Electronic design in a position to take the lead in Indy

Electronic Design’s 104th edition access to the Indianapolis 500 exceeded two days of lost turns at a speed of 222,086 mph in qualifying August 16 through Sunday, August 23.

After qualifying a year ago, DragonSpeed only showed team participation last week. Problems in the drive axis, which ended the team’s race in 2019 a year ago after just 10 laps, also slowed down the process, although team officials said they were focusing on preparing the car.for the ultimate race to focus strictly on the speed of qualification.

“Time passed on the track, too bad, but knowing that we’re on the screen allows us to focus on locating our fundamental race setup rather than qualifying,” said Elton Julian, DragonSpeed ​​team principal. “With Tom Brown joining Paul Thomas on Standing, we adopted the same calm, methodical technique as last year, but focused on other things.”

“We spent our first day on the track creating a base configuration forged for the race,” Hanley said.”We worked on many options, but complicated situations made it more difficult to read the effect of the various settings of the day., we were able to identify some disorders that we believe we can improve for classification and career.

The car features a new décor and new sponsors for this year’s Indy 500, which was postponed from its classic Start time for Memorial Day weekend due to the pandemic.In addition to Endeavour Business Media’s electronic design and machine design, sponsors come with Chevrolet accessories, DragonSpeed IMSA LMP2’s Flex-Box spouse and Toledo Building Services, plus 10Star Solutions, Rembrandt Charms and Motul.

“We are grateful to the NTT Series Indycar, Roger Penske, Chevrolet, Firestone and our sponsors for helping us get here and look forward to betting our component on a wonderful show,” Julian said.

By submitting this form and its non-public form, you perceive and agree that the form provided herein will be processed, stored and used to provide you with the requested in accordance with Endeavor Business Media’s terms of use and privacy policy.

As of our services, you agree to obtain magazines, electronic newsletters and other communications about Endeavour Business Media’s related offers, its brands, affiliates and/or third parties in accordance with Endeavour’s privacy policy..com or by mail to Endeavour Business Media, LLC, 331 54th Avenue N., Nashville, TN 37209.

You may opt out of receiving our communications at any time by sending an email to [email protected].

Automatic keyless access provides convenience, however, this feature gives hackers a new way to unlock or use borrowed cars.Learn about the communication protocols in question and how UWB can make it more secure.

What to learn:

With the COVID-19 pandemic shelter in place and a significant number of workers now fleeing home, consumers are driving less and, unfortunately, are seeing an increase in car theft.The Associated Press reported in May 2020 that major cities such as New York and Los Angeles have noticed an increase in car theft.

Even before this “new normal” we know in the COVID-19 era, the National Insurance Crimes Bureau (NICB) reported that an average of 209 cars were stolen per day in the United States because drivers forgot their car keys, making it less difficult to steal.

If leaving the keychains is an unfortunate mistake that exposes drivers to theft, another vulnerability is to facilitate car theft: smart keys and access to the car through a smartphone.

While keyless access is popular in many cars sold today, this feature is not absolutely secure.Despite all the convenience that smart keys and smartphones provide to drivers, it has given hackers a new way to unlock or borrow cars via wireless protocols that in fact, the existing wireless protocols that are used are probably to allow criminals to divert the signal from a car key.

Three communication protocols refer to the activation of a smart key or smartphone for unlocking a vehicle: Bluetooth Low Energy, Ultra-Broadband (UWB) and Near Box Communication (NFC), the latter is basically used as a backup.protocols are not equivalent in terms of security.

Low-energy Bluetooth

For some time, Bluetooth Low Eenergy (BLE) has been used in cars to unlock/lock and attach multimedia programs, to pair a smartphone with media console for voice calls or music streaming apps.

BLE is one of the wireless communication technologies via a smart key or smartphone when handling a car.In newer car keys, BLE communication is basically used to track a driver’s technique beyond the distance of 10 meters, while preparing UWB authentication.Knowledge packs, BLE relies on measuring the strength of signals to assess the distance of the driver.

Unfortunately, despite some degree of encryption, BLE may be subject to interference and relay attacks or intermediaries.In a relay attack, the communication of the valid key is forged through a hacker by amplifying the force of its sign and tricking the receiver.believing that the key is near. If a hacker can sniff and reproduce the knowledge exchange between the key and the car, it is possible to unlock the car and borrow it.

Uwb

Founded on IEEE802.15.4z, ultra-broadband is a popular new technology that can be used in wireless input systems to save you distance manipulation attacks: short UWB pulses are used for a flight time (ToF) and an accurate, safe angle.(AoA). ToF measures the propagation time it takes for the RF signal between the transmitter and receiver.AoA measures the angle of an incoming signal using multiple antennas.Positions can be taken in our minds by having multiple angles, multiple distances or a mixture of the two.

With UWB, once the two devices (in this case, the smart key/smartphone and car) are nearby, they start measuring and calculating the distance with a one-centimeter point of accuracy between them.when it is, for example, less than two meters from the vehicle, depending on the direction of movement (away or closer).

Unlike BLE, UWB is based on time and not signal strength.Therefore, a relay attack will not apply to UWB, as the attack will load latency on the stream and imply that the key is away from the receiver.from a coded time series (STS) to the UWB frame – an “encrypted” measure of a timestamp – prevents preamble insertion attacks and allows even more accurate distance measurements.Figure 1 shows the BLE and UWB distance for car access.

1.Se the distances of Bluetooth Low Energy and UWB for cars are shown.

New UWB-enabled technical features related to a smartphone can not only provide safer access, but also new ones, such as locating your vehicle in a parking lot.

NFC redundancy

NFC offers the same locking and unlocking capability as UWB or BLE, however NFC is mainly used as a redundant formula in case the smartphone or smartphone battery runs out.Redundancy in automotive programs is very vital because a user does not need to be to unlock the car.

When a passive NFC device is placed in the box near an active device (the car), the passive device “wakes up” and communicates with the active device to perform an action, such as opening the door.

Although NFC is a much easier communication protocol and therefore does not have the same security benefits as UWB, it is a perfect backup formula for UWB because it has a very low consumption and requires much less battery than the device used., the smartphone or smartphone may have a built-in ability to recognize the point of strength to have at any given time and choose the communication protocol that will be used to unlock the vehicle. However, this is a less practical solution than the UWB because the car key must be kept in an active component of the car.

Conclusion

The 3 technologies can otherwise have keys and smartphones to allow the vehicle to enter without a key.The comparison table in Figure 2 summarizes the main technical facets of each communication protocol.

2.La table compares the vital technical facets of the communication protocol.

While a UWB chip is more expensive than BLE, the wireless protocol provides particularly superior security by ensuring that only the driving force has access to the car. The good luck of UWB-enabled smartphone or smartphone implementations will have the accuracy of their thin-scale capabilities, which make verification of test compliance and validation of functionality a successful implementation.

Joseph Sfeir is Director of Business Development at LitePoint.

By submitting this form and its non-public form, you perceive and agree that the form provided herein will be processed, stored and used to provide you with the requested in accordance with Endeavor Business Media’s terms of use and privacy policy.

As of our services, you agree to obtain magazines, electronic newsletters and other communications about Endeavour Business Media’s related offers, its brands, affiliates and/or third parties in accordance with Endeavour’s privacy policy..com or by mail to Endeavour Business Media, LLC, 331 54th Avenue N., Nashville, TN 37209.

You may opt out of receiving our communications at any time by sending an email to [email protected].

Leave a Comment

Your email address will not be published. Required fields are marked *