Machine Learning Methods for In-Vehicle Intrusion Detection Roland Rieke

Total Page:16

File Type:pdf, Size:1020Kb

Machine Learning Methods for In-Vehicle Intrusion Detection Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection Roland Rieke ITMO, 2018 Overview Security Challenges for Connected Vehicles Security Measuring Anomaly Detection Machine Learning Methods Data Sets Machine Learning Evaluation Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 2 “If I had asked people what they wanted, they would have said faster horses.” Henry Ford Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 3 Challenge 1898 Faster Horses? 1st international urban-planning conference in NYC 1898 Topic: growing crisis posed by urban horses and their output London 1900: 11.000 cabs + X.000 buses (each 12 horses/day) > 50.000 horses London Times 1894: in 50 years streets buried under 9 feet of manure No solution – the conference was abandoned after 3 days (scheduled 10) Unexpected solution – transition from horses to motor vehicles Source: Stephen Davies, “The Great Horse-Manure Crisis of 1894” Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 4 Challenge 2018 Flying Cars? Transition from relatively isolated autonomous driver-vehicle systems to massively (inter)connected driverless vehicles & global ecosystem. Challenges for Connected Vehicles more efficient (reduce pollution) aware of the situation (but keep privacy) 2018 Problem: Air secure (despite of increased attack surface) Pollution robust against new threats (faking AI or sensors) autonomous (e.g. handle ecosystem failures) Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 5 Connected Cars Vehicular Ad Hoc Network (VANET) / Inter-Vehicle Communication (IVC) VANET: Mobile ad-hoc network whose nodes are vehicles. Modes: Car-2-Car and Car-to-Infrastructure,e.g. Road Side Units Characteristics: self-organising, decentral Applications: Platooning, electronic brake lights, traffic info systems, safety warning Technology: WAVE (Wireless Access in Vehicular Environments);VVLN (Vehicular Visible Light Network) Internet of Vehicles (IoV) IoV: Highly integrated IoT manifestation with respect to vehicular Ecosystem Extend VANET to: Humans (V2H), Sensors (V2S), Clouds (V2C), Internet (V2I) Technology: Mobile Internet connection (GPRS, . ), GPS Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 6 “Once you add a Web browser to a car, it’s over, ” Charlie Miller, Black Hat USA 2014 Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 7 Connectivity Enables Attacks Attacks on safety Attacks on privacy Unauthorized brake Trace vehicle movement Attack emergency call Compromise driver privacy Inflate airbags Manipulate traffic flow Economic Advantage Simulate traffic jam Steal car Force green lights ahead Change driver’s toll bill Manipulate speed limits Manipulate e-charging Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 8 Example: Security Dependencies in Systems of Systems VEHICLE 1 VEHICLE w sense1(✙) send1( ,pos) sensew (data) sendw ( ,pos) gps1(pos) braking1 gpsw (pos) brakingw rec1(data,pos) fwd1(data,pos) recw ( ,pos) fwdw (data,pos) VEHICLE 2 VEHICLE 3 sense2(data) send2(data,pos) sense3(data) send3( ,pos) gps2(pos) braking2 gps3(pos) braking3 rec2( ,pos) fwd2( ,pos) rec3( ,pos) fwd3( ,pos) Authenticityi = Authenticityi−1 ∪ {auth(gpsi (pos),brakingw ,Driverw )} Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 9 Security Risks - Connected Vehicles ECU weaknesses Long-range & IVC network weaknesses concept: post-quantum Firmware over the air (FOTA) production: back-doors Security protections in TCUs deployment: clone Remote diagnostic (and SIEM) generic: crypto library (rand) eCall crash report, emergency warn process: key management T-BOX (crash-resistant telematics) specific: appl. vulnerabilities Remote engine start Sensor & AI (ADAS) weaknesses Sensors vulnerable physical attacks ML is vulnerable to image tampering ML privacy & transparency Adversarial ML In-vehicle network weaknesses Intra-vehicle interface weaknesses No CAN device authentication Protocol vulnerabilities Limited bandwidth on CAN bus Illegal devices access prevents encryption Diagnostic and maintenance Easy external access (OBD) Aftermarket dongles Diagnostic subnetwork Infotainment, mobile phones Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 