crew, due to the space-constrained interiors as well as the equipment’s expanded SWaP (Space Weight and Power). This paper describes an ongoing effort/project to design and implement a Victory Radio Adapter (VRA) which supports the integration and single point control of multiple radios having different physical and logical interfaces. The VRA will minimize SWaP, cable count and provide a scalable/agnostic combat radio integration environment that allows control using VICTORY compliant messages. This paper further details the Victory Radio Adapter concept along with
Petty, Millard E.Wilson, Chad J.Wong, Michael C.Smith, Michael R.Wright, Ronnie L.
ABSTRACT Electrical power system upgrades needed to fulfill mission objectives for next generation vehicles will require technology advances such as greater power density, increased functionality, and higher operating temperature. To meet these requirements, electrical power demands will exceed the capabilities of currently available low voltage power systems. High Voltage DC (HVDC) systems, e.g., 270 – 800 VDC, are being considered to meet next generation vehicle requirements, but these electrical power systems have the potential for extremely large fault currents in case of electrical equipment failure. Improved battery safety and intelligent Solid State Circuit Breakers (SSCB) and Solid State Power Controllers (SSPC) are needed to improve mission effectiveness, reliability, and personnel safety of next generation military and commercial ground, air, and sea vehicle electrical power systems. In this paper we present three enabling technologies developed by Creare: (1) an intelligent
Pilvelait, BruceCameron, BenRentel, CarlosFogg, DavidFinger, Bill
ABSTRACT Most of the current fielded Unmanned Ground Vehicle (UGV) functionality is dependent on the ability to drive the UGV using tele-operation technology. In addition, a large number of payloads require tele-operation to perform the mission function. Tele-operation technology is dependent on providing the operator streaming video, which is reliant on radio capabilities along with video format, resolution and compression routines. There have been Army efforts to perform real-time network modeling as part of Program Executive Office-Integration (PEO-I). These are primarily related to the passing of C2 tactical information from vehicle to vehicle. Ground Vehicle Robotics (GVR) has funded a ‘proof of principle’ effort that culminated in a demonstration performed in February, 2011. This effort modeled the impact of latency, packet/data loss and distorted signal on streaming video being sent from a virtual UGV to the Operator Control Unit (OCU). These distorted signals, cause loss of
Bounker, PaulHope, KevinKaniarz, JohnBergin, Dennis
ABSTRACT Building embedded systems is nothing like building desktop applications, as the hard real time requirements and relative harshness of the operating environment further constrains design choices to meet real world needs. Those familiar with mainframe or server farm hosted, high volume, wide bandwidth applications know similar harsh computing environments for application development. Given that more man-hours have been devoted to web application development over the past decade than have been devoted to embedded application development, there may be some valuable lessons to be learned that can be adopted by the embedded community for in-vehicle computing. The best web application development teams successfully apply the notions of Representational State Transformation (REST) and Resource Description Framework (RDF) to handle the increasing demands on their sites. We have taken these technologies and applied them to the smaller scale vehicle telematics platforms (PowerPC, ARM
Branigan, JamesCunningham, JohnDempsey, PatrickHackleman, BrettVanderLei, Paul
ABSTRACT A cybersecurity exploit can be crafted to affect the vehicle diagnostic adapter system, which consists of the technician, vehicle diagnostic adapter, device drivers, and maintenance software all working together in a trusting relationship. In this paper, application layer encryption of the SAE J1939 diagnostic traffic between the vehicle diagnostic application and the in-vehicle secure gateway is developed to mitigate the vulnerabilities in potential attack paths. The proposed encryption strategy uses AES-128, which uses 16-byte cipher blocks. The secure connection is established by adjusting the bit rate to over twice the normal speed and packing a single J1939 message into two encrypted sequential CAN frames, The in-vehicle diagnostic gateway employs a hardware security module. A provisioning process is employed wherein the diagnostic application and the hardware security module both generate public-private key pairs. An elliptic curve Diffie-Hellman (ECDH) key exchange then
Daily, Jeremy S.Kulkarni, Prakash
ABSTRACT Curtiss-Wright has developed an open-standard approach to low latency digital video distribution, incorporating VICTORY .specifications and other open standards, including Motion JPEG 2000. The paper presents various application definitions, parameters, and reference architectures, demonstrating the applicability to ground vehicles, and suggesting additional specifications and open standard to include in VICTORY
