1 Introduction |
|
1 | (12) |
|
1.1 The Automotive Industry |
|
|
3 | (4) |
|
|
7 | (2) |
|
|
9 | (2) |
|
References and Further Reading |
|
|
11 | (2) |
2 The Automotive Industry |
|
13 | (32) |
|
2.1 The Automotive Market |
|
|
13 | (6) |
|
2.2 The Automotive Megatrends |
|
|
19 | (11) |
|
2.2.1 Tighter Emission Controls and the Rise of Electric Vehicles |
|
|
20 | (3) |
|
2.2.2 Car Ownership Versus Mobility |
|
|
23 | (2) |
|
|
25 | (1) |
|
2.2.4 Safety and Advanced Driver Assistance Systems |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (1) |
|
2.3 Automotive OEMs and Suppliers |
|
|
30 | (3) |
|
2.4 New Players and Challenges |
|
|
33 | (1) |
|
2.5 The Digital Transformation of the Automotive Industry |
|
|
34 | (3) |
|
|
37 | (2) |
|
References and Further Reading |
|
|
39 | (6) |
3 Automotive Research and Development |
|
45 | (38) |
|
3.1 The Automotive Development Process |
|
|
45 | (18) |
|
3.1.1 Requirements Engineering |
|
|
59 | (1) |
|
3.1.2 Design as a Multiparameter Optimization Problem |
|
|
60 | (3) |
|
3.2 Automotive Modularization and Platforms |
|
|
63 | (1) |
|
3.3 Virtual Product Creation |
|
|
64 | (5) |
|
3.4 Product Life Cycle Management |
|
|
69 | (8) |
|
3.4.1 Loss of Control in Life Cycle Management |
|
|
70 | (1) |
|
3.4.2 Systems Engineering Approach |
|
|
71 | (2) |
|
3.4.3 Product Life Cycle Stages |
|
|
73 | (2) |
|
3.4.4 Software Life Cycle Processes |
|
|
75 | (2) |
|
|
77 | (2) |
|
References and Further Reading |
|
|
79 | (4) |
4 Automotive E/E and Automotive Software Technology |
|
83 | (88) |
|
4.1 Mechatronic Systems in the Car |
|
|
83 | (3) |
|
4.2 Automotive Electronics |
|
|
86 | (23) |
|
|
89 | (3) |
|
4.2.2 Chassis Electronics |
|
|
92 | (2) |
|
4.2.3 Comfort Electronics |
|
|
94 | (1) |
|
4.2.4 Driver Assistance Electronics |
|
|
94 | (4) |
|
4.2.5 Electronic Control Units |
|
|
98 | (2) |
|
4.2.6 Entertainment/Infotainment Electronics |
|
|
100 | (2) |
|
|
102 | (7) |
|
4.3 E/E Architectures and Topologies |
|
|
109 | (12) |
|
|
110 | (1) |
|
4.3.2 Architectures and Topologies |
|
|
111 | (3) |
|
4.3.3 Bus Systems and ISO Standards |
|
|
114 | (7) |
|
|
121 | (5) |
|
4.5 Automotive Software Engineering |
|
|
126 | (16) |
|
4.5.1 Increasing Software Content and Product Complexity |
|
|
127 | (3) |
|
4.5.2 Model-Based Development |
|
|
130 | (3) |
|
4.5.3 Hardware-in-the-Loop Tests |
|
|
133 | (9) |
|
|
142 | (5) |
|
4.7 AUTOSAR Adaptive Platform |
|
|
147 | (1) |
|
|
147 | (2) |
|
4.9 Example: Advanced Driver Assistance System |
|
|
149 | (14) |
|
4.9.1 ADAS Functionalities |
|
|
151 | (4) |
|
|
155 | (7) |
|
4.9.3 Pros and Cons of the ADAS Sensor Suite |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (3) |
|
References and Further Reading |
|
|
167 | (4) |
5 The Connected Car |
|
171 | (94) |
|
5.1 Cyber-Physical Systems |
|
|
171 | (35) |
|
5.1.1 Introduction to Cyber-Physical Systems |
|
|
172 | (8) |
|
5.1.2 Cyber-Physical Systems Design Recommendations |
|
|
180 | (4) |
|
5.1.3 Cyber-Physical Systems Requirements |
|
|
184 | (5) |
|
5.1.4 Cyber-Physical Control Systems |
|
|
189 | (11) |
|
5.1.5 Cyber-Physical Vehicle Tracking |
|
|
200 | (6) |
|
|
206 | (8) |
|
5.2.1 Internet of Things Enabling Technologies |
|
|
208 | (2) |
|
5.2.2 RFID and WSN Technology |
|
|
210 | (4) |
|
5.3 Telematics, Infotainment, and the Evolution of the Connected Car |
|
|
214 | (19) |
|
|
215 | (7) |
|
|
222 | (2) |
|
5.3.3 Evolution of the Connected Car |
|
|
224 | (9) |