10 Automotive Threat Intelligence Framework Decide (core) Orient (edge->core) Detect: long/complex phenomena Detect: distributed phenomena Correlate: big data analytics Correlate: agregation, priorisation Diagnosis: risk assessment, threat treatment Observe (edge) Act (core->edge) Detect: simple phenomena, Diagnosis: counter-measures analysis, alerting assessment, policy updates Act: access control, identity & Act: counter-measures deployment authentication, filtering Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 11 Conformance Tracking: Expected vs. observed behavior Cyber-physical observables Event pro- Sensors cessing Observe Conformance tracking Model discovery System behavior: possible sequences of actions. Cyber- physical System systems model Outlier: An obser- Anomaly vation that differs Example: detection so much from other Sensor1: It is dark. observations as to Manipulate Sensor2: The vehicle drives fast. arouse suspicion that Event: Switch light off. it was generated by a Decision different mechanism. Actuators support (Hawkins, 1980) Control Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 12 Anomaly Detection (Behavior-based) Behavior requirements: cyclic messages, protocol flow, process behavior, subsequent payload dependencies. The behavior of a dis- crete system can be formally described by the set of its possible sequences of actions. Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 13 On-board Security Analysis (Observe at the Edge) You can’t defend. You can’t prevent. The only thing you can do is detect and respond. — Bruce Schneier (1) detect & alert specification violation (2) detect & report abnormal activities Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 14 CAN intrusion detection methods Detect specification violations Detect ECU impersonation Formality, Location, Range ECU voltage fingerprinting Sequence (Frequency, Correlation, ECU clock skew fingerprinting Protocol) ECUs check messages with own ID Semantic (Plausibility, Consistency) (parrot defense) remote frame (response time) Detect packet insertions Detect behavior anomalies entropy + state deep learning (e.g. LSTM) time interval OCSVM OCSVM (DoS insert / delete packets) hidden Markov LSTM entropy process mining Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 15 Behavior-based Models Construction of Models ◮ from specifications ◮ from logged behavior without attacks (process mining, OCSVM) ◮ from logged behavior with marked attacks (SVM, neural networks) Monitoring ◮ At operation time, the event stream is compared to the expected behavior (represented by model). ◮ Anomalies indicate possible attacks ◮ Unknown types of attacks can be detected Problems: ◮ Overfitting/Underfitting ◮ False positives ◮ state space explosion (model construction) ◮ insufficient throughput (classification of event stream) Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 16 Process Mining & Synchronization Training set: e1 , e2 , e3 , e4 , e1 , e5 , e6 , e4 Resulting model (Petri net generated by process mining with alpha algorithm): s5 e5 e6 s2 e1 ignore e4 jump s0 s1 s4 s6 e2 e3 s reset 3 Conformance checking: e1, e2 , e6 ignore e6 and continue from s3 reset after e6 and continue from s0 jump to some place reachable by transition e6, e.g. s4 Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 17 (One-Class) Support Vector Machine Classic ◮ Linear classifier ◮ “Max-margin” ◮ Resource efficient One-Class ◮ Novelty/Outlier Detection ◮ Boundary of seen data Computed by: http: //scikit-learn.org/stable/auto_examples/svm/plot_oneclass.html Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 18 Neural Network Input Hidden Hidden Output Layers of Neurons layer layer layer layer Non-linear classifier Itime H1 H1 Many parameters IID O1 Very flexible . Ilen ... Hk Hl IP1 Om . IP8 Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 19 Long Short Term Memory (LSTM) Neural Network Very complex Computationally intensive Models temporal relationships Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 20 Methodology 1 Data Preprocessing 2 Creating Train/Test Split 3 Fit Model using Training-Set 4 Validate Model using Test-Set 5 Visualization 6 Real-time classification of data-stream Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 21 Data Sets ZOE Data Set HCRL Data Sets Collected from Renault Zoe electric car Made available by Hacking and about 10 Minutes; 1.000.000 messages Countermeasure Research Lab 4 Data sets, 3.5 to 4.5 Million Messages DoS, Spoofing/Impersonation (Fuzzy, Gear), and RPM Attacks HCRL: http://ocslab.hksecurity.net/Datasets/CAN-intrusion-dataset Roland Rieke Machine Learning Methods for In-Vehicle Intrusion Detection ITMO’18 22 Attacks in Data Sets ZOE time ID len p1 p2 p3 p4 p5 p6 p7 p8 type 0.0 530 6 254 61 192 108 0 0 117 118 1 0.000206 394 6 255 240 0 6 64 0 117 118 1 HCRL DoS 0.852103 0 8 0
