Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-2xdlg Total loading time: 0 Render date: 2024-07-02T02:59:12.473Z Has data issue: false hasContentIssue false

7 - Protocols for Automotive Ethernet

Published online by Cambridge University Press:  06 April 2021

Kirsten Matheus
Affiliation:
BMW, Munich
Thomas Königseder
Affiliation:
Technica Engineering, Munich
Get access

Summary

One of the key advantages to use Automotive Ethernet is the large number of protocols that can be used with it. This chapter explains the options that exist for Quality of Service with the Time Sensitive Networking standards. It furthermore addresses the topic of switches and virtual LANs, of IP-related decisions, and of a communication middleware that enables service-oriented communication also in the in-vehicle network. Furthermore, the basics of Automotive Ethernet related security are described.

Type
Chapter
Information
Automotive Ethernet , pp. 247 - 314
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Völker, L., “One for All; Interoperability from AUTOSAR to GENIVI,” in 1st Ethernet & IP @ Automotive Technology Day, Munich, 2011.Google Scholar
ITWissen, “QoS (Quality of Service),” 2020, continuously updated. [Online]. Available: www.itwissen.info/QoS-quality-of-service-Dienstguete.html. [Accessed August 15, 2016].Google Scholar
ITU, Definitions of Terms Related to Quality of Service, Geneva: ITU, 2008.Google Scholar
ITU-T, Network Performance Objectives for IP-based Services, Geneva: ITU, 2011.Google Scholar
Brand, R., Carlson, S., Gildred, J., Lim, S., Cavendish, D., and Haran, O., “Residential Ethernet, IEEE 802.3 Call for Interest,” July 2004. [Online]. Available: http://grouper.ieee.org/groups/802/3/re_study/public/200407/cfi_0704_1.pdf. [Accessed May 6, 2020].Google Scholar
Lamont, T., “Napster: the Day the Music Was Set Free,” February 24, 2013. [Online]. Available: www.theguardian.com/music/2013/feb/24/napster-music-free-file-sharing. [Accessed May 6, 2020].Google Scholar
Gartner, “Gartner Says Declining Worldwide PC Shipments in Fourth Quarter of 2012 Signal Structural Shift of PC Market,” January 14, 2013. [Online]. Available: www.bloomberg.com/press-releases/2013-01-14/gartner-says-declining-worldwide-pc-shipments-in-fourth-quarter-of-2012-signal-structural-shift-of-pc-market. [Accessed May 20, 2020].Google Scholar
Teener, M. Johas, “No-excuses Audio/Video Networking: the Technology Behind AVnu,” August 24, 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/No-excuses-Audio-Video-Networking-v2.pdf. [Accessed May 20, 2020].Google Scholar
IEEE 802.3, “IEEE 802.3 Residential Ethernet Study Group Homepage,” January 10, 2006 (closed). [Online]. Available: http://grouper.ieee.org/groups/802/3/re_study/. [Accessed May 6, 2020].Google Scholar
Business Wire, “AVnu Alliance Launches to Advance Quality of Experience for Networked Audio and Video,” August 25, 2009. [Online]. Available: www.businesswire.com/news/home/20090825005929/en/AVnu-Alliance-Launches-Advance-Quality-Experience-Networked. [Accessed May 6, 2020].Google Scholar
Marvell, “Marvell Announces Industry-First Audio Video Bridging Family of SoCs with Integrated Switching, CPU and Endpoint Functionality,” May 8, 2012. [Online]. Available: www.marvell.com/company/newsroom/marvell-announces-industry-first-audio-video-bridging-family-of-socs-with-integrated-switching-cpu-and-endpoint-functionality.html. [Accessed May 20, 2020].Google Scholar
Urban, J., “Debunking Some Myths About AVB,” May 17, 2013. [Online]. Available: http://blog.biamp.com/debunking-some-myths-about-avb/. [Accessed May 20, 2020].Google Scholar
