SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
GETELECTRICVEHICLE.COM getElectricVehicle.com
End to End Communication
Protection
CONTENTS
Introduction to E2E protection
E2E Library
Steps to use E2E Library
Monitoring algorithm
Conclusion
References
GETELECTRICVEHICLE.COM 2
INTRODUCTION
The concept of E2E protection assumes that safety related data exchange shall be protected
at runtime against the effects of faults within the communication link
Applicable for CAN, CANFD, FlexRay, Ethernet etc.
The E2E protection allows the following
It protects the safety-related data elements to be sent over the RTE by attaching control data
It verifies the safety-related data elements received from the RTE using this control data
It indicates that received safety-related data elements faulty, which then has to be handled by the receiver
SW-C
Aims to detect and mitigate systematic, random and transient faults
ISO 26262 – “Road vehicles – Functional safety” introduced in 2011 and it made E2E
securing important in Automotive industry
GETELECTRICVEHICLE.COM 3
E2E LIBRARY
E2E library provides mechanisms for
protection of safety related
communication – up to Automotive
Safety Integrity Level D
Various profiles are available in E2E
library for flexibility and
standardization
 Profile 1, Profile 2 etc.
P1 and P2 are configurable together
with E2E state machine
Users of E2E library are responsible for
correct usage such as providing valid
parameters
E2E library is allowed to call only a few
external functions
Crc_CaculateCRC8, Crc_CalculateCRC16,
Crc_CalculateCRC32P4,
Crc_CalculateCRCH2F,
Crc_CalculateCRC64
E2E library helps to detect errors but
does not handle errors
AUTOSAR E2E library is where the algorithms for E2E protection are implemented
GETELECTRICVEHICLE.COM 4
STEPS TO USE E2E LIBRARY
Select
architectural
approach to use
E2E library
Select data
elements to be
protected and
with which E2E
profile
Determine
settings for each
data element or
signal group to
be protected
Develops
necessary code
for invocation of
E2E library
functions
Users of E2E library do the following
GETELECTRICVEHICLE.COM 5
MONITORING ALGORITHM
Implementation of monitoring
algorithm requires history of data
up to a determined boundary
value N
Receiver creates a history of data
and updates a FIFO
Fig. 1: Example for a monitoring function to
determine integrity of communication within
a receiver
GETELECTRICVEHICLE.COM 6
HOW TO INVOKE E2E LIBRARY
Four methods are generally implemented to invoke E2E functionalities
1. Protection wrapper
• Non Standard integrator software to protect data above RTE
2. COM callout functions
3. Hybrid
4. Out of box protection at RTE level
GETELECTRICVEHICLE.COM 7
CONCLUSION
Security of data in communication is important
E2E security is relevant in automotive industry to comply with ASIL D standard
Briefly explained about E2E communication protection
Explained methods to use E2E library
GETELECTRICVEHICLE.COM 8
REFERENCES
https://www.autosar.org/
http://getelecticvehicle.com/
GETELECTRICVEHICLE.COM 9
THANK YOU 
getelectricvehicle.com
GETELECTRICVEHICLE.COM 10

Contenu connexe

Tendances

Automotive embedded systems part7 v1
Automotive embedded systems part7 v1Automotive embedded systems part7 v1
Automotive embedded systems part7 v1Keroles karam khalil
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPDai Yang
 
Webinar presentation on AUTOSAR Multicore Systems
Webinar presentation on AUTOSAR Multicore SystemsWebinar presentation on AUTOSAR Multicore Systems
Webinar presentation on AUTOSAR Multicore SystemsKPIT
 
Automotive embedded systems part1 v1
Automotive embedded systems part1 v1Automotive embedded systems part1 v1
Automotive embedded systems part1 v1Keroles karam khalil
 
AUTOSAR 403 CAN Stack
AUTOSAR 403 CAN StackAUTOSAR 403 CAN Stack
AUTOSAR 403 CAN StackRania Nabil
 
Automotive embedded systems part6 v1
Automotive embedded systems part6 v1Automotive embedded systems part6 v1
Automotive embedded systems part6 v1Keroles karam khalil
 
What is AUTOSAR Memory Stack | Software modules and device drivers
What is AUTOSAR Memory Stack | Software modules and device driversWhat is AUTOSAR Memory Stack | Software modules and device drivers
What is AUTOSAR Memory Stack | Software modules and device driversEmbitel Technologies (I) PVT LTD
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCOREARCCORE
 
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackWhat is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackEmbitel Technologies (I) PVT LTD
 
Autosar software component
Autosar software componentAutosar software component
Autosar software componentFarzad Sadeghi
 

Tendances (20)

ISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional SafetyISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional Safety
 
Automotive embedded systems part7 v1
Automotive embedded systems part7 v1Automotive embedded systems part7 v1
Automotive embedded systems part7 v1
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IP
 