Recommended publications
  • Smart Contracts for Machine-To-Machine Communication: Possibilities and Limitations
    Smart Contracts for Machine-to-Machine Communication: Possibilities and Limitations Yuichi Hanada Luke Hsiao Philip Levis Stanford University Stanford University Stanford University [email protected] [email protected] [email protected] Abstract—Blockchain technologies, such as smart contracts, present a unique interface for machine-to-machine communication that provides a secure, append-only record that can be shared without trust and without a central administrator. We study the possibilities and limitations of using smart contracts for machine-to-machine communication by designing, implementing, and evaluating AGasP, an application for automated gasoline purchases. We find that using smart contracts allows us to directly address the challenges of transparency, longevity, and Figure 1. A traditional IoT application that stores a user’s credit card trust in IoT applications. However, real-world applications using information and is installed in a smart vehicle and smart gasoline pump. smart contracts must address their important trade-offs, such Before refueling, the vehicle and pump communicate directly using short-range as performance, privacy, and the challenge of ensuring they are wireless communication, such as Bluetooth, to identify the vehicle and pump written correctly. involved in the transaction. Then, the credit card stored by the cloud service Index Terms—Internet of Things, IoT, Machine-to-Machine is charged after the user refuels. Note that each piece of the application is Communication, Blockchain, Smart Contracts, Ethereum controlled by a single entity. I. INTRODUCTION centralized entity manages application state and communication protocols—they cannot function without the cloud services of The Internet of Things (IoT) refers broadly to interconnected their vendors [11], [12].
    [Show full text]
  • Fibre Reinforced Plastic Concepts for Structural Chassis Parts
    Transport Research Arena 2014, Paris Fibre Reinforced Plastic Concepts for Structural Chassis Parts Oliver Deisser*, Prof. Dr. Horst E. Friedrich, Gundolf Kopp German Aerospace Center / Institute of Vehicle Concepts Pfaffenwaldring 38-40, 70569 Stuttgart Abstract Fibre reinforced plastics (FRP) have a high potential for reducing masses of automotive parts, but are seldom used for structural parts in the chassis. If the whole chassis concept is adapted to the new material, then a high weight saving potential can be gained and new body concepts can result. DLR Institute of Vehicle Concepts designed and dimensioned a highly stressed structural part in FRP. A topology optimisation of a defined working space with the estimated loads was performed. The results were analysed and fibre reinforced part concepts derived, detailed and evaluated. Especially by the use of the new FRP material system in the chassis area, a weight saving of more than 30% compared to the steel reference was realised. With the help of those concepts it is shown, that there is also a great weight saving potential in the field of chassis design, if the design fits with the material properties. The existing concepts still have to be detailed further, simulated and validated to gain the full lightweight potential. Keywords: Fibre Reinforced Plastics; Chassis Design; Lightweight Design Concepts; Finite Element Simulation; FEM. Résumé Plastiques renforcés de fibres (PRF) ont un fort potentiel de réduction des masses de pièces automobiles, mais sont rarement utilisés pour des pièces de structure du châssis. Si le concept de châssis est adapté au nouveau matériel, un potentiel élevé d'épargne de poids peut être acquis et de nouveaux concepts de construction peuvent en résulter.