IEEE 802.1, “802.1 Plenary –11/2012 San Antonio Closing Slides,” November 2012. [Online]. Available: www.ieee802.org/1/files/public/minutes/2012-11-closing-plenary-slides.pdf. [Accessed May 6, 2020].Google Scholar
Hellerud, E., “Transmission of High Quality Audio over IP Networks,” April 2009. [Online]. Available: https://core.ac.uk/download/pdf/52128195.pdf. [Accessed May 20, 2020].Google Scholar
Kreifeld, R., “AVB for Professional A/V Use,” July 30, 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/AVnu-Pro__White-Paper.pdf. [Accessed May 20, 2020].Google Scholar
Kaltheuner, H., “Das Universalnetz, Ethernet AVB: Echtzeitfähig und Streaming-tauglich,” c’t, no. 13, pp. 176181, 2013.Google Scholar
Teener, M. Johas, “Residential Ethernet Objectives, Requirements and Possible Solutions,” May 9, 2009. [Online]. Available: www.ieee802.org/1/files/public/docs2005/liaison-mikejt-rese-objectives-requirements-0505.pdf. [Accessed May 20, 2020].Google Scholar
Steinmetz, R., “Human Perception of Jitter and Media Synchronization,” IEEE Journal on Selected Areas in Communication, vol. 14, no. 1, pp. 6172, January 1996.Google Scholar
Stanton, K., “AVB for Home/Consumer Electronics Use,” August 11, 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/AVB-for-Home-Consumer-Electronics-Use__White-Paper.pdf. [Accessed May 20, 2020].Google Scholar
Held, F., “Digitale Audio-, Video- & Licht-Kommunikationsprotokolle in der Veranstaltungstechnik,” October 12, 2012. [Online]. Available: https://entropia.de/wiki/images/b/b8/Avb_vortrag_felix.pdf. [Accessed May 20, 2020].Google Scholar
Boatright, R., “Understanding New Audio Video Bridging Standards,” May 10, 2009. [Online]. Available: www.embedded.com/understanding-ieees-new-audio-video-bridging-standards/. [Accessed October 24, 2013].Google Scholar
Schettke, M., “AVB Audionetzwerke in der Praxis: Betriebssicherheit und deren automatisierte Überprüfung,” June 10, 2014. [Online]. Available: http://schettke.com/files/Diplomarbeit_AVB-Praxis_Schettke_2014.pdf. [Accessed May 20, 2020].Google Scholar
Kreifeld, R., “AVB for Automotive Use,” July 20, 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/2014-11-20_AVnu-Automotive-White-Paper_Final_Approved.pdf. [Accessed October 20, 2013, only updated version available].Google Scholar
Kicherer, M. (Turner) and Königseder, T., “BMW Proposal for an AVB Gen 2 Automotive Profile,” BMW White Paper, Munich, 2013.Google Scholar
Matheus, K., Kicherer, M. (Turner), and Königseder, T., “Audio/Video Transmission in Cars using Ethernet,” BMW White Paper, Munich, 2010.Google Scholar
Hogenmüller, T., “Use Cases & Requirements for IEEE 802.3 RTPGE Ethernet,” May 2012. [Online]. Available: http://grouper.ieee.org/groups/802/3/RTPGE/public/may12/hogenmuller_01_0512.pdf. [Accessed May 20, 2020].Google Scholar
Matheus, K., Kaindl, M., Korzine, S., Goncalvez, D., Leslie, J., Okuno, Y., Kitajima, N., Gardner, M., Orosz, R., Jaenecke, M., Kim, D., Mei, R., and Knorre, D. v., “1 Pair or 2 Pairs for RTPGE: Impact on System Other than the PHY Part 1: Weight & Space,” January 2013. [Online]. Available: www.ieee802.org/3/bp/public/jan13/matheus_3bp_01_0113.pdf. [Accessed May 14, 2020].Google Scholar
IEEE Computer Society, 1722-2016 – IEEE Standard for a Transport Protocol for Time-Sensitive Applications in Bridged Local Area Networks, New York: IEEE, 2016.Google Scholar
Schulzrinne, H., Casner, S., Frederick, R., and Jacobson, V., “RTP: A Transport Protocol for Real-Time Applications,” July 2003. [Online]. Available: http://tools.ietf.org/html/rfc3550. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1AS-2011 – IEEE Standard for Local and Metropolitan Area Networks – Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks, New York: IEEE SA, 2011.Google Scholar
