Open Access. Powered by Scholars. Published by Universities.®

Automotive Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Automotive Engineering

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang Jun 2018

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang

Computer Engineering

After Cal Poly Racing’s electrical team began to hit the technical limits of the ADC and other I/O features of the current 8-bit Atmel AT90 microcontroller unit, it became clear that an upgrade was due. This replatforming project takes the functionalities of the old, 8-bit architecture, and aims to provide a 32-bit version using the ARM MKE1xF MCU. With the idea of having a working PCB as a stretch goal, the scope of the library development was limited to enable base functionality. Thus, the only libraries developed were for the Timer, ADC, SPI, UART, and CAN. Additionally, this document discusses …


A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh Jun 2018

A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh

Computer Science and Software Engineering

No abstract provided.


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


Assessing The Competing Characteristics Of Privacy And Safety Within Vehicular Ad Hoc Networks, Jacob W. Connors Mar 2018

Assessing The Competing Characteristics Of Privacy And Safety Within Vehicular Ad Hoc Networks, Jacob W. Connors

Theses and Dissertations

The introduction of Vehicle-to-Vehicle (V2V) communication has the promise of decreasing vehicle collisions, congestion, and emissions. However, this technology places safety and privacy at odds; an increase of safety applications will likely result in the decrease of consumer privacy. The National Highway Traffic Safety Administration (NHTSA) has proposed the Security Credential Management System (SCMS) as the back end infrastructure for maintaining, distributing, and revoking vehicle certificates attached to every Basic Safety Message (BSM). This Public Key Infrastructure (PKI) scheme is designed around the philosophy of maintaining user privacy through the separation of functions to prevent any one subcomponent from identifying …


Training Neural Networks To Pilot Autonomous Vehicles: Scaled Self-Driving Car, Jason Zisheng Chang Jan 2018

Training Neural Networks To Pilot Autonomous Vehicles: Scaled Self-Driving Car, Jason Zisheng Chang

Senior Projects Spring 2018

This project explores the use of deep convolutional neural networks in autonomous cars. Successful implementation of autonomous vehicles has many societal benefits. One of the main benefits is its potential to significantly reduce traffic accidents. In the United States, the National Highway Traffic Safety Administration states that human error is at fault for 93% of automotive crashes. Robust driverless vehicles can prevent many of these collisions. The main challenge in developing autonomous vehicles today is how to create a system that is able to accurately perceive and process the world around it. In 2016, NVIDIA successfully trained a deep convolutional …