Jedynak, David
ABSTRACT This paper describes strategies to secure military ground vehicles by using digital fingerprinting, detection algorithms, and bus segmentation to identify and remove anomalous messages from the Controller Area Network (CAN) bus. Modern automotive buses were designed for reliability rather than security. This lack of security means that any node on the bus can transmit a message to any other node, and the receiver cannot verify the sender or that the message is unaltered. The intrusion defense system (IDS) protects the bus by actively monitoring traffic on all connected busses and removing messages identified as anomalies. Digital fingerprinting combined with various detection algorithms identifies these anomalies while bus segmentation simultaneously defends the CAN bus by removing anomalous messages. Citation: J. Wolford, C. Westrick, P. Moldenhauer, “Cyberattack Defense Through Digital Fingerprinting, Detection Algorithms, and Bus Segmentation in Ground Vehicles”, In
Wolford, JonathanWestrick, CourtneyMoldenhauer, Peter
ABSTRACT Over time, the National Institute of Standards and Technology (NIST) has refined the 4Dimension / Real-time Control System (4D/RCS) architecture for use in Unmanned Ground Vehicles (UGVs). This architecture, when applied to a fully autonomous vehicle designed for missions in urban environments, can greatly assist in the process of saving time and lives by creating a more intelligent vehicle that acts in a safer and more efficient manner. Southwest Research Institute (SwRI®) has undertaken the Southwest Safe Transport Initiative (SSTI) aimed at investigating the development and commercialization of vehicle autonomy as well as vehicle-based telemetry systems to improve active safety systems and autonomy. This paper will discuss the implementation of the 4D/RCS architecture to the SSTI autonomous vehicle, a 2006 Ford Explorer
McWilliams, GeorgeBrown, Michael
Abstract Current and future military vehicles will be expected to not only last longer than their predecessors, but also operate with a flexible mission package. These vehicles must be architected for lifecycle multiple upgrades of electronics and general product improvements. The ability to be upgraded and reconfigured for flexible mission profiles compels the vehicle’s architecture be centered around a “data bus” network backbone that facilitates “universal plug and play” of electronic payloads. The vehicle’s over all data stream will consist of at a minimum of voice, video, control and diagnostics. To maintain flexibility as well as to be cost effective in support of the “plug and play concept” for new and upgraded electronic payloads it is a fundamental requirement that every type of current and foreseeable data streams be able to coexist on one single network backbone. Only this architecture will guarantee the most flexible, and scalable reconfiguring for future expansions or
Murphree, JayWeil, RoarkWootton, John R.
ABSTRACT Materials and parts in complex systems, such as ground vehicles, can suffer from fatigue due to use, age and other stresses experienced during service. It is therefore essential to evaluate damage and predict the remaining life, reliability and safety of the vehicle. This paper describes the design of a wireless system for real-time monitoring of ground vehicles using Lamb waves. The proposed approach integrates sensor technology, signal processing and wireless networking into a single solution for online structural health monitoring (SHM). Lamb wave inspection is accomplished by inexpensive piezoelectric transducer patches (PZT), which are surface-mounted on the critical components of the vehicle without interrupting its operation. Lamb wave scattering from damage is obtained by comparing the recorded signal with the healthy sample and then damage-related features are identified using Probability Diagnostic Imaging (PDI). The problem of multiple Lamb wave modes is addressed
Dib, GergesKarpenko, OleksiiKlaser, JacobUdpa, Lalita
ABSTRACT A key objective of the Vehicular Integration for C4ISR/EW Interoperability (VICTORY) Architecture is to use open standards to increase the portability of C4ISR/EW systems and enhance interoperability within military ground vehicles. When possible these technologies are adopted by VICTORY and when existing specifications are inadequate, best-practices are used to develop the necessary adaptations. Many Commercial Off-The-Shelf (COTS) publish/subscribe messaging solutions are available and the Open Management Group (OMG) Data-Distribution Service (DDS) is one such technology that provides open interfaces, open data formats, and open protocols. This paper will discuss the current VICTORY messaging approach and the benefits and disadvantages of using OMG-DDS as a data transport for VICTORY services
Elliott, LeonardWilliams, NikiaSiddapureddy, Venu