IEEE Computer Society, 1588-2008 – IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, New York: IEEE, 2008.Google Scholar
Hirschmann, “Precision Clock Synchronization, The Standard IEEE 1588,” 2008. [Online]. Available: www.belden.com/docs/upload/precision_clock_synchronization_wp.pdf. [Accessed October 28, 2013, no longer available].Google Scholar
EndRun Technologies, “Precision Time Protocol (PTP/IEEE-1588),” 2013. [Online]. Available: www.endruntechnologies.com/pdf/PTP-1588.pdf. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1Q-2011 – IEEE Standard for Local and Metropolitan Area Networks – Media Access Control (MAC) Bridges and Virtual Bridge Local Area Networks, New York: IEEE, 2011.Google Scholar
Bechtel, G., Gale, B., Kicherer, M. (Turner), and Olsen, D., Automotive Ethernet AVB Functional and Interoperability Specification, Revision 1.4, Beaverton: Avnu, 2015.Google Scholar
Stein, S. and Racu, R., “Ethernet Quality of Service @ Volkswagen,” in 2nd Ethernet & IP @ Automotive Technology Day, Regensburg, 2012.Google Scholar
Diemer, J., Thiele, D., and Ernst, R., “Formal Worst-Case Timing Analysis of Ethernet Topologies with Strict-Priority and AVB Switching,” in 7th IEEE International Symposium on Industrial Embedded Systems (SIES12), Karlsruhe, 2012.Google Scholar
IEEE Computer Society, 1733-2011 – IEEE Standard for Layer 3 Transport Protocol for Time-Sensitive Applications in Local Area Networks, New York: IEEE, 2011.Google Scholar
Damori, J., “Are Layer 2 or Layer 3 protocols better? Yes,” May 31, 2013. [Online]. Available: http://blog.biamp.com/are-layer-2-or-layer-3-protocols-better-yes/. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1BA-2011 – IEEE Standard for Local and Metropolitan Are Networks – Audio Video Bridging (AVB) Systems, New York: IEEE SA, 2011.Google Scholar
IEEE Computer Society, 1722.1-2013 – IEEE Standard for Device Discovery, Connection Management, and Control Protocol for IEEE 1722 Based Devices, New York: IEEE, 2013.Google Scholar
Lane, J., “Digital Audio Listening in Car Is Increasing,” October 11, 2010. [Online]. Available: http://audio4cast.com/2010/10/11/digital-audio-listening-in-car-is-increasing/. [Accessed May 20, 2020].Google Scholar
Jochim, M. and Osella, M., “The Need for IEEE Standardized Ethernet Mechanisms for Active Safety Applications,” in 3rd Ethernet & IP @ Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
IEEE 802.1, “P802.1DG – TSN Profile for Automotive In-Vehicle Ethernet Communications Homepage,” IEEE, 2019 (continuously updated). [Online]. Available: https://1.ieee802.org/tsn/802-1dg/. [Accessed April 14, 2020].Google Scholar
Zinner, H. and Hopf, D., “Time Sensitive Networking,” in AVnu TSN Automotive Workshop and Tutorial, Munich, 2017.Google Scholar
Wikipedia, “Time-Sensitive Networking,” March 5, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Time-Sensitive_Networking. [Accessed April 18, 2020].Google Scholar
Pannell, D., “Choosing the Right Tools to Meet a Bounded Latency,” in Automotive Ethernet Congress, Munich, 2020.Google Scholar
Zebralla, D. (Hopf), “Requirements on Future In-Vehicle Architectures for Automotive Ethernet,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Bechtel, G., “P1722b PAR,” October 28, 2019. [Online]. Available: http://grouper.ieee.org/groups/1722/contributions/2020/1722bPAR/P1722b_PAR_Detail-2020-01-14.pdf. [Accessed April 14, 2020].Google Scholar
Pannell, D., “Audio Video Bridging Gen 2 Assumptions,” July 16, 2013. [Online]. Available: www.ieee802.org/1/files/public/docs2013/avb-pannell-gen2-assumptions-0313-v15.pdf. [Accessed April 17, 2020].Google Scholar
IEEE Computer Society, 802.1AS-2020 – IEEE Standard for Local and Metropolitan Area Networks – Timing and Synchronization for Time-Sensitive Applications, New York: IEEE-SA, 2020.Google Scholar
