Autonomous Vehicle Engineering - July 2022 - 18

Cybersecurity
FUTURE
We see your
mechanisms to attack the network or send different packets
to the network that appear legitimate but are actually from
a malicious source.
Network Bombardment - The network simulator
differently.
establishes a scenario in which signals from numerous
UEs bombard the network. The goal is to overload the
servers, so the network can't provide the required service.
The solution replicates end-of-service to reveal how
devices/network elements handle a scenario if a similar
nefarious act occurs.
Practical Security Testing - As mentioned, UE
CUSTOM
MANUFACTURING
Injection Molding
Diamond Turning * Design Support
Assembly & Bonding
PRECISION
POLYMER OPTICS
Improve Performance
Simplify Design * Trim Weight
Reduce Costs
(909) 539-1300 | DIVERSEOPTICS.COM
testing remains critical. As such, another test is conducted
in which a signaling tester or wireless communications
test set serves as a base station. Software connects with
the UE and a testing server. Functional security measurements
are conducted to verify the UE performs according
to specification.
Penetration Testing - This is an aggressive, all-up
Graphite Filled
One Part
Epoxy EP5G-80
NOT PREMIXED AND FROZEN
FOR BONDING, STATIC DISSIPATION
& EMI/RFI SHIELDING
THERMALLY CONDUCTIVE
2.88-3.46 W/(m*K)
ELECTRICALLY CONDUCTIVE
Volume resistivity, 75°F
5-15 ohm-cm
NASA LOW OUTGASSING
exercise of system-wide security. Penetration tests are typically
done by security experts who use their experience to
determine vulnerabilities. This type of testing (Fig. 3) may
go beyond simulation to conducting certain attacks on the
UE or telematic control unit (TCU) while connected to a
live wireless network. In this case, the simulator creates
a Rogue Base Station (RBS) scenario. The RBS masquerades
as a legitimate base station to facilitate a Man-inThe-Middle
(MiTM) attack between handsets, or another
mobile UE, and the mobile network.
Cellular Fuzzing - Another test attempts to uncover
vulnerabilities that might be the basis for future attacks.
This technique is commonly used to explore the dark
corners of a computer program, network, embedded system
or other device's threat space. For UE verification, the
network simulator generates inputs that have been systematically
malformed to be invalid, unexpected or random
commands, replies or data packets. Crashes, incorrect code
assertions or other unexpected, potentially security-critical
behavior is monitored by the network simulator.
Comprehensive approach
The evolution of the automobile has created a new level
of cybersecurity testing. It has gone beyond the vehicle
itself and extends to the entire network. Establishing a
comprehensive testing approach that verifies all levels of
the ecosystem requires solutions that emulate the realworld
environment. Implementing this approach will
bring greater confidence in how vehicles will withstand
cyberattacks. ■
Craig Hendricks is an electrical engineer and senior market development
manager for Anritsu.
Hackensack, NJ 07601, USA ∙ +1.201.343.8983 ∙ main@masterbond.com
www.masterbond.com
18 July 2022
AUTONOMOUS VEHICLE ENGINEERING
http://info.hotims.com/82340-706 http://info.hotims.com/82340-707

Autonomous Vehicle Engineering - July 2022

Table of Contents for the Digital Edition of Autonomous Vehicle Engineering - July 2022

