• Session No.135 Communication and Electronics II -Communication and SDV-
  • October 25Meeting Room 412:35-13:50
  • Chair: Hiroaki Morino (Shibaura Institute of Technology)
No. Title・Author (Affiliation)
234

Research on UWB Communication Interference Suppression for In-vehicle Wiring Harness-less

Makoto Okuhara (Denso Ten / Kobe University)・Hiroaki Yoshitake・Yuri Nishigaki・Tetsuya Nomura・Shigeki Mitoh・Kenshi Morikawa (Denso Ten)

In recent years, the increase in wire harnesses due to the advancement of automotive technology has become a concern. Utilizing wireless technology is crucial for environmental and cost reasons. This paper proposes Interference Suppression Arbitration Control (ISAC) to address radio wave interference, a key challenge in achieving wireless implementation via UWB. ISAC significantly improves the impact of radio wave interference.

235

Implementation and Evaluation of Real-time and Dynamically Reconfigurable Network Middleware to Realize Multiple Use-cases of SDV

Yuji Oishi (Hitachi)・Hafiz Hilman (Hitachi Astemo)・Goichi Ono (Hitachi)・Yasuo Sugure (Hitachi Astemo)

Software-Defined Vehicles (SDVs), which achieves flexible control of vehicles, require reconfiguration of network according to change for communications of the software. In this study, we implemented real-time and dynamic network configuration function as middleware on automotive-grade devices, supporting representative 3 SDV use-cases with change for communications such as addition of new software. The performance evaluation result is reported.

236

Proposal of Vulnerability Analysis Method in Accordance with ISO/SAE 21434

Keisuke Honda (Hitachi Astemo)・Yukiko Matsubara・Mutsumi Shimoda・Nobuyoshi Morita (Hitachi)・Yasuhiro Fujii・Makoto Kayashima (Hitachi Astemo)

Cybersecurity development in accordance with ISO/SAE 21434 is required for compliance with UNR 155.
ISO/SAE 21434 requires vulnerability analysis to be conducted, but does not provide specific procedures.
In this study, we have defined a CC/CEM-based procedure of vulnerability analysis, and further investigated automation by applying tools. We have applied these development methods to the product design and confirmed the feasibility.

Back to Top