    [Show full text]
  • Autonomous Vehicle Engineering Guide Top Breakthroughs & Resources in Autonomous and Connected Vehicles AUTONOMOUS VEHICLE ENGINEERING GUIDE
    EBOOK Autonomous Vehicle Engineering Guide Top Breakthroughs & Resources in Autonomous and Connected Vehicles AUTONOMOUS VEHICLE ENGINEERING GUIDE 5 Contents SENSORS 7 3 For Lidar, MEMs the Word 5 New Performance Metrics for Lidar 7 Detecting Pedestrians SOFTWARE AND AI/MACHINE LEARNING 12 9 Software Building Blocks for AV Systems 12 New Mobility’s Mega Mappers 15 Can Autonomous Vehicles Make the Right ‘Decision?’ 19 CONNECTED VEHICLE ELECTRONICS 17 Expanding the Role of FPGAs 19 Electronic Architectures Get Smart ABOUT ON THE COVER Autonomous Vehicle Engineering covers the In the article Software Building Blocks constantly-evolving field of autonomous and for AV Systems, Sebastian Klaas explores connected vehicles from end to end — covering how Elektrobit's unique software frame- key technologies and applications including work is designed to smooth develop- sensor fusion, artificial intelligence, smart cities, ment of automated driving functions. and much more. This Autonomous Vehicle Automated valet parking is an example Engineering Ebook is a compilation of some of of a practical application of the software the magazine's top feature articles from thought framework. Read more on page 9. leaders, and is your guide to designing the next (Image: Elektrobit) generation of vehicles. 2 AUTONOMOUS VEHICLE ENGINEERING SAE EBOOK SENSORS For Lidar, MEMS the Word by Charles Chung, Ph.D. Tiny gimballed mirrors on chips are being developed that could improve the form factor and cost of automotive lidar. As automakers and their technology partners develop lidar sensors to enable SAE Level 4-5 autonomous driving, some systems designers believe MEMS micromirrors have the potential to reduce overall size and cost—two major hurdles to widespread lidar adoption.
    [Show full text]
  • The Electric Vehicle Evolution
    THE ELECTRIC VEHICLE EVOLUTION Electric vehicles are a growing market for new car purchases with more and more people making the switch from the gas station to an electrical outlet to fuel their vehicles. Electric vehicles use electricity as their primary fuel or use electricity along with a conventional engine to improve efficiency (plug-in hybrid vehicles). Drivers are purchasing the vehicles for all kinds of reasons. Many decide to buy when they hear about the savings. Drivers see around $700 in savings a year in gasoline expenses when they drive an average of 12,000 miles. They also can realize substantial tax credits that encourage low-emission and emissions-free driving. Additional benefits include environmental improvements because of reduced vehicle emissions, energy independence by way of using locally-generated electricity and high quality driving performance. With the influx of electric vehicles comes a need for charging infrastructure. Throughout the country, businesses, governments and utilities have been installing electric vehicle charging stations. According to the U.S. Department of Energy’s Alternative Fuels Data Center, there are over tens of thousands of vehicle charging outlets across the country. This trend toward electric vehicles is expected to continue, especially with the billions of dollars that auto manufacturers are investing in these new vehicles. The list of manufacturer support is long with almost every large automobile manufacturer currently developing or selling an electric vehicle. But how and why did this all get started? Let’s step back and take a look at the history of electric transportation. 1 THE ELECTRIC VEHICLE EVOLUTION EARLY SUCCESS Electric vehicles actually have their origin in the 1800s.