KWP 2000 and UDS Protocols | Analysis & Comparison
KWP 2000 and UDS Protocols | Analysis & ComparisonKWP 2000 and UDS Protocols | Analysis & Comparison
KWP 2000 and UDS Protocols | Analysis & Comparison
 
Webinar presentation on AUTOSAR Multicore Systems
Webinar presentation on AUTOSAR Multicore SystemsWebinar presentation on AUTOSAR Multicore Systems
Webinar presentation on AUTOSAR Multicore Systems
 
Automotive embedded systems part1 v1
Automotive embedded systems part1 v1Automotive embedded systems part1 v1
Automotive embedded systems part1 v1
 
Iso26262 component reuse_webinar
Iso26262 component reuse_webinarIso26262 component reuse_webinar
Iso26262 component reuse_webinar
 
AUTOSAR 403 CAN Stack
AUTOSAR 403 CAN StackAUTOSAR 403 CAN Stack
AUTOSAR 403 CAN Stack
 
Automotive embedded systems part6 v1
Automotive embedded systems part6 v1Automotive embedded systems part6 v1
Automotive embedded systems part6 v1
 
EMBEDDED C
EMBEDDED CEMBEDDED C
EMBEDDED C
 
What is AUTOSAR Memory Stack | Software modules and device drivers
What is AUTOSAR Memory Stack | Software modules and device driversWhat is AUTOSAR Memory Stack | Software modules and device drivers
What is AUTOSAR Memory Stack | Software modules and device drivers
 
Misra c
Misra cMisra c
Misra c
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCORE
 
AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack). AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack).
 
Automative basics v3
Automative basics v3Automative basics v3
Automative basics v3
 
ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive ISO 26262 Unit Testing | Functional Safety in Automotive
ISO 26262 Unit Testing | Functional Safety in Automotive
 
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackWhat is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
 
Communication stack
Communication stackCommunication stack
Communication stack
 
UDS PPT
UDS PPTUDS PPT
UDS PPT
 
Autosar software component
Autosar software componentAutosar software component
Autosar software component
 

Similaire à End to End Communication protection

Ethernet Enabled Digital I/O Control in Embedded Systems
Ethernet Enabled Digital I/O Control in Embedded SystemsEthernet Enabled Digital I/O Control in Embedded Systems
Ethernet Enabled Digital I/O Control in Embedded SystemsIOSR Journals
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final projectssuser37e1ef
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks csandit
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paperAnwar Al Ahdab
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-complianceNir Cohen
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
 
1451synopsis 599 f-good nist
1451synopsis 599 f-good nist1451synopsis 599 f-good nist
1451synopsis 599 f-good nistriyapd10
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfSaiReddy794166
 
Ipsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieeeIpsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieeeSelva Raj
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureKumar Goud
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8Waqas Ahmed Nawaz
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device controleSAT Publishing House
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device controleSAT Journals
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 

Similaire à End to End Communication protection (20)

Ethernet Enabled Digital I/O Control in Embedded Systems
Ethernet Enabled Digital I/O Control in Embedded SystemsEthernet Enabled Digital I/O Control in Embedded Systems
Ethernet Enabled Digital I/O Control in Embedded Systems
 
Proposal for final project
Proposal for final projectProposal for final project
Proposal for final project
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Towards design strong emergency and COVID-19 authentication scheme in VANET
Towards design strong emergency and COVID-19  authentication scheme in VANETTowards design strong emergency and COVID-19  authentication scheme in VANET
Towards design strong emergency and COVID-19 authentication scheme in VANET
 
1451synopsis 599 f-good nist
1451synopsis 599 f-good nist1451synopsis 599 f-good nist
1451synopsis 599 f-good nist
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
 
Ipsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieeeIpsn08 tiny ecc-ieee
Ipsn08 tiny ecc-ieee
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
PID2143641
PID2143641PID2143641
PID2143641
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device control
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device control
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 

Plus de SibiKrishnan

Top 75 Electric Vehicle Research Project Ideas
Top 75 Electric Vehicle Research Project IdeasTop 75 Electric Vehicle Research Project Ideas
Top 75 Electric Vehicle Research Project IdeasSibiKrishnan
 
Electric Car Quotes: The Best Quotes about Electric Vehicle
Electric Car Quotes: The Best Quotes about Electric VehicleElectric Car Quotes: The Best Quotes about Electric Vehicle
Electric Car Quotes: The Best Quotes about Electric VehicleSibiKrishnan
 
Top 9 Alternative Fuels for Gasoline Cars
Top 9 Alternative Fuels for Gasoline CarsTop 9 Alternative Fuels for Gasoline Cars
Top 9 Alternative Fuels for Gasoline CarsSibiKrishnan
 
Electric cars vs gas cars
Electric cars vs gas carsElectric cars vs gas cars
Electric cars vs gas carsSibiKrishnan
 