IEEE Computer Society, 802.1Qcc-2018 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment 31: Stream Reservation Protocol (SRP) Enhancements and Performance Improvements, New York: IEEE-SA, 2018.Google Scholar
Wikipedia, “TTEthernet,” April 10, 2020. [Online]. Available: http://en.wikipedia.org/wiki/TTEthernet/TTEthernet. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1Qbv-2015 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks Amendment 25: Enhancements for Scheduled Traffic, New York: IEEE-SA, 2015.Google Scholar
Pannell, D., “IEEE TSN Standards Overview & Update,” in 5th Ethernet & IP @ Automotive Technology Day, Yokohama, 2015.Google Scholar
IEEE Computer Society, 802.3br-2016 – IEEE Standard for Ethernet Amendment 5: Specification and Management Parameters for Interspersing Express Traffic, New York: IEEE-SA, 2016.Google Scholar
IEEE Computer Society, 802.1Qbu-2016 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment 26: Frame Preemption, New York: IEEE-SA, 2016.Google Scholar
IEEE Computer Society, 802.1Qch-2017 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment 29: Cyclic Queuing and Forwarding, New York: IEEE-SA, 2017.Google Scholar
IEEE Computer Society, 802.1Qcr-2020 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment: Asynchronous Traffic Shaping, New York: IEEE-SA, 2020 (est.).Google Scholar
IEEE Computer Society, 802.1Qca-2015 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment 24: Path Control and Reservation, New York: IEEE-SA, 2015.Google Scholar
IEEE Computer Society, 802.1CB-2017 – IEEE Standard for Local and Metropolitan Area Networks – Frame Replication and Elimination for Reliability, New York: IEEE-SA, 2017.Google Scholar
Jochim, M., “Ingress Policing,” November 10–14, 2013. [Online]. Available: www.ieee802.org/1/files/public/docs2013/tsn-jochim-ingress-policing-1113-v2.pdf. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1Qci-2017 – IEEE Standard for Local and Metropolitan Area Networks – Bridges and Bridged Networks – Amendment 28: Per-Stream Filtering and Policing, New York, IEEE-SA, 2017.Google Scholar
Matheus, K., “The Use of AVB and TSN in Automotive,” in TSNA, Stuttgart, 2017.Google Scholar
Zinner, H., “Recap on TSN Specs with Focus on Effort,” in AVnu TSN Automotive Workshop and Tutorial, San Jose, CA, 2017.Google Scholar
Gale, B., “Ethernet Security in the Car,” in IEEE-SA Ethernet & IP @ Automotive Technology Day, Detroit, 2014.Google Scholar
Kim, Y., “Ethernet Security,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Stevens, W. R., TCP/IP Illustrated, Volume 1, The Protocols, Reading, MA: Addison Wesley Longman, 1994.Google Scholar
Wikipedia, “Internet Protocol Suite,” Wikipedia, April 27, 2020. [Online]. Available: http://en.wikipedia.org/wiki/Internet_protocol_suite. [Accessed May 6, 2020].Google Scholar
Information Sciences Institute University of Southern California, “Transmission Control Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc793. [Accessed May 20, 2020].Google Scholar
Information Sciences Institute University of Southern California, “Internet Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc791. [Accessed May 6, 2020].Google Scholar
Postel, J., “User Datagram Protocol,” August 29, 1980. [Online]. Available: http://tools.ietf.org/html/rfc768. [Accessed May 6, 2020].Google Scholar
Kessler, M., “Ethernet in Small ECUs, Challenges and Chances,” in 3rd Ethernet & IP @ Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
Wikipedia, “Motor Industry Software Reliability Association,” March 2, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Motor_Industry_Software_Reliability_Association. [Accessed April 19, 2020].Google Scholar
