Refine Your Search

Search Results

Author:
Viewing 1 to 8 of 8
Technical Paper

A Case Study in Remote Connectivity to Automotive Communication Networks

2001-03-05
2001-01-0069
This paper describes a case study led by Science Applications International Corporation (SAIC) of Dayton, OH USA and Dearborn Group Inc. to prove the feasibility of employing Telematics technologies to the vehicle test and measurement industry. Many test functions can be automated through the use of secure wireless technologies. For example, vehicle data can be dynamically monitored on the vehicle and data meeting pre-determined criteria could be downloaded via the wireless communications center. Additionally, central, real-time wireless monitoring of vehicle fleets provides the vehicle fleet manager with the ability to manage multiple tests simultaneously, thus improving efficiencies and potentially reducing manpower costs and compressing test schedules.
Technical Paper

A Comparison of Physical Layer Devices for Class B and Class C Multiplex Systems. (Using Recommended Practice SAE J1699 for Testing Physical Layer Devices.)

1994-03-01
940138
The objective of this paper is to suggest the advantages of using SAE J1699 tests and methods as a basis for characterization of physical layer devices. This paper will examine some of the commercially available physical layer IC's that could be used to drive Class B and C multiplex networks. Device characteristics such as propagation delays, current consumption, and common mode will be presented. These characteristics could be used to test device performance in Class B and Class C multiplex applications. Also presented will be an introduction to the new SAE J1699 Recommended Practice for multiplex device testing and how J1699 might be used for physical layer device testing.
Technical Paper

Class C Communications Protocol Proposal for Off-Road Vehicles

1993-03-01
930007
This paper describes the new Recommended Practice SAE J1939 (High Speed Communications Protocol for On-Road Heavy Vehicles) and the development and application of this protocol for off-road vehicles such as agricultural machines and construction equipment. This paper will review the work of ISO committees in the development of an international standard for vehicle high speed communication systems. The proposed use of SAE J1939 and the CAN protocol for Class C (high speed) network communications on Off-Road Vehicles is also reviewed.
Technical Paper

Cybersecurity Rating Framework and Its Application to J1939-91C Standard

2024-04-09
2024-01-2803
Connectivity is becoming increasingly prevalent in the automotive industry, and with that comes a growing awareness among consumers and regulators of the potential risks. Present-day automobiles are becoming smart and more software-driven. Conversely, every line of code equals a possible threat to the vehicle, the passenger, or the original equipment manufacturer (OEM). To hit the brakes on the alarming increase in cyber threats, government bodies have introduced standards and regulations globally. The United Nations Economic Commission for Europe (UNECE) WP.29 R155 & R156 regulations and International Organization for Standardization/Society of Automotive Engineers (ISO/SAE) 21434 standards are becoming mandatory for all OEMs and are designed to ensure that vehicle functionalities work as intended and are built to mitigate safety risks.
Technical Paper

Evaluation of Vehicle System Performance of an SAE J1939-91C Network Security Implementation

2023-04-11
2023-01-0041
CAN bus network proved to be efficient and dynamic for small compact cars as well as heavy-duty vehicles (HDV). However, HDVs are more susceptible to malicious attacks due to lack of security in their intra-vehicle communication protocols. SAE proposed a new standard named J1939-91C for CAN-FD networks which provides methods for establishing trust and securing mutual messages with optional encryption. J1939-91C ensures message authenticity, integrity, and confidentiality by implementing complex cryptographic operations including hash functions and random key generation. In this paper, the three main phases of J1939-91C, i.e., Network Formation, Rekeying, and Message Exchange, are simulated and tested on Electronic Control Units (ECUs) supporting CAN-FD network. Numerous test vectors were generated and validated to support SAE J1939-91C. The mentioned vectors were produced by simulating different encryption and hashing algorithms with variable message and key lengths.
Technical Paper

Securing J1939 Communications Using Strong Encryption with FIPS 140-2

2017-03-28
2017-01-0020
Since 2001, all sensitive information of U.S. Federal Agencies has been protected by strong encryption mandated by the Federal Information Processing Standards (FIPS) 140-2 Security Requirements. The requirements specify a formal certification process. The process ensures that validated encryption modules have implemented the standard, and have passed a rigorous testing and review processes. Today, this same strong security protection has become possible for vehicle networks using modern, cost-effective encryption in hardware. This paper introduces the motivation and context for the encryption diagnostics security in terms of all vehicles in general, not just trucks which use SAE J1939 communications. Several practical scenarios for using such encryption hardware and the advantages of using hardware compared to software private-key encryption and public-key encryption are described.
Technical Paper

Test Method for the SAE J3138 Automotive Cyber Security Standard

2020-04-14
2020-01-0142
This paper will provide an Overview of Automotive Cyber Security Standards related to the Vehicle OBD-II Data Link. The OBD-II Connector Attack Tree is described with respect to the SAE J3138 requirements for Intrusive vs. non-Intrusive Services. A proposed test method for SAE J3138 is described including hardware and software scripting. Finally, example test results are reviewed and compared with a potential threat boundary.
Technical Paper

Vehicle Cyber Engineering (VCE) Testbed with CLaaS (Cyber-Security Labs as a Service)

2024-04-09
2024-01-2796
The University of Detroit Mercy Vehicle Cyber Engineering (VCE) Laboratory together with The University of Arizona is supporting Secure Vehicle Embedded Systems research work and course projects. The University of Detroit Mercy VCE Laboratory has established several testbeds to cover experimental techniques to ensure the security of an embedded design that includes: data isolation, memory protection, virtual memory, secure scheduling, access control and capabilities, hypervisors and system virtualization, input/output virtualization, embedded cryptography implementation, authentication and access control, hacking techniques, malware, trusted computing, intrusion detection systems, cryptography, programming security and secure software/firmware updates.
X