2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) 2018
DOI: 10.1109/icce-berlin.2018.8576241
|View full text |Cite
|
Sign up to set email alerts
|

IoT-based Software Update Proposal for Next Generation Automotive Middleware Stacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…However, the purpose of their work was to give an indication of feasibility of the current IoT technology in the automotive industry. Aiming to update the software based on IoT solutions, Stevan Stević et al [ 31 ] present their approach of integrating IoT technologies with the Adaptive AUTOSAR platform. The solution consists of a software architecture upgrade, a cloud connectivity based on IoT, and extensions of the Adaptive AUTOSAR stack.…”
Section: Previous Workmentioning
confidence: 99%
“…However, the purpose of their work was to give an indication of feasibility of the current IoT technology in the automotive industry. Aiming to update the software based on IoT solutions, Stevan Stević et al [ 31 ] present their approach of integrating IoT technologies with the Adaptive AUTOSAR platform. The solution consists of a software architecture upgrade, a cloud connectivity based on IoT, and extensions of the Adaptive AUTOSAR stack.…”
Section: Previous Workmentioning
confidence: 99%
“…In contrast, the update framework (TUF) provides secure SW storage (Stević et al, 2018). Signed metadata are used to verify the hash of the SW downloaded.…”
Section: Service Integritymentioning
confidence: 99%
“…The e OTA update transfer could also be categorized under V2I communication since the update is generated and transferred from common infrastructure to individual vehicles. The formulated custom modes from cloud analytics are transmitted to vehicles utilized by our ADAS by eradicating the need for additional hardware [ 16 , 17 ]. Utilizing these kinds of software-centric systems offers efficient ADAS even for low-cost vehicles in addition to the sophisticated luxury class of the vehicles which improves safety and reaches the industry’s goal for zero vehicle-related accidents, fatalities, and obsolete comfort for drivers.…”
Section: Introductionmentioning
confidence: 99%
“…As advancement in the network, consensus-based vehicle control algorithms [ 17 ] and CAN-based communication for navigation assistance, electronic payment, and traffic updates [ 29 ] were also proposed. While using such modern sensors and communication protocols, we might be prone to vulnerabilities such as Sybil attacks, blackhole attacks, wormhole attacks, grey hole attacks, DoS attacks, DDoS attacks, GPS spoofing, jamming, malware attacks in the cyber aspect and spoofing, jamming, acoustic quieting, relay attack in sensors and cameras [ 30 ].…”
Section: Introductionmentioning
confidence: 99%