|
5.4 Platforms and Architectures |
|
|
233 | (8) |
|
5.4.1 Connected Car Architecture and Challenges |
|
|
234 | (3) |
|
5.4.2 Connected Car Reference Platform |
|
|
237 | (1) |
|
5.4.3 Connected Car in the Cloud |
|
|
238 | (3) |
|
|
241 | (6) |
|
|
247 | (2) |
|
|
249 | (8) |
|
5.7.1 BMW ConnectedDrive Store |
|
|
249 | (3) |
|
5.7.2 Mercedes COMAND Online |
|
|
252 | (2) |
|
5.7.3 HERE: Digital Maps for Fully Autonomous Driving |
|
|
254 | (3) |
|
|
257 | (3) |
|
References and Further Reading |
|
|
260 | (5) |
6 Automotive Cybersecurity |
|
265 | (114) |
|
6.1 Introduction to Cybersecurity |
|
|
266 | (50) |
|
6.1.1 Cybersecurity and Vulnerability |
|
|
272 | (1) |
|
6.1.2 Artificial Intelligence |
|
|
272 | (10) |
|
|
282 | (2) |
|
|
284 | (3) |
|
|
287 | (4) |
|
|
291 | (3) |
|
6.1.7 Importance of Cybersecurity |
|
|
294 | (8) |
|
6.1.8 Automotive IT and Cybersecurity |
|
|
302 | (5) |
|
|
307 | (2) |
|
6.1.10 Holistic Cybersecurity Solutions |
|
|
309 | (7) |
|
6.2 IT Security in Automotive Cyber-Physical Systems |
|
|
316 | (13) |
|
6.2.1 Vehicle Network Technologies and Cybersecurity |
|
|
322 | (4) |
|
6.2.2 Cyberattack Taxonomy |
|
|
326 | (3) |
|
6.3 Hacking and Automotive Attack Surfaces and Vulnerabilities |
|
|
329 | (11) |
|
|
329 | (1) |
|
6.3.2 Automotive Attack Surfaces and Vulnerabilities |
|
|
330 | (10) |
|
6.4 Intrusion Detection and Prevention |
|
|
340 | (10) |
|
6.4.1 Intrusion Detection |
|
|
340 | (3) |
|
6.4.2 Intrusion Prevention |
|
|
343 | (7) |
|
6.5 Functional Safety and Security |
|
|
350 | (12) |
|
6.5.1 Security for Wireless Mobile Networks |
|
|
350 | (4) |
|
6.5.2 Security for Sensor Networks |
|
|
354 | (2) |
|
|
356 | (1) |
|
6.5.4 Cloud Computing and Data Security |
|
|
357 | (3) |
|
|
360 | (2) |
|
|
362 | (6) |
|
6.6.1 2010: Vehicles Disabled Remotely via Web Application |
|
|
363 | (1) |
|
6.6.2 2010 and 2011 CAESS Experimental Analysis |
|
|
364 | (1) |
|
6.6.3 2013 Miller and Valasek Physical Hack |
|
|
365 | (2) |
|
6.6.4 2015 Miller and Valasek Remote Hack |
|
|
367 | (1) |
|
|
368 | (3) |
|
References and Further Reading |
|
|
371 | (8) |
7 Mobile Apps for the Connected Car |
|
379 | (60) |
|
|
380 | (4) |
|
7.1.1 IT Management and Systems in the Automotive Industry |
|
|
382 | (2) |
|
7.2 Agile Software Development |
|
|
384 | (4) |
|
7.2.1 Challenges and Two-Speed IT |
|
|
387 | (1) |
|
7.3 The Smartphone and App Market |
|
|
388 | (1) |
|
|
389 | (4) |
|
|
389 | (1) |
|
|
390 | (1) |
|
7.4.3 The iOS Architecture |
|
|
390 | (3) |
|
|
393 | (2) |
|
|
395 | (2) |
|
7.7 iOS and Android in the Car |
|
|
397 | (1) |
|
7.8 Objective-C, Swift, and Java App Development |
|
|
398 | (6) |
|
|
398 | (5) |
|
|
403 | (1) |
|
|
404 | (1) |
|
7.9 A Ride-Sharing Example |
|
|
404 | (27) |
|
|
405 | (2) |
|
|
407 | (5) |
|
|
412 | (1) |
|
7.9.4 The Ridematching Algorithm |
|
|
413 | (2) |
|
|
415 | (2) |
|
7.9.6 A Code Walk Through |
|
|
417 | (14) |
|
7.10 Summary and Recommended Readings |
|
|
431 | (2) |
|
|
433 | (2) |
|
References and Further Readings |
|
|
435 | (4) |
8 Carsharing |
|
439 | (22) |
|
8.1 The Carsharing Concept |
|
|
439 | (2) |
|
|
441 | (1) |
|
8.3 Use Cases and Requirement Analysis for Carsharing |
|
|
442 | (4) |
|
8.4 Hardware/Software Modifications for Carsharing |
|
|
446 | (1) |
|
8.5 Electric Vehicles and Carsharing |
|
|
447 | (5) |
|
8.6 Carsharing Activities by Other OEMs |
|
|
452 | (1) |
|