Rekhter, Y., Moskowitz, B., Karrenberg, G. D., and Lear, E., “Address Allocation for Private Internets,” February 1996. [Online]. Available: https://tools.ietf.org/html/rfc1918. [Accessed April 19, 2020].Google Scholar
3Com, “Understanding IP Addressing, Everything You Ever Wanted to Know,” 2001. [Online]. Available: http://pages.di.unipi.it/ricci/501302.pdf. [Accessed May 20, 2020].Google Scholar
Number Resource Organization, “Free Pool of IPv4 Address Space Depleted,” February 3, 2011. [Online]. Available: www.nro.net/news/ipv4-free-pool-depleted. [Accessed May 6, 2020].Google Scholar
Deering, S. and Hinden, R., “Internet Protocol, Version 6 (IPv6),” December 1995. [Online]. Available: http://tools.ietf.org/html/rfc1883. [Accessed May 6, 2020].Google Scholar
Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and Li, X., “IPv6 Addressing of IPv4/IPv6 Translators,” October 2010. [Online]. Available: http://tools.ietf.org/html/rfc6052. [Accessed May 20, 2020].Google Scholar
RIPE NCC, “The RIPE NCC Has Run out of IPv4 Addresses,” November 25, 2019. [Online]. Available: www.ripe.net/publications/news/about-ripe-ncc-and-ripe/the-ripe-ncc-has-run-out-of-ipv4-addresses. [Accessed April 19, 2020].Google Scholar
InfiniBand Trade Association, Supplement to InfiniBand Architecture Specification Volume 1 Release 1.2.1, Beaverton: InfiniBand Trade Association, 2010.Google Scholar
Busnelli, A., “Car Software: 100M Lines of Code and Counting,” June 26, 2014. [Online]. Available: www.linkedin.com/pulse/20140626152045-3625632-car-software-100m-lines-of-code-and-counting. [Accessed May 20, 2020].Google Scholar
The Apache Software Foundation, “Apache Etch,” 2020, continuously updated. [Online]. Available: http://etch.apache.org/. [Accessed May 20, 2020].Google Scholar
Bouard, A., Schanda, J., Herrscher, D., and Eckert, C., “Automotive Proxy-based Security Architecture for CE Device Integration,” in Mobile Wireless Middleware, Operating Systems, and Applications, Heidelberg: Springer, 2013, pp. 6276.Google Scholar
Weckemann, K., Satzger, F., Stolz, L., Herrscher, D., and Linnhoff-Popien, C., “Lessons from a Minimal Middleware for IP-Based In-Car Communication,” in Proceedings of the IEEE Intelligent Vehicles Symposium, Alcala de Henares, 2012.Google Scholar
Google Developers, “Protocol Buffers,” Google Developers, April 2, 2012. [Online]. Available: https://developers.google.com/protocol-buffers/. [Accessed May 20, 2020].Google Scholar
Apple, “Bonjour for Developers,” Apple, 2020, continuously updated. [Online]. Available: https://developer.apple.com/bonjour/. [Accessed May 20, 2020].Google Scholar
Völker, L., “Scalable Service-Oriented Middleware over IP (SOME/IP),” 2020, continuously updated. [Online]. Available: http://some-ip.com. [Accessed May 20, 2020].Google Scholar
AUTOSAR, “SOME/IP Protocol Specification R19-11,” November 28, 2019. [Online]. Available: www.autosar.org/fileadmin/user_upload/standards/foundation/19-11/AUTOSAR_PRS_SOMEIPProtocol.pdf. [Accessed May 5, 2020].Google Scholar
Wikipedia, “Data Distribution Service,” March 5, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Data_Distribution_Service. [Accessed May 5, 2020].Google Scholar
Object Management Group, Data Distribution Service v.1.4, Needham, MA: Object Management Group, 2015.Google Scholar
Object Management Group, RPC Over DDS v.1.0, Needham, MA: Object Management Group, 2017.Google Scholar
Moussalli, R., “Dealing with Security Threats in the Digital Age: Part 1,” August 19, 2015. [Online]. Available: www.tatacommunications.com/blog/2015/08/dealing-with-security-threats-in-the-digital-age-part-1/. [Accessed May 20, 2020].Google Scholar
