Skip to main content

The Development and Trend of Vehicle Functional Safety

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13202))

Included in the following conference series:

Abstract

In the development stage of vehicle applications, ensuring the safety of the vehicle is always a key condition. However, the current automotive functional safety design is challenged by a variety of factors, such as the complexity of the new generation of automotive electrical and electronic (E/E) architecture, the continuous update of the automotive functional safety standard ISO26262, and the new AUTOSAR adaptive platform standard. The release of different types of cost increases. This paper summarizes the latest developments of vehicle functional safety design methods through analysis, design, optimization and operation stages: 1) functional safety analysis; 2) functional safety assurance; 3) safety perception cost optimization; 4) safety-critical multi-functional dispatch. It then provides the future trend of functional safety design methods, which will be directly oriented to automatic vehicles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qiu, M., Chen, Z., Liu, M.: Low-power low-latency data allocation for hybrid scratch-pad memory. IEEE Embed. Syst. Lett. 6(4), 69–72 (2014)

    Article  Google Scholar 

  2. Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)

    Google Scholar 

  3. Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1–5 (2008)

    Google Scholar 

  4. Lo Bello, L., Mariani, R., Mubeen, S., Saponara, S.: Recent advances and trends in on-board embedded and networked automotive systems. IEEE Trans. Ind. Inform. 15(2), 1038–1051 (2019)

    Article  Google Scholar 

  5. Nardi, A., Armato, A.: Functional safety methodologies for automotive applications. In: 2017 IEEE/ACM ICCAD, pp. 970–975 (2017)

    Google Scholar 

  6. Liang, W., Zhang, D., Lei, X., Tang, M., Li, K., Zomaya, A.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Top. Comput. (2020)

    Google Scholar 

  7. Ding, H., Liang, Y., Mitra, T.: Shared cache aware task mapping for WCRT minimization. In: 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 735–740 (2013)

    Google Scholar 

  8. Xie, G., Zeng, G., Kurachi, R., Takada, H., Li, Z., et al.: WCRT analysis and evaluation for sporadic message-processing tasks in multicore automotive gateways. IEEE TCAD 38(2), 281–294 (2019)

    Google Scholar 

  9. Azketa, E., Gutiérrez, J.J., Palencia, J.C., Harbour, M.G., Almeida, L., et al.: Schedulability analysis of multi-packet messages in segmented CAN. In: IEEE 17th ETFA Conference, pp. 1–8 (2012)

    Google Scholar 

  10. Xie, Y., Zeng, G., Chen, Y., Kurachi, R., Takada, H., Li, R.: Worst case response time analysis for messages in controller area network with gateway. IEICE Trans. Inf. Syst. 96(7), 1467–1477 (2013)

    Article  Google Scholar 

  11. Girault, A., Kalla, H.: A novel bicriteria scheduling heuristics providing a guaranteed global system failure rate. IEEE Trans. Depend. Secure Comput. 6(4), 241–254 (2009)

    Article  Google Scholar 

  12. Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., Li, K.C.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J. (2021)

    Google Scholar 

  13. Liang, Y., Li, Z., et al. Nbnrp1 mediates Verticillium dahliae effector PevD1-triggered defense responses by regulating sesquiterpenoid phytoalexins biosynthesis pathway in Nicotiana benthamiana. Gene 768 (2021)

    Google Scholar 

  14. Menglan, H., Luo, J., Wang, Y., Lukasiewycz, M., Zeng, Z.: Holistic scheduling of real-time applications in time-triggered in-vehicle networks. IEEE Trans. Ind. Inf. 10(3), 1817–1828 (2014)

    Article  Google Scholar 

  15. Liang, W., Xie, S., Cai, J., et al.: Deep neural network security collaborative filtering scheme for service recommendation in intelligent cyber-physical systems. IEEE Internet Things J. (2021)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Educational Research Project of Young and Middle-aged Teachers of Fujian Provincial Department of Education (JAT200801), 2021 Quanzhou Institute of Information Engineering Education and Teaching Reform Research Project (2021JXGG006), the scientific research project of Guangzhou College of Technology and Business (No. KA202108), and the higher education reform project of Guangzhou College of Technology and Business (No. ZL20201223).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, J., Xu, G., Wu, J., Yang, L., Deng, H. (2022). The Development and Trend of Vehicle Functional Safety. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97774-0_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-97773-3

  • Online ISBN: 978-3-030-97774-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics