共查询到18条相似文献,搜索用时 250 毫秒
1.
随着汽车电子应用程序对处理器性能需求的不断提高,现代汽车电子系统中的电子控制单元(ECU)已升级为多核结构。多核ECU中的AUTOSAR应用程序的设计、实现和集成将面临新的挑战。其中一个重要的挑战是在映射任务到多核ECU的同时确保系统的实时性能。且在AUTOSAR静态配置过程中,实时系统的资源限制和调度分析使问题变得更加复杂。因此,文中提出了一种基于纳什均衡的AUTOSAR任务到多核ECU的映射方法。该方法将任务优先级应用于博弈过程中,对提高任务映射过程的效率具有非常重要的实用价值。最后,将所提方法应用于AUTOSAR标准的实例中。实验结果表明,所提方法在减少各个任务中可运行实体的最坏响应时间方面具有良好的表现。 相似文献
2.
AUTOSAR是汽车开放系统体系结构,已成为汽车电子软件的工业标准,在汽车电子控制器系统开发过程中具有重要地位,其中AUTOSAR COM通信规范为汽车电子通信系统的构建提供了依据和参考;介绍了AUTOSAR体系架构,对AUTOSAR COM规范基于信号的通信机制及其特有的传输模式切换系统进行了研究,并实现了一种基于AUTOSAR架构的通信系统,试验结果表明该系统能够提供基本通信服务,且符合AUTOSAR COM规范。 相似文献
3.
本文着重介绍了在工业控制领域广泛应用的Modbus协议,分析了其特点及通信过程,并针对车用电子控制单元(ECU)的特点,完成了基于Modbus协议的ECU标定平台通信部分的设计。 相似文献
4.
5.
6.
在发动机控制算法开发与优化的过程中,为保证待开发V-ECU与原机P-ECU的控制效果差异是在工况完全相同的情况下得到,采用了双ECU台架试验平台。针对平台中双ECU之间高速通信需求,深入研究并利用CCP协议,设计开发了一种ECU高速通信实时监听系统。将通信变量在标定测量软件中进行监控,使能P-ECU中的DAQ功能,V-ECU通过监听P-ECU发出的DAQ通信消息,实现对P-ECU中任意期望变量的实时高速获取。试验表明,该系统相较于一般ECU通信方法具有获取变量灵活、获取速度快的特点,为对标原机ECU控制效果而高效开展ECU控制算法的开发与优化奠定平台基础,并且为获取ECU内部变量提供了新思路。 相似文献
7.
8.
9.
10.
基于发动机ECU双路并行开发系统试验平台,开展了待开发V-ECU对原机P-ECU运行参量实时获取技术的研究与开发。在P-ECU控制发动机正常运转情况下,依据CCP协议提供DAQ功能原理,通过V-ECU向P-ECU发送一系列CCP协议命令组合,使能P-ECU中的DAQ功能,实现对P-ECU内部运行参量的灵活、高速实时获取与运算。试验表明,此系统获取P-ECU内部参量速度足够快,能满足发动机ECU控制算法优化需求,并显著提升优化效率,为高效优化V-ECU内部自主开发控制算法提供了一条有效途径,同时也为获取ECU中内部变量提供了一种新思路。 相似文献
11.
下一代汽车电子标准AUTOSAR定义汽车应用程序设计过程包括系统级设计和ECU级设计。系统级设计以软件构件为单位来设计应用,其中软件构件包含一组可运行实体。ECU级设计主要将可运行实体代码组织为嵌入式实时操作系统任务。因此,在将分配到ECU的软件构件集转换为实时系统任务集的过程中,需要有经验的嵌入式开发工程师进行可运行实体-任务的映射配置,以保证系统的实时性。鉴于可运行实体-任务的映射配置工作具有配置需求量大、复杂度高等特点,文中设计了一种可运行实体-任务自动映射方法。该方法综合考虑了可运行实体的触发关系、周期需求、数据共享等因素,对提高汽车软件开发效率具有非常重要的实用价值。最后,将该方法应用于AUTOSAR标准的汽车电子巡航控制系统实例中。实验结果显示,所提方法在抖动时间、阻塞时间、调度频繁度和数据通信量4个方面都具有良好的表现。 相似文献
12.
随着汽车电子市场的快速发展,汽车控制器的电子控制单元(ECU)已越来越多,对ECU的功能测试也变得日趋复杂。为解决车载ECU功能测试,研究了基于控制器局域网络(CAN)的ECU自动测试方法。以NI公司的软硬件为开发平台、CAN总线为通信平台搭建测试系统与被测ECU形成闭环结构。通过CAN总线传输测试信息,可实现对同型号ECU的批量测试。此系统采用了新的测试方法来降低测试误差,并支持ECU的流水线测试,大大降低了测试的复杂度,减少了工作量。同时,在完善仿真信号产生模块和测试模块用例库后,也能适用于其他类型ECU的功能测试。 相似文献
13.
14.
Antonia Bertolino Antonello Calabro’ Felicita Di Giandomenico Giuseppe Lami Francesca Lonetti Eda Marchetti Fabio Martinelli Ilaria Matteucci Paolo Mori 《Software Quality Journal》2018,26(4):1223-1256
The growing number of vehicles daily moving on roads increases the need of protecting the safety and security of passengers, pedestrians, and vehicles themselves. This need is intensified when considering the pervasive introduction of Information and Communication Technologies (ICT) systems into modern vehicles, because this makes such vehicles potentially vulnerable from the point of view of security. The convergence of safety and security requirements is one of the main outstanding research challenges in software-intensive systems. This work reviews existing methodologies and solutions addressing security issues in the automotive domain with a focus on the integration between safety and security aspects. In particular, we identify the main security issues with vehicular communication technologies and existing gaps between state-of-the-art methodologies and their implementation in the real world. Starting from a literature survey and referring to widely accepted standards of the domain, such as AUTOSAR and ISO 26262, we discuss research challenges and set baselines for a holistic secure-by-design approach targeting safety and security aspects all along the different phases of the development process of automotive software. 相似文献
15.
为了高效管理愈来愈复杂的车辆电子、软件系统,并且在确保产品及服务质量的同时,提高成本效率,以统一建模语言(UML)和系统建模语言(SysML)为基础,参照汽车开放系统架构(AUTOSAR),提出一种基于模型驱动架构的汽车嵌入式软件开发方法,并以汽车引擎点火和敲打控制系统为例进行描述.性能分析表明,该方法缩短了汽车嵌入式软件开发周期,降低了开发成本. 相似文献
16.
In the last decade, the automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. In comparison to older types of vehicles, where the biggest concern was physical security, modern vehicles might be targeted remotely. As a result, multiple attack vectors aiming to disrupt different vehicle components emerged. Research and practice lack a comprehensive attack taxonomy for the automotive domain. In this regard, we conduct a systematic literature study, wherein 48 different attacks were identified and classified according to the proposed taxonomy of attack mechanisms. The taxonomy can be utilized by penetration testers in the automotive domain as well as to develop more sophisticated attacks by chaining multiple attack vectors together. In addition, we classify the identified attack vectors based on the following five dimensions: (1) AUTOSAR layers, (2) attack domains, (3) information security principles, (4) attack surfaces, and (5) attacker profile. The results indicate that the most applied attack vectors identified in literature are GPS spoofing, message injection, node impersonation, sybil, and wormhole attack, which are mostly applied to application and services layers of the AUTOSAR architecture. 相似文献
17.
18.
SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
Constrained Application Protocol (CoAP) has become the de-facto web standard for the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing deployments require security. CoAP mandates the use of the Datagram TLS (DTLS) protocol as the underlying secure communication protocol. In this paper we implement DTLS-protected secure CoAP for both resource-constrained IoT devices and a cloud backend and evaluate all three security modes (pre-shared key, raw-public key, and certificate-based) of CoAP in a real cloud-connected IoT setup. We extend SicsthSense– a cloud platform for the IoT– with secure CoAP capabilities, and compliment a DTLS implementation for resource-constrained IoT devices with raw-public key and certificate-based asymmetric cryptography. To the best of our knowledge, this is the first effort toward providing end-to-end secure communication between resource-constrained smart things and cloud back-ends which supports all three security modes of CoAP both on the client side and the server side. SecureSense– our End-to-End (E2E) secure communication architecture for the IoT– consists of all standard-based protocols, and implementation of these protocols are open source and BSD-licensed. The SecureSense evaluation benchmarks and open source and open license implementation make it possible for future IoT product and service providers to account for security overhead while using all standardized protocols and while ensuring interoperability among different vendors. The core contributions of this paper are: (i) a complete implementation for CoAP security modes for E2E IoT security, (ii) IoT security and communication protocols for a cloud platform for the IoT, and (iii) detailed experimental evaluation and benchmarking of E2E security between a network of smart things and a cloud platform. 相似文献