8.7 Cyber Attack Surfaces and Mitigation of Cyber Attacks |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
455 | (2) |
|
References and Further Reading |
|
|
457 | (4) |
9 Car Hailing and Ridesharing |
|
461 | (24) |
|
|
461 | (2) |
|
9.2 Ride-Hailing Companies and Taxi Aggregators |
|
|
463 | (5) |
|
|
468 | (4) |
|
9.3.1 Cab Types and Prices |
|
|
468 | (2) |
|
|
470 | (2) |
|
|
472 | (1) |
|
9.5 Safety in Ridesharing |
|
|
472 | (6) |
|
|
473 | (1) |
|
9.5.2 Initiatives to Increase Safety |
|
|
474 | (2) |
|
9.5.3 Reported Crime Incidents in Ridesharing |
|
|
476 | (1) |
|
9.5.4 Government Policies for Ridesharing Companies |
|
|
477 | (1) |
|
9.5.5 Legal Cases and Accusations |
|
|
478 | (1) |
|
9.6 Cyberattacks and Cybersecurity in Ridesharing |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
References and Further Reading |
|
|
480 | (5) |
10 Connected Parking and Automated Valet Parking |
|
485 | (28) |
|
|
486 | (1) |
|
|
487 | (5) |
|
|
492 | (1) |
|
10.4 Automated Valet Parking |
|
|
493 | (3) |
|
|
496 | (1) |
|
10.6 Intrusion Detection and Prevention |
|
|
497 | (6) |
|
10.6.1 Types of Intrusion Detection Systems |
|
|
497 | (1) |
|
10.6.2 Attacks Against Connected Cars |
|
|
498 | (2) |
|
10.6.3 Artificial Neural Network-Based IDS Implementation |
|
|
500 | (3) |
|
10.7 Conclusion and Recommended Readings |
|
|
503 | (1) |
|
10.7.1 Cyber Threats and Cybersecurity |
|
|
503 | (1) |
|
10.7.2 Recommended Readings |
|
|
504 | (1) |
|
|
504 | (3) |
|
References and Further Reading |
|
|
507 | (6) |
11 Advanced Driver Assistance Systems and Autonomous Driving |
|
513 | (68) |
|
11.1 Advanced Driver Assistance Systems |
|
|
514 | (4) |
|
11.2 Lane Departure Warning, Lane Keep Assistance, Obstacle Detection, and Crossing Assistance |
|
|
518 | (7) |
|
11.2.1 Lane Keeping and Lane Change Assistance |
|
|
518 | (5) |
|
11.2.2 Crossing Assistance |
|
|
523 | (2) |
|
11.3 Image Processing and Image Analysis |
|
|
525 | (24) |
|
11.3.1 Computer Vision and Machine Vision |
|
|
525 | (1) |
|
11.3.2 Basic Principles of Image Processing |
|
|
526 | (7) |
|
11.3.3 Detection of Moving Objects |
|
|
533 | (5) |
|
11.3.4 Optical Flow Algorithm |
|
|
538 | (4) |
|
11.3.5 Implementation Using MATLAB |
|
|
542 | (7) |
|
|
549 | (9) |
|
11.5 Regulations, Public Acceptance, and Liability Issues |
|
|
558 | (3) |
|
11.5.1 Regulations and On-Road Approval |
|
|
558 | (1) |
|
11.5.2 Toward a Statutory Framework for Autonomous Driving |
|
|
558 | (1) |
|
11.5.3 Acceptance of Autonomous Driving and Ethical Difficulties |
|
|
559 | (1) |
|
11.5.4 Test on the Autobahn |
|
|
560 | (1) |
|
11.6 E/E Architectures and Middleware for Autonomous Driving |
|
|
561 | (5) |
|
11.7 Cybersecurity and Functional Safety |
|
|
566 | (3) |
|
11.8 Summary, Conclusion, and Recommended Readings |
|
|
569 | (2) |
|
11.8.1 Recommended Reading |
|
|
570 | (1) |
|
|
571 | (1) |
|
References and Further Readings |
|
|
572 | (9) |
12 Summary, Final Remarks, Outlook, and Further Reading |
|
581 | (14) |
|
|
581 | (2) |
|
12.2 Final Remarks: Wind of Change |
|
|
583 | (5) |
|
12.2.1 Frugal Engineering |
|
|
583 | (1) |
|
12.2.2 Rise of Asian Markets |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
586 | (1) |
|
12.2.7 Autonomous Driving |
|
|
586 | (1) |
|
12.2.8 Automotive Cybersecurity |
|
|
587 | (1) |
|
12.3 Outlook and Further Reading |
|
|
588 | (3) |
|
|
588 | (2) |
|
|
590 | (1) |
|
References and Further Readings |
|
|
591 | (4) |
Glossary |
|
595 | (28) |
Index |
|
623 | |