New UWB Transceivers To Thwart Theft p.6

Transcription

New UWB Transceivers To Thwart Theft p.6
S eptember/O c tober 2 014
Guiding Embedded Designers on Systems and Technologies
Engineers’ Guide to Automotive Embedded
p.11
Engineers’ Guide to LTE & 4G
p.30
MISRA Matters
What’s Fueling the Drive to High Reliability?
Bluetooth Low Energy Boosts Security
Engineers’ Guide to Embedded Linux &
Android p.24
Engineers’ Guide to Smartphone, Tablet &
Wearables p.38
Overcome Mobile Graphics Pitfalls
Advanced Image Stabilization
New UWB Transceivers To Thwart Theft p.6
EmbeddedSystemsEngineering.com
www.
Automotive Sponsors
Embedded Linux &
Android Sponsor
LTE/4G Sponsor
Smartphone/Tablet/Wearables Sponsor
Scalable Automotive Network
Solutions
&RVW(IÀFLHQW‡5HDO7LPH‡)OH[LEOH
0LFURFKLSKDVEHHQGHOLYHULQJUREXVWDXWRPRWLYHTXDOLÀHG&$1/,1
Ethernet, MOST® technology and USB solutions to automotive suppliers for
over ten years. Our MOST technology and USB solutions are the de facto
standards for in-vehicle infotainment and consumer device connectivity
ZRUOGZLGH,I\RXUDXWRPRWLYHGHVLJQUHTXLUHVLQYHKLFOHWUDQVSRUWRIDXGLR
YLGHRFRQWURORU(WKHUQHWSDFNHWGDWDZHRIIHUVROXWLRQVZKLFKZRUNUHOLDEO\
RYHU873FRD[DQGRSWLFDOSK\VLFDOOD\HUVZLWKJXDUDQWHHGORZODWHQF\
6RIWZDUHVWDFNVDUHDOVRDYDLODEOHIURP0LFURFKLSDVZHOODVWKLUGSDUWLHV
allowing you to focus your efforts on application software development.
Application Examples
Ŷ Body control
Ŷ /7(*FRQQHFWLYLW\
Ŷ $PELHQW/('OLJKWLQJ
Ŷ 5HDUYLHZFDPHUD
Ŷ HMI
Ŷ ([WHULRU/('OLJKWLQJ
Ŷ Top-view camera
Ŷ Infotainment head unit
Ŷ Smart sensors
microchip.com/automotive
The Microchip name and logo, the Microchip logo and MOST are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries.
All other trademarks are the property of their registered owners. © 2014 Microchip Technology Inc. All rights reserved. 8/14
DS00001813A
FROM THE EDITOR
Hacking Your Car—
from Hubs to Horn
Excitement about the connected car can turn to hassles or horror.
By Chris A. Ciufo, Editor
I
recently drove Ford’s Platinum Edition Fusion 4-door, an awesome car with
MyFord Touch, Microsoft Sync, and an IVI head unit by Sony. Loved the car
(powerful! Quiet!); hated the three confusing UI LCD screens (two surrounding the
speedometer, plus the center console). I never connect my smartphone via USB or
Bluetooth to a rental: will my contacts stay in memory? Has someone installed the
equivalent of a mobile keystroke logger to extract my passwords or intercept my
email? These are mere privacy and identity concerns.
Hey, I’m paranoid, but totally justified.
The Fusion had a passive smart key that I kept in my pocket. I need only touch the
door handles or truck latch to unlock/lock the car. A dash Start/Stop button worked
flawlessly. But I never had faith upon walking away that the car would lock automatically. Turns out, a thief can jam the signals between key and car, preventing it from
locking (bye-bye valuables). As DecaWave points out in this issue, a relay attack can
intercept all signals and later rebroadcast them as a dummy key. Poof! Car’s stolen.
These are theft concerns.
As has been proven in the past, hackers with physical access to a vehicle—USB, OBDII
port, even the CD player—can load code that affects MCU/ECU functions. In a worstcase scenario, airbag, brakes, engine management, fuel, throttle and other functions
can be hacked, with deathly results. Messing with the engine at freeway speeds disables power brakes, airbags, and makes steering and stopping extremely difficult (e.g.,
GM ignition switches; Toyota unintended acceleration). It’s possible to infiltrate even
the tire pressure monitoring system, or TPMS, suppressing “low pressure” signals
warning of a future blowout. All are extreme safety concerns.
These safety-critical hacks have so far required physical access to the car. Auto OEMs
are adding 4G wireless Internet connectivity in-vehicle, 802.15.4 vehicle-to-vehicle
(V2V) and vehicle-to-infrastructure (smart traffic) connectivity. Plus Bluetooth,
RFID, NFC and even FM RDS. And with these moves, legitimate concerns about
remote hacking are multiplying. Even if the Internet connection is via a driver’s own
smartphone, the car is now a node with one or more IP addresses visible on the ‘net.
As reported by CNET.com and IEEE Spectrum, at this year’s Black Hat/DEF CON conference, researchers Chris Valasek of IOActive and co-author Charlie Miller presented
a paper showing remote hacking is difficult, but possible. Cars with safety-critical
systems on the same CANbus as the IVI are most vulnerable. Cars with hardware
partitioning and separate networks—like defense systems using ARINC-653 or
DO-254 architectures—would be very difficult (e.g., Audi’s A8). RTOS vendors QNX,
Mentor Graphics, LynuxWorks, Wind River and Green Hills all provide partitioned
operating systems meant to address software separation so the IVI can’t breach critical functions.
Embedded Systems
Engineering 2014
www.embeddedsystemsengineering.com
Vice President & Publisher
Clair Bright