ABSTRACT The U.S. Army Tank-Automotive Research, Development and Engineering Center (TARDEC) contracted DornerWorks Ltd. to evaluate Ethernet-based networking protocols for the safety-critical RDECOM Modular Active Protection Systems (MAPS) framework (MAF). The MAF requires a universal and robust high-speed communication network that can transmit heterogeneous data at near gigabit speeds in a deterministic fashion with bounded and predictable latency. The objectives were to evaluate candidate protocols through rigorous stressing scenarios to: 1) assess and estimate upper bound of performance including data throughput and reliability; and, 2) detect and identify causes and conditions of data loss or corruption. We assessed four protocols: SAE AS6802 (TTEthernet; TTE), ARINC664p7 (rate-constrained; RC), COTS UDP integrated with these two protocols (best-effort; BE), and UDP on a COTS network under three levels of network saturation and with varying payload sizes. On an unsaturated
Verbree, David A.Shvartsman, Andrey
ABSTRACT Today’s warfighter relies on Global Positioning System (GPS) technologies for precise positioning and time synchronization. Reliance upon this technology can significantly handicap vehicles in a GPS-denied environment. Given the challenges of urban terrain, heavily-wooded areas, and electronic counter-measures from the United States’ adversaries, there is a strong need to create redundant systems that can operate in lieu of an absent GPS signal. TARDEC VEA created an embedded platform called the “VICTORY PNT Hub”, to help address this GPS-related problem as well as the lack of Assured Position, Navigation, and Time (A-PNT) products and solutions. One of the strengths of the VICTORY PNT Hub lies in the “Time” portion of PNT. This paper describes the architecture of the system that is designed to provide highly-accurate and robust vehicle-wide time synchronization with or without a GPS signal. Additionally, a goal of this research will provide quantitative measurements of time
Russell, Mark
ABSTRACT The advent of both new bidirectional communications capabilities and increasing levels of automation to offload driver workload is requiring the vehicle’s architecture to evolve substantially. Military vehicles of the US Armed Forces are subject to even greater cybersecurity threats. New vehicle hardware includes many sensors, cameras and other systems to capture road, weather and traffic conditions. These systems will be communicating the data both internally and externally from the vehicle. In addition, the vehicles will send and receive data via multiple communications protocols. Each of these communication protocols have unique capabilities and inherent weaknesses with regard to secure communications. With this vehicle evolution, and with the pervasive cyber threats, the vehicle will have to be architected for holistic vehicle cyber situational awareness. The US Army and US Marine Corps need to be fully versed and trained to recognize threats and effectively deal with them
McCormick, Scott J.Farnsworth, Elaina
ABSTRACT This paper describes an approach to secure previously deployed vehicles by using bus monitoring and segmentation to remove malicious messages from the CAN bus. Modern automotive buses were designed for reliability rather than security. This lack of security means that any node on the bus can transmit a message to any other node and the receiver cannot verify the sender or that the message is unaltered. The intrusion detection and prevention system seeks to solve that issue by actively monitoring traffic on all connected busses, alerting an operator when an error is detected and removing flagged messages from the bus. The system will eventually be installed on an Interim Armored Vehicle (IAV) Stryker. Citation: R. Elder, C. Westrick, P. Moldenhauer, “Cyberattack Detection and Bus Segmentation in Ground Vehicles”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 11-13, 2020
Elder, RyanWestrick, CourtneyMoldenhauer, Peter
ABSTRACT The Integrated Bridge currently fielded in the MRAP FoV is a capabilities insertion that provides data integration and visualization services to the vehicle crew. The Integrated Bridge combines displays, data buses, video sensors, switches/routers, radio interfaces, power management components, etc. to provide a unified view as well as a vehicle system control means to its crew members. The Integrated Bridge provides a flexible and modular architecture that can readily be adapted to the variety of Government Furnished Mission Equipment found in the MRAP FoV utilizing developmental hardware and software augmented with VICTORY technology to provide additional standardization and capabilities. This paper describes the continuation and capability extension of the VICTORY Radio Adapter, now called the Integrated Bridge GPIU (General Purpose Interface Unit). Details of the work leading to the fielding of a significantly enhanced version of the GPIU are discussed. GPIU software and
Petty, Millard E.Wilson, Chad J.Wong, Michael C.Smith, Michael R.Wright, Ronnie L.