Autonomous Vehicle Engineering - July 2022 - Cov4
Autonomous Vehicle Engineering - July 2022 - Cov1
Autonomous Vehicle Engineering - July 2022 - Cov2
Autonomous Vehicle Engineering - July 2022 - 1
Autonomous Vehicle Engineering - July 2022 - 2
Autonomous Vehicle Engineering - July 2022 - 3
Autonomous Vehicle Engineering - July 2022 - 4
Autonomous Vehicle Engineering - July 2022 - 5
Autonomous Vehicle Engineering - July 2022 - 6
Autonomous Vehicle Engineering - July 2022 - 7
Autonomous Vehicle Engineering - July 2022 - 8
Autonomous Vehicle Engineering - July 2022 - 9
Autonomous Vehicle Engineering - July 2022 - 10
Autonomous Vehicle Engineering - July 2022 - 11
Autonomous Vehicle Engineering - July 2022 - 12
Autonomous Vehicle Engineering - July 2022 - 13
Autonomous Vehicle Engineering - July 2022 - 14
Autonomous Vehicle Engineering - July 2022 - 15
Autonomous Vehicle Engineering - July 2022 - 16
Autonomous Vehicle Engineering - July 2022 - 17
Autonomous Vehicle Engineering - July 2022 - 18
Autonomous Vehicle Engineering - July 2022 - 19
Autonomous Vehicle Engineering - July 2022 - 20
Autonomous Vehicle Engineering - July 2022 - 21
Autonomous Vehicle Engineering - July 2022 - 22
Autonomous Vehicle Engineering - July 2022 - 23
Autonomous Vehicle Engineering - July 2022 - 24
Autonomous Vehicle Engineering - July 2022 - 25
Autonomous Vehicle Engineering - July 2022 - 26
Autonomous Vehicle Engineering - July 2022 - 27
Autonomous Vehicle Engineering - July 2022 - 28
Autonomous Vehicle Engineering - July 2022 - Cov3
Autonomous Vehicle Engineering - July 2022 - Cov4
https://www.nxtbook.com/smg/sae/24AE08
https://www.nxtbook.com/smg/sae/24AE06
https://www.nxtbook.com/smg/sae/24AE05
https://www.nxtbook.com/smg/sae/24AE04
https://www.nxtbook.com/smg/sae/24AE03
https://www.nxtbook.com/smg/sae/24AE02
https://www.nxtbook.com/smg/sae/23AE12
https://www.nxtbook.com/smg/sae/23AAVE11
https://www.nxtbook.com/smg/sae/23AE10
https://www.nxtbook.com/smg/sae/23AE09
https://www.nxtbook.com/smg/sae/23AE08
https://www.nxtbook.com/smg/sae/23AAVE07
https://www.nxtbook.com/smg/sae/23AE06
https://www.nxtbook.com/smg/sae/23AE05
https://www.nxtbook.com/smg/sae/23AAVE04
https://www.nxtbook.com/smg/sae/23AE04
https://www.nxtbook.com/smg/sae/23AE03
https://www.nxtbook.com/smg/sae/23AE02
https://www.nxtbook.com/smg/sae/23AAVE01
https://www.nxtbook.com/smg/sae/22AE12
https://www.nxtbook.com/smg/sae/22AVE11
https://www.nxtbook.com/smg/sae/22AE10
https://www.nxtbook.com/smg/sae/22AE09
https://www.nxtbook.com/smg/sae/22AE08
https://www.nxtbook.com/smg/sae/22AVE07
https://www.nxtbook.com/smg/sae/22AE06
https://www.nxtbook.com/smg/sae/22AE05
https://www.nxtbook.com/smg/sae/22AVE04
https://www.nxtbook.com/smg/sae/22AE04
https://www.nxtbook.com/smg/sae/22AE03
https://www.nxtbook.com/smg/sae/22AE02
https://www.nxtbook.com/smg/sae/22AVE01
https://www.nxtbook.com/smg/sae/21AE12
https://www.nxtbook.com/smg/sae/21AVE11
https://www.nxtbook.com/smg/sae/21AE10
https://www.nxtbook.com/smg/sae/21AVE09
https://www.nxtbook.com/smg/sae/21AE09
https://www.nxtbook.com/smg/sae/21AE08
https://www.nxtbook.com/smg/sae/21AVE07
https://www.nxtbook.com/smg/sae/21AE06
https://www.nxtbook.com/smg/sae/21AE05
https://www.nxtbook.com/smg/sae/21AVE05
https://www.nxtbook.com/smg/sae/21AE04
https://www.nxtbook.com/smg/sae/21AE03
https://www.nxtbook.com/smg/sae/21AVE03
https://www.nxtbook.com/smg/sae/21AE02
https://www.nxtbookmedia.com