How Promising Will be the Future of EV?
How Promising Will be the Future of EV?How Promising Will be the Future of EV?
How Promising Will be the Future of EV?SibiKrishnan
 
Common Questions about Electric Vehicles
Common Questions about Electric VehiclesCommon Questions about Electric Vehicles
Common Questions about Electric VehiclesSibiKrishnan
 
Interesting facts about Electric Vehicles
Interesting facts about Electric VehiclesInteresting facts about Electric Vehicles
Interesting facts about Electric VehiclesSibiKrishnan
 
Electric Vehicle Project Ideas
Electric Vehicle Project IdeasElectric Vehicle Project Ideas
Electric Vehicle Project IdeasSibiKrishnan
 

Plus de SibiKrishnan (8)

Top 75 Electric Vehicle Research Project Ideas
Top 75 Electric Vehicle Research Project IdeasTop 75 Electric Vehicle Research Project Ideas
Top 75 Electric Vehicle Research Project Ideas
 
Electric Car Quotes: The Best Quotes about Electric Vehicle
Electric Car Quotes: The Best Quotes about Electric VehicleElectric Car Quotes: The Best Quotes about Electric Vehicle
Electric Car Quotes: The Best Quotes about Electric Vehicle
 
Top 9 Alternative Fuels for Gasoline Cars
Top 9 Alternative Fuels for Gasoline CarsTop 9 Alternative Fuels for Gasoline Cars
Top 9 Alternative Fuels for Gasoline Cars
 
Electric cars vs gas cars
Electric cars vs gas carsElectric cars vs gas cars
Electric cars vs gas cars
 
How Promising Will be the Future of EV?
How Promising Will be the Future of EV?How Promising Will be the Future of EV?
How Promising Will be the Future of EV?
 
Common Questions about Electric Vehicles
Common Questions about Electric VehiclesCommon Questions about Electric Vehicles
Common Questions about Electric Vehicles
 
Interesting facts about Electric Vehicles
Interesting facts about Electric VehiclesInteresting facts about Electric Vehicles
Interesting facts about Electric Vehicles
 
Electric Vehicle Project Ideas
Electric Vehicle Project IdeasElectric Vehicle Project Ideas
Electric Vehicle Project Ideas
 

Dernier

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

End to End Communication protection

  • 2. CONTENTS Introduction to E2E protection E2E Library Steps to use E2E Library Monitoring algorithm Conclusion References GETELECTRICVEHICLE.COM 2
  • 3. INTRODUCTION The concept of E2E protection assumes that safety related data exchange shall be protected at runtime against the effects of faults within the communication link Applicable for CAN, CANFD, FlexRay, Ethernet etc. The E2E protection allows the following It protects the safety-related data elements to be sent over the RTE by attaching control data It verifies the safety-related data elements received from the RTE using this control data It indicates that received safety-related data elements faulty, which then has to be handled by the receiver SW-C Aims to detect and mitigate systematic, random and transient faults ISO 26262 – “Road vehicles – Functional safety” introduced in 2011 and it made E2E securing important in Automotive industry GETELECTRICVEHICLE.COM 3
  • 4. E2E LIBRARY E2E library provides mechanisms for protection of safety related communication – up to Automotive Safety Integrity Level D Various profiles are available in E2E library for flexibility and standardization  Profile 1, Profile 2 etc. P1 and P2 are configurable together with E2E state machine Users of E2E library are responsible for correct usage such as providing valid parameters E2E library is allowed to call only a few external functions Crc_CaculateCRC8, Crc_CalculateCRC16, Crc_CalculateCRC32P4, Crc_CalculateCRCH2F, Crc_CalculateCRC64 E2E library helps to detect errors but does not handle errors AUTOSAR E2E library is where the algorithms for E2E protection are implemented GETELECTRICVEHICLE.COM 4
  • 5. STEPS TO USE E2E LIBRARY Select architectural approach to use E2E library Select data elements to be protected and with which E2E profile Determine settings for each data element or signal group to be protected Develops necessary code for invocation of E2E library functions Users of E2E library do the following GETELECTRICVEHICLE.COM 5
  • 6. MONITORING ALGORITHM Implementation of monitoring algorithm requires history of data up to a determined boundary value N Receiver creates a history of data and updates a FIFO Fig. 1: Example for a monitoring function to determine integrity of communication within a receiver GETELECTRICVEHICLE.COM 6
  • 7. HOW TO INVOKE E2E LIBRARY Four methods are generally implemented to invoke E2E functionalities 1. Protection wrapper • Non Standard integrator software to protect data above RTE 2. COM callout functions 3. Hybrid 4. Out of box protection at RTE level GETELECTRICVEHICLE.COM 7
  • 8. CONCLUSION Security of data in communication is important E2E security is relevant in automotive industry to comply with ASIL D standard Briefly explained about E2E communication protection Explained methods to use E2E library GETELECTRICVEHICLE.COM 8