Miller, C. and Valasek, C., “Remote Exploitation of an Unaltered Passenger Vehicle,” August 10, 2015. [Online]. Available: http://illmatics.com/Remote%20Car%20Hacking.pdf. [Accessed May 20, 2020].Google Scholar
Greenberg, A., “Remote Exploitation of an Unaltered Passenger Vehicle,” July 21, 2015. [Online]. Available: www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [Accessed May 20, 2020].Google Scholar
SANS Institute, “The Best Security Books to Have in Your Library,” SANS Institute, 2020. [Online]. Available: www.sans.edu/research/book-reviews/article/security-books-best. [Accessed May 20, 2020].Google Scholar
Singer, S., “IP Based Communication in Vehicles – Learnings from the IT Industry,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Molter, H. G., “Introduction to Security,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Information Security, “Who Is the Creator of the CIA Triad,” December 27, 2013. [Online]. Available: https://security.stackexchange.com/questions/47697/who-is-the-creator-of-the-cia-triad. [Accessed April 23, 2020].Google Scholar
Wikipedia, “SYN Flood,” May 4, 2020. [Online]. Available: https://en.wikipedia.org/wiki/SYN_flood. [Accessed May 20, 2020].Google Scholar
AUTOSAR, “Specification of Secure Onboard Communication, Release 4.3.1,” December 8, 2017. [Online]. Available: www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_SWS_SecureOnboardCommunication.pdf. [Accessed May 5, 2020].Google Scholar
SAE, “Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, J3061,” SAE international, Warrendale, 2016.Google Scholar
ISO/SAE, DIS 21434 Road Vehicles – Cybersecurity Engineering, Geneva: ISO, 2020.Google Scholar
Goto, H., “In-Vehicle Ethernet Technology Promoted by JASPAR and Industry Trends,” in 4th Nikkei Electronics/Automotive Seminar, Tokyo, 2016.Google Scholar
Pallierer, R. and Ziehensack, M., “Secure Ethernet for Autonomous Driving,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Rescorla, E., “The Transport Layer Security (TLS) Protocol Version 1.3,” August 2018. [Online]. Available: https://tools.ietf.org/html/rfc8446. [Accessed April 21, 2020].Google Scholar
Dierks, T. and Rescorla, E., “The Transport Layer Security (TLS) Protocol Version 1.2,” August 2008. [Online]. Available: https://tools.ietf.org/html/rfc5246. [Accessed May 20, 2020].Google Scholar
Rescorla, E. and Modadugu, N., “Datagram Transport Layer Security,” April 2006. [Online]. Available: https://tools.ietf.org/html/rfc4347. [Accessed April 21, 2020].Google Scholar
Lindner, M., “Security Architecture for IP (IPsec),” 2007. [Online]. Available: www.ict.tuwien.ac.at/lva/384.081/infobase/L97-IPsec_v4-7.pdf. [Accessed May 20, 2020].Google Scholar
Wikipedia, “IPsec,” May 12, 2020. [Online]. Available: http://en.wikipedia.org/wiki/Ipsec. [Accessed May 20, 2020].Google Scholar
IEEE Computer Society, 802.1AEcg-2017 – IEEE Standard for Local and Metropolitan Area Networks – Media Access Control (MAC) Security – Amendment 3: Ethernet Data Encryption devices, New York: IEEE-SA, 2017.Google Scholar
Völker, L., “Comparing Automotive Network Security for Different Communication Technologies,” in Automotive Ethernet Congress, 2018.Google Scholar
Völker, L., “Why Is Network Security in Vehicles so Hard?,” in Automotive Networks – IVN Technologies and EE Architecture, Munich, 2018.Google Scholar
Völker, L., Choosing Network Security Solutions: Guidance for Automotive Use Cases, Munich: Technica Engineering GmbH, 2020.Google Scholar
Kleidermacher, D. and Kleidermacher, M., Embedded Systems Security – Practical Methods for Safe and Secure Software and Systems Development, Oxford: Newnes, 2012.Google Scholar