    [Show full text]
  • Microscope Systems and Their Application in Machine Vision
    Microscope Systems And Their Application in Machine Vision 1 1 Agenda • What is a microscope system? • Basic setup of a microscope • Differences to standard lenses • Parameters of microscope systems • Illumination options in a microscope setup • Special contrast enhancement techniques • Zoom components • Real-world examples What is a microscope systems? Greek: μικρός mikrós „small“; σκοπεῖν skopeín „observe“ Microscopes help us to look at small things, by enlarging them until we can see them with bare eyes or an image sensor. A microscope system is a system that consists of compatible components which can be combined into different configurations We only look at visible light microscopes We only look at digial microscopes no eyepiece but an image sensor in the object plane The optical magnification is ≥1 Basic setup of a microscope microscopes always show the same basic configuration: Sensor Tube lens: - Images onto the sensor - Defines the maximum sensor size Collimated beam path (infinity conjugated) Objective: - Images to infinity - Holds the system aperture - Defines the resolution of the system Object Differences to standard lenses microscope Finite-finite lens Sensor Sensor Collimated beam path (infinity conjugate) EnthältSystem apertureSystemblende Object Object Differences to standard lenses • Collimated beam path offers several options - Distance between objective and tube lens can be changed . Focusing by moving the objective without changing any optical parameter . Integration of filters, mirrors and beam splitters . Beam
    [Show full text]
  • Assignment of New Vehicle Identification Number Application
    APPLICATION AND ASSIGNMENT OF NEW VEHICLE IDENTIFICATION NUMBER SECRETARY OF STATE BUREAU OF MOTOR VEHICLES $33.00 FEE REQUIRED DIVISION OF TITLE SERVICES Make Checks payable to: SECRETARY OF STATE OWNERS LEGAL NAME DATE OF BIRTH CURRENT STREET ADDRESS CITY STATE ZIP APPLICATION DATE HOME PHONE WORK PHONE YEAR MAKE MODEL BODY TYPE MISSING VEHICLE IDENTIFICATION NUMBER – IF KNOWN EXACT CURRENT LOCATION OF VEHICLE –STREET ADDRESS CITY STATE ZIP NET WEIGHT - IF TRAILER CC - IF MOTORCYCLE ENGINE NUMBER – IF MOTORCYCLE Subject to inspection by a Bureau of Motor Vehicle detective, the undersigned makes this application for a new vehicle identification number, to be assigned permanently to the vehicle listed above. The applicant also agrees to submit an application for a title certificate (MVT-2) to bear the new number, if this vehicle is 1995 or newer and subject to Maine title law. I certify that I am the owner of the vehicle described above and that said Vehicle requires a Vehicle Identification Number because (CHECK ONE REASON BELOW): ❑ Number was destroyed or obliterated ❑ Homemade vehicle ❑ Other (Explain) _________________________________________________________________________________________ ______________________________________________________________________ OWNER’S SIGNATURE IMPORTANT – PLEASE ALSO READ AND COMPLETE THE BACK OF THIS FORM FOR BMV USE ONLY SPECIAL MOTOR VEHICLE CERTIFICATION FOR BMV USE ONLY This permanent Vehicle Identification Number has been properly affixed to the vehicle described above M E INSPECTOR’S NAME (PLEASE PRINT CLEARLY) INSPECTOR’S SIGNATURE DATE NUMBER AFFIXED ODOMETER READING COMMENTS 101 Hospital Street, #29 State House Station, Augusta, ME 04333-0029 Tel. (207) 624-9000 ext. 52138 Fax: (207) 624-9239 TTY Users call Maine Relay 711 MVT-6 Rev.
    [Show full text]
  • Second Machine Age Or Fifth Technological Revolution? Different
    Second Machine Age or Fifth Technological Revolution? Different interpretations lead to different recommendations – Reflections on Erik Brynjolfsson and Andrew McAfee’s book The Second Machine Age (2014). Part 1 Introduction: the pitfalls of historical periodization Carlota Perez January 2017 Blog post: http://beyondthetechrevolution.com/blog/second-machine-age-or-fifth-technological- revolution/ This is the first instalment in a series of posts (and a Working Paper in progress) that reflect on aspects of Erik Brynjolfsson and Andrew McAfee’s influential book, The Second Machine Age (2014), in order to examine how different historical understandings of technological revolutions can influence policy recommendations in the present. Over the next few weeks, we will discuss the various criteria used for identifying a technological revolution, the nature of the current moment, and the different implications that stem from taking either the ‘machine ages’ or my ‘great surges’ point of view. We will look at what we see as the virtues and limits of Brynjolfsson and McAfee’s policy proposals, and why implementing policies appropriate to the stage of development of any technological revolution have been crucial to unleashing ‘Golden Ages’ in the past. 1 Introduction: the pitfalls of historical periodization Information technology has been such an obvious disrupter and game changer across our societies and economies that the past few years have seen a great revival of the notion of ‘technological revolutions’. Preparing for the next industrial revolution was the theme of the World Economic Forum at Davos in 2016; the European Union (EU) has strategies in place to cope with the changes that the current ‘revolution’ is bringing.