In recent times there has been an upward trend in “Connected Vehicles”, which has significantly improved not only the driving experience but also the “ownership of the car”. The use of state-of-the-art wireless technologies, such as vehicle-to-everything (V2X) connectivity, is crucial for its dependability and safety. V2X also effectively extends the information flow between the transportation ecosystem pedestrians, public infrastructure (traffic management system) and parking infrastructure, charging and fuel stations, Etc. V2X has a lot of potential to enhance traffic flow, boost traffic safety, and provide drivers and operators with new services. One of the fundamental issues is maintaining trustworthy and quick communication between cars and infrastructure. While establishing stable connectivity, reducing interference, and controlling the fluctuating quality of wireless transmissions, we have to ensure the Security and Privacy of V2I. Since there are multiple and diverse
Sundar, ShyamPundalik, KrantiveerUnnikrishnan, Ushma
For more than a decade, military ground vehicle projects and programs have leveraged ubiquitous communication technologies such as Transmission Control Protocol (TCP), User-Datagram Protocol (UDP), Internet Protocol (IP) and Ethernet. Open standards such as Data Distribution Service (DDS) and the Vehicular Integration for Command, Control, Computers, Communication, Intelligence, Surveillance [C4ISR] Interoperability (VICTORY) typically are built on top of this traditional UDP, TCP/IP, and Ethernet networking suite which has resulted in a dramatic increase in the ability to connect and integrate systems on Army ground vehicles. Systems that are built using this approach enjoy the high-performance, scalability, interoperability and other desired architectural attributes that are foundational to the Modular Open System Approach (MOSA), however for the most part they lack critical characteristics such as synchronization, redundancy, guarantees for bounded latency and jitter; these
Elliott, Leonard
This SAE Standard specifies a message set, and its data frames and data elements, for use by applications that use vehicle-to-everything (V2X) communications systems
V2X Core Technical Committee
Controller area network (CAN) buses, the most common intravehicle network (IVN) standard, have been used for over 30 years despite their simple architecture for connecting electronic control units (ECUs). Weight, maintenance costs, mobility promotion, and wired connection complexity increase with ECU count, especially for autonomous vehicles. This paper aims to enhance wired CAN with wireless features for autonomous vehicles (AVs). The proposed solutions include modifying the traditional ECU architecture to become wireless, implementing a hidden communication environment using a unique complementary code keying (CCK) modulation equation and presenting a strategy for dealing with jamming signals using two channels. The proposed wireless CAN (WCAN) is validated using OPNET analysis for performance and reliability. The results show that the bit error rate (BER) and packet loss of the receiver ECU are stable between different CCK modifications, indicating the robustness of the basic
Ibrahim, QutaibaAli, Zeina
This standard provides a specification of a general misbehavior report format suitable for reporting misbehavior observed by a system running SAE V2X applications, and specific report contents for specific instances of misbehavior. It also provides an overview of the architecture of a system-wide misbehavior management service for the V2X system and positions the misbehavior reporting services within that architecture
V2X Security Technical Committee
This article offers an algorithmic solution for moving a homogeneous platoon of position-controlled vehicles on a curved path with varying speeds and in the presence of communication losses and delays. This article considers a trajectory-based platooning with the leader–following communication topology, where the lead vehicle communicates its reference position and orientation to each autonomous follower vehicle. A follower vehicle stores this communicated information for a specific period as a virtual trail of the lead vehicle starting from the lead vehicle’s initial position and orientation. An algorithm uses this trail to find the follower vehicle’s reference position and orientation on that trail, such that the follower vehicle maintains a constant distance from the lead vehicle. The proposed algorithm helps form a platoon where each vehicle can traverse a curve with varying speeds. In contrast, in the existing literature, most of the solutions for vehicle platooning on a curved
Bhaskar, RintuWahi, PankajPotluri, Ramprasad