Wikipedia, “Books on Cryptography,” April 6, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Books_on_cryptography. [Accessed May 20, 2020].Google Scholar
Apvrille, L., El Khayari, R., Henniger, O., Roudier, Y., Schweppe, H., Seudié, H., Weyl, B., and Wolf, M., “Secure Automotive On-board Electronics Network Architecture,” May 30, 2010. [Online]. Available: www.evita-project.org/Publications/AEHR10.pdf. [Accessed May 20, 2020].Google Scholar
Musical Instrument Digital Interface manufacturers association (MIDI), “IEEE Ethernet AVB, AVB and MIDI,” 2013. [Online]. Available: www.midi.org/techspecs/avbtp.php. [Accessed November 2, 2013, no longer available].Google Scholar
Teener, M. Johas, “IEEE 802 Time-Sensitive Networking: Extending Beyond AVB,” in 3rd Ethernet & IP @ Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
DLNA, “DLNA Fulfills Mission, Dissolves as non-Profit Trade Association,” January 5, 2017. [Online]. Available: www.dlna.org/about/organization/. [Accessed April 13, 2020].Google Scholar
Glaß, M., Herrscher, D., Meier, H., Piastowski, M., and Schoo, P., “SEIS – Sicherheit in Eingebetteten IP-Basierten Systemen,” ATZelektronik, vol. 5, no. 1, pp. 5055, 2010.Google Scholar
DLNA, “About DLNA,” DLNA, 2013. [Online]. Available: www.dlna.org/dlna-for-industry/about-dlna. [Accessed May 20, 2020].Google Scholar
Open Connectivity Forum (OCF), “About UPnP,” January 1, 2016. [Online]. Available: https://openconnectivity.org/developer/specifications/upnp-resources/upnp/. [Accessed May 20, 2020].Google Scholar
Napster, “Company Info,” 2020, continuously updated. [Online]. Available: http://us.napster.com//about?from=rhapsody. [Accessed May 20, 2020].Google Scholar
Wikipedia, “Jumbo Frame,” May 7, 2020. [Online]. Available: https://en.wikipedia.org/wiki/Jumbo_frame. [Accessed May 20, 2020].Google Scholar
Braden, R. and Postel, J., “Requirements for Internet Gateways,” June 1987. [Online]. Available: www.ietf.org/rfc/rfc1009.txt. [Accessed May 20, 2020].Google Scholar
Cain, B., Deering, S., Kouvelas, I., Fenner, B., and Thyagarajan, A., “Internet Group Management Protocol, Version 3,” October 2002. [Online]. Available: http://tools.ietf.org/html/rfc3376. [Accessed May 20, 2020].Google Scholar
Hümmler, T., “Router, Switches, Hub und Co. Ratgeber: Was ist im Netzwerk?,” October 26, 2013. [Online]. Available: www.tecchannel.de/a/ratgeber-was-ist-was-im-netzwerk,2038788. [Accessed May 20, 2020].Google Scholar
Klein, P., “Support for Coordinated Shared Network in 802.1AVB,” January 2008. [Online]. Available: www.ieee802.org/1/files/public/docs2008/av-phkl-csn-0108-v1.pdf. [Accessed May 20, 2020].Google Scholar
Mogul, J. and Postel, J., “Internet Standard Subnetting Procedure,” August 1985. [Online]. Available: www.ietf.org/rfc/rfc950.txt. [Accessed May 20, 2020].Google Scholar
Plummer, D. C., “An Ethernet Address Resolution Protocol,” November 1982. [Online]. Available: http://tools.ietf.org/html/rfc826. [Accessed May 20, 2020].Google Scholar
Popper, B., “Rhapsody Rebrands Itself as Napster Because ¯\_(ツ)_/¯,” The Verge, June 14, 2016. [Online]. Available: www.theverge.com/2016/6/14/11936974/rhapsody-rebrands-as-napster. [Accessed May 20, 2020].Google Scholar
Postel, J., “Internet Control Message Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc792. [Accessed May 20, 2020].Google Scholar
ISO, ISO/IEC 29341- (1-13)-1:2008: Information Technology – UPnP Device Architecture, Geneva: ISO, 2008.Google Scholar
Universität Erlangen, Lehrtstuhl für Informatik 12, “SEIS – Sicherheit in Eingebetteten IP-Basierten Systemen,” June 6, 2013. [Online]. Available: www12.informatik.uni-erlangen.de/research/seis/. [Accessed May 13, 2020].Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×