[go: up one dir, main page]

Kukkala, 2022 - Google Patents

Robust and secure resource management for automotive cyber-physical systems

Kukkala, 2022

View PDF
Document ID
1211489328597634522
Author
Kukkala V
Publication year

External Links

Snippet

Modern vehicles are examples of complex cyber-physical systems with tens to hundreds of interconnected Electronic Control Units (ECUs) that manage various vehicular subsystems. With the shift towards autonomous driving, emerging vehicles are being characterized by an …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • G06F9/4887Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues involving deadlines, e.g. rate based, periodic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40215Controller Area Network CAN

Similar Documents

Publication Publication Date Title
Bello et al. Recent advances and trends in on-board embedded and networked automotive systems
Tariq et al. CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network
Lin et al. Security-aware design methodology and optimization for automotive systems
Kukkala et al. Roadmap for cybersecurity in autonomous vehicles
Boddupalli et al. Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning
Waszecki et al. Automotive electrical and electronic architecture security via distributed in-vehicle traffic monitoring
Xie et al. Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: state‐of‐the‐art and future challenges
Nagarajan et al. Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Pellizzoni et al. A generalized model for preventing information leakage in hard real-time systems
Othmane et al. A survey of security and privacy in connected vehicles
Lukasiewycz et al. Security-aware obfuscated priority assignment for automotive CAN platforms
US9106611B2 (en) Method for efficient message verification on resource-constrained platforms for real-time tracking applications
Kukkala et al. SEDAN: Security-aware design of time-critical automotive networks
Zalman et al. A secure but still safe and low cost automotive communication technique
Xie et al. Security enhancement for real-time parallel in-vehicle applications by CAN FD message authentication
Soudbakhsh et al. Co-design of arbitrated network control systems with overrun strategies
Zheng et al. CONVINCE: A cross-layer modeling, exploration and validation framework for next-generation connected vehicles
Jiang et al. Optimization of message encryption for distributed embedded systems with real-time constraints
Kukkala et al. JAMS-SG: a framework for jitter-aware message scheduling for time-triggered automotive networks
Toghuj et al. Automotive Ethernet architecture and security: challenges and technologies.
Mukherjee SAE J1939-specific cyber security for medium and heavy-duty vehicles
Chang et al. Intelligent and connected cyber-physical systems: A perspective from connected autonomous vehicles
Olufowobi et al. Work-in-progress: Real-time modeling for intrusion detection in automotive controller area network
Kukkala Robust and secure resource management for automotive cyber-physical systems
Püllen Holistic Security Engineering for Software-Defined Vehicles