With the development of automotive intelligence and networking, the communication architecture of automotive network is evolving toward Ethernet. To improve the real-time performance and reliability of data transmission in traditional Ethernet, time-sensitive network (TSN) has become the development direction of next-generation of automotive networks. The real-time advantage of TSN is based on accurate time synchronization. Therefore, a reliable time synchronization mechanism has become one of the key technologies for the application of automotive Ethernet technology. The protocol used to achieve accurate time synchronization in TSN is IEEE 802.1AS. This protocol defines a time synchronization mechanism suitable for automotive Ethernet. Through the master clock selection algorithm, peer link delay measurement, and clock synchronization and calibration mechanism, the time of each node in the vehicle network is synchronized to a reference master clock. In addition, the protocol clearly
Guo, YiLuo, FengWang, ZitongGan, HaotianWu, MingzhiLiu, Hongqian
This article presents an optimization scheme for LoRaWAN-based electric vehicle batteries monitoring system located in warehouses by utilizing techniques to optimize packet delivery and power settings. Utilizing simulations, we identify that system optimization largely depends on network traffic, influenced by active users and the adoption of the pure ALOHA protocol. We define a reward metric based on the packet delivery rate and power efficiency, aiming for settings that yield the maximum reward. Our approach includes duty cycle management to minimize network traffic and maximize throughput, especially critical when handling urgent data from batteries. Traffic management based on the number of critical batteries in the warehouse also plays a crucial role. Predictive modeling of future traffic further refines power settings for optimal performance. The proposed system, tested through simulations, shows an average of 31% higher reward compared to traditional methods without duty cycle
Tabatowski-Bush, BenjaminXiang, Weidong
The controller area network (CAN) bus, the prevailing standard for in-vehicle networking (IVN), has been used for more than four decades, despite its simple architecture, to establish communications between electronic control units (ECUs). Weight, maintenance overheads, improved flexibility, and wiring complexity escalate as the quantity of ECUs rises, especially for high-demand autonomous vehicles (AVs). The primary objective of this study is to examine and discuss the significant challenges that arise during the migration from a wired CAN to a wireless CAN (WCAN). Suggested remedies include changing the configuration of the conventional ECU, creating a hidden wireless communication domain for each AV, and developing a plan to counteract the jamming signals. The simulation of the proposed WCAN was done using MATLAB and validated using OPNET analysis. The results showed that the packet loss of the eavesdropping electronic control unit ranged from 63% to 100%. Anti-jamming results show
Ali, ZeinaIbrahim, Qutaiba
In the context of urban smart mobility, vehicles have to communicate with each other, surrounding infrastructure, and other traffic participants. By using Vehicle2X communication, it is possible to exchange the vehicles’ position, driving dynamics data, or driving intention. This concept yields the use for cooperative driving in urban environments. Based on current V2X-communication standards, a methodology for cooperative driving of automated vehicles in mixed traffic scenarios is presented. Initially, all communication participants communicate their dynamic data and planned trajectory, based on which a prioritization is calculated. Therefore, a decentralized cooperation algorithm is introduced. The approach of this algorithm is that every traffic scenario is translatable to a directed graph, based in which a solution for the cooperation problem is computed via an optimization algorithm. This solution is either computed decentralized by various traffic participants, who share and
Flormann, MaximilianHenze, Roman
Investigating human driver behavior enhances the acceptance of the autonomous driving and increases road safety in heterogeneous environments with human-operated and autonomous vehicles. The previously established driver fingerprint model, focuses on the classification of driving styles based on CAN bus signals. However, driving styles are inherently complex and influenced by multiple factors, including changing driving environments and driver states. To comprehensively create a driver profile, an in-car measurement system based on the Driver-Driven vehicle-Driving environment (3D) framework is developed. The measurement system records emotional and physiological signals from the driver, including the ECG signal and heart rate. A Raspberry Pi camera is utilized on the dashboard to capture the driver's facial expressions and a trained convolutional neural network (CNN) recognizes emotion. To conduct unobtrusive ECG measurements, an ECG sensor is integrated into the steering wheel
Ji, DejieFlormann, MaximilianWarnecke, Joana M.Henze, RomanDeserno, Thomas M.
Items per page:
1 – 50 of 917