    [Show full text]
  • History of Intelligent Transportation Systems Publication Number
    HISTORY OF INTELLIGENT TRANSPORTATION SYSTEMS WWW.ITS.DOT.GOV/INDEX.HTM PUBLICATION NUMBER WWW.ITS.DOT.GOV/INDEX.HTM PUBLICATION NUMBER: FHWA-JPO-16-329 U.S. DEPARTMENT OF TRANSPORTATION INTELLIGENT TRANSPORTATION SYSTEMS JOINT PROGRAM OFFICE B U.S. DEPARTMENT OF TRANSPORTATION INTELLIGENT TRANSPORTATION SYSTEMS JOINT PROGRAM OFFICE Produced by Booz Allen Hamilton U.S. Department of Transportation Intelligent Transportation Systems Joint Program Office Notice This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Government assumes no liability for its contents or use thereof. The U.S. Government is not endorsing any manufacturers, products, or services cited herein and any trade name that may appear in the work has been included only because it is essential to the contents of the work. C U.S. DEPARTMENT OF TRANSPORTATION INTELLIGENT TRANSPORTATION SYSTEMS JOINT PROGRAM OFFICE Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient’s Catalog No. FHWA-JPO-16-329 4. Title and Subtitle 5. Report Date History of Intelligent Transportation Systems May 2016 6. Performing Organization Code 7. Author(s) 8. Performing Organization Report No. Ashley Auer, Shelley Feese, and Stephen Lockwood 9. Performing Organization Name And Address 10. Work Unit No. (TRAIS) Booz Allen Hamilton 8283 Greensboro Drive 11. Contract or Grant No. McLean, VA 22102 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered U.S. Department of Transportation Intelligent Transportation Systems Joint Program Office 1200 New Jersey Ave SE 14. Sponsoring Agency Code Washington, DC 20590 15.
    [Show full text]
  • The History of Computing in the History of Technology
    The History of Computing in the History of Technology Michael S. Mahoney Program in History of Science Princeton University, Princeton, NJ (Annals of the History of Computing 10(1988), 113-125) After surveying the current state of the literature in the history of computing, this paper discusses some of the major issues addressed by recent work in the history of technology. It suggests aspects of the development of computing which are pertinent to those issues and hence for which that recent work could provide models of historical analysis. As a new scientific technology with unique features, computing in turn can provide new perspectives on the history of technology. Introduction record-keeping by a new industry of data processing. As a primary vehicle of Since World War II 'information' has emerged communication over both space and t ime, it as a fundamental scientific and technological has come to form the core of modern concept applied to phenomena ranging from information technolo gy. What the black holes to DNA, from the organization of English-speaking world refers to as "computer cells to the processes of human thought, and science" is known to the rest of western from the management of corporations to the Europe as informatique (or Informatik or allocation of global resources. In addition to informatica). Much of the concern over reshaping established disciplines, it has information as a commodity and as a natural stimulated the formation of a panoply of new resource derives from the computer and from subjects and areas of inquiry concerned with computer-based communications technolo gy.
