Kukkala, 2022 - Google Patents
Robust and secure resource management for automotive cyber-physical systemsKukkala, 2022
View PDF- Document ID
- 1211489328597634522
- Author
- Kukkala V
- Publication year
External Links
Snippet
Modern vehicles are examples of complex cyber-physical systems with tens to hundreds of interconnected Electronic Control Units (ECUs) that manage various vehicular subsystems. With the shift towards autonomous driving, emerging vehicles are being characterized by an …
- 238000000034 method 0 abstract description 117
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
- G06F9/4887—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues involving deadlines, e.g. rate based, periodic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bello et al. | Recent advances and trends in on-board embedded and networked automotive systems | |
| Tariq et al. | CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network | |
| Lin et al. | Security-aware design methodology and optimization for automotive systems | |
| Kukkala et al. | Roadmap for cybersecurity in autonomous vehicles | |
| Boddupalli et al. | Resilient cooperative adaptive cruise control for autonomous vehicles using machine learning | |
| Waszecki et al. | Automotive electrical and electronic architecture security via distributed in-vehicle traffic monitoring | |
| Xie et al. | Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: state‐of‐the‐art and future challenges | |
| Nagarajan et al. | Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey | |
| Pellizzoni et al. | A generalized model for preventing information leakage in hard real-time systems | |
| Othmane et al. | A survey of security and privacy in connected vehicles | |
| Lukasiewycz et al. | Security-aware obfuscated priority assignment for automotive CAN platforms | |
| US9106611B2 (en) | Method for efficient message verification on resource-constrained platforms for real-time tracking applications | |
| Kukkala et al. | SEDAN: Security-aware design of time-critical automotive networks | |
| Zalman et al. | A secure but still safe and low cost automotive communication technique | |
| Xie et al. | Security enhancement for real-time parallel in-vehicle applications by CAN FD message authentication | |
| Soudbakhsh et al. | Co-design of arbitrated network control systems with overrun strategies | |
| Zheng et al. | CONVINCE: A cross-layer modeling, exploration and validation framework for next-generation connected vehicles | |
| Jiang et al. | Optimization of message encryption for distributed embedded systems with real-time constraints | |
| Kukkala et al. | JAMS-SG: a framework for jitter-aware message scheduling for time-triggered automotive networks | |
| Toghuj et al. | Automotive Ethernet architecture and security: challenges and technologies. | |
| Mukherjee | SAE J1939-specific cyber security for medium and heavy-duty vehicles | |
| Chang et al. | Intelligent and connected cyber-physical systems: A perspective from connected autonomous vehicles | |
| Olufowobi et al. | Work-in-progress: Real-time modeling for intrusion detection in automotive controller area network | |
| Kukkala | Robust and secure resource management for automotive cyber-physical systems | |
| Püllen | Holistic Security Engineering for Software-Defined Vehicles |