227 research outputs found

    Coase and Car Repair: Who Should Be Responsible for Emissions of Vehicles in Use?

    Get PDF
    This paper examines the current assignment of liability for in-use vehicle emissions and suggests some alternative policies that may reduce the cost and increase the effectiveness. The authors first discuss the cost, performance and incentives under current Inspection and Maintenance (I/M) programs, using the recently implemented Arizona "Enhanced I/M" program as an example. These programs were designed to identify and repair vehicles with malfunctioning emission control systems. Since their inception, however, I/M programs have been plagued by transaction costs that have drastically raised the cost of I/M as well as limited its effectiveness. These transaction costs fall into three categories: emission monitoring, repair avoidance, and non-transferability of emission reductions. The authors argue that most of these transaction costs can be attributed to the current assignment of liability for I/M to motorists, and they examine the potential for other liability assignments to reduce transaction costs and improve program efficiency. Among the alternative institutional arrangements discussed are greater imposition of liability on manufacturers, emission repair subsidies, repair liability auctions, and vehicle leasing.

    EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles

    Get PDF
    The automobile industry is no longer relying on pure mechanical systems; instead, it benefits from advanced Electronic Control Units (ECUs) in order to provide new and complex functionalities in the effort to move toward fully connected cars. However, connected cars provide a dangerous playground for hackers. Vehicles are becoming increasingly vulnerable to cyber attacks as they come equipped with more connected features and control systems. This situation may expose strategic assets in the automotive value chain. In this scenario, the Controller Area Network (CAN) is the most widely used communication protocol in the automotive domain. However, this protocol lacks encryption and authentication. Consequently, any malicious/hijacked node can cause catastrophic accidents and financial loss. Starting from the analysis of the vulnerability connected to the CAN communication protocol in the automotive domain, this paper proposes EXT-TAURUM P2T a new low-cost secure CAN-FD architecture for the automotive domain implementing secure communication among ECUs, a novel key provisioning strategy, intelligent throughput management, and hardware signature mechanisms. The proposed architecture has been implemented, resorting to a commercial Multi-Protocol Vehicle Interface module, and the obtained results experimentally demonstrate the approach’s feasibility

    Defending Vehicles Against Cyberthreats: Challenges and a Detection-Based Solution

    Get PDF
    The lack of concern with security when vehicular network protocols were designed some thirty years ago is about to take its toll as vehicles become more connected and smart. Today as demands for more functionality and connectivity on vehicles continue to grow, a plethora of Electronic Control Units (ECUs) that are able to communicate to external networks are added to the automobile networks. The proliferation of ECU and the increasing autonomy level give drivers more control over their vehicles and make driving easier, but at the same time they expand the attack surface, bringing more vulnerabilities to vehicles that might be exploited by hackers. Possible outcomes of a compromised vehicle range from personal information theft to human life loss, raising the importance of automotive cybersecurity to a whole different level. Therefore, network safety has become a necessary and vital consideration of a vehicle. This project is two-fold: the first half will focus on the background of vehicle cybersecurity, characteristics of vehicular networks that could be leveraged during a hacking process, including ECU, Controller Area Network (CAN bus) and On-Board Diagnostics (OBD). It also discusses and evaluates previous hacking experiments conducted by researchers and their proposed countermeasures. The second half is an evaluation of approaches to design an Intrusion Detection System (IDS). The aim of this project is to find an effective and suitable solution todefend vehicles against various types of cyber threats

    Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions

    Full text link
    In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon transportation has been threatened from various ways. For example, denial of service attacks pose a great threat to the electric vehicles and vehicle-to-grid networks. To minimize these threats, several methods have been proposed to defense against them. Yet, these methods are only for certain types of scenarios or attacks. Therefore, this review addresses security aspect from holistic view, provides the overview, challenges and future directions of cyber security technologies in low-carbon transportation. Firstly, based on the concept and importance of low-carbon transportation, this review positions the low-carbon transportation services. Then, with the perspective of network architecture and communication mode, this review classifies its typical attack risks. The corresponding defense technologies and relevant security suggestions are further reviewed from perspective of data security, network management security and network application security. Finally, in view of the long term development of low-carbon transportation, future research directions have been concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Review
    • …
    corecore