    [Show full text]
  • The Autonomous Vehicle Revolution Fostering Innovation with Smart Regulation
    THE AUTONOMOUS VEHICLE REVOLUTION FOSTERING INNOVATION WITH SMART REGULATION MARCH 2017 The Center for the Study of the Presidency and Congress, founded in 1965, is a nonprofit, nonpartisan 501(c)(3) organization. The Center’s mission is to utilize the lessons of history to address the challenges of today; serve as a strategic honest broker for discussions with leaders from government, the private sector, and the policy community; and to educate the next generation of leaders through the Presidential and International Fellows Program. THE AUTONOMOUS VEHICLE REVOLUTION: FOSTERING INNOVATION WITH SMART REGULATION March 2017 Copyright © 2017 CENTER FOR THE STUDY OF THE PRESIDENCY & CONGRESS All rights reserved. No portion of this report may be reproduced, by any process or technique, without the express written consent of the publisher. Published in the United States of America. Selected Cover Image Credits: Silver Blue, Flickr; Jennifer Morrow, Flickr; Wikimedia Commons 601 Thirteenth Street, NW – Suite 1050N Washington, D.C. 20005 Phone: 202-872-9800 Fax: 202-872-9811 www.thePresidency.org Copyright © 2017 All rights reserved THE AUTONOMOUS VEHICLE REVOLUTION: FOSTERING INNOVATION WITH SMART REGULATION PROJECT DIRECTORS: MAXMILLIAN ANGERHOLZER III DAN MAHAFFEE LEAD RESEARCHER: MADELINE VALE PROJECT ADVISORS: JAMES KITFIELD HURST RENNER WASHINGTON, D.C. MARCH 2017 TABLE OF CONTENTS INTRODUCTION .................................................................................................................. 1 REPORT FINDINGS .............................................................................................................
    [Show full text]
  • Autonomous Vehicle Technology: a Guide for Policymakers
    Autonomous Vehicle Technology A Guide for Policymakers James M. Anderson, Nidhi Kalra, Karlyn D. Stanley, Paul Sorensen, Constantine Samaras, Oluwatobi A. Oluwatola C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr443-2 This revised edition incorporates minor editorial changes. Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-8398-2 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Cover image: Advertisement from 1957 for “America’s Independent Electric Light and Power Companies” (art by H. Miller). Text with original: “ELECTRICITY MAY BE THE DRIVER. One day your car may speed along an electric super-highway, its speed and steering automatically controlled by electronic devices embedded in the road. Highways will be made safe—by electricity! No traffic jams…no collisions…no driver fatigue.” Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous.
    [Show full text]
  • 2Nd-Generation SJ-MOSFET for Automotive Applications
    2nd-Generation SJ-MOSFET for Automotive Applications “Super J MOS S2A Series” TABIRA, Keisuke * NIIMURA, Yasushi * MINAZAWA, Hiroshi * ABSTRACT There has been increasing demand for smaller power conversion equipment and better fuel efficiency in eco- friendly vehicles such as hybrid electric vehicles. Accordingly, power MOSFET products are being required to be compact, low loss and low noise. Fuji Electric has developed and launched the “Super J MOS S1A Series,” a product for automotive applications that adopt a superjunction structure characterized by their low on-state resistance and low switching loss. More recently, Fuji Electric has developed the 2nd-Generation SJ-MOSFET for automotive applica- tions “Super J MOS S1A Series,” which reduces conduction loss while improving the trade-off between switching loss and jumping voltage during turn-off switching. The use of this product contributes to size reduction and enhanced ef- ficiency of the power conversion equipment for automotive applications. 1. Introduction turn-off switching. Recently, in the automotive market, eco-friendly 2. Design Concept vehicles represented by hybrid electric vehicles (HEVs), plug-in hybrid electric vehicles (P-HEVs) and Figure 1 shows a breakdown of the loss generated electric vehicles (EVs) have been attracting atten- in a power MOSFET in a power factor correction (PFC) issue: Power Semiconductors Contributing in Energy Management issue: Power Semiconductors Contributing in Energy tion as environmental regulations become increasingly circuit of a charger for automotive applications. The stringent and users’ environmental awareness rises. generated loss of a power MOSFET can be roughly Efficient use of the electric power of the batteries classified into conduction loss Pon and switching loss mounted on these types of vehicles directly leads to an consisting of turn-on loss Pton and turn-off loss Ptoff.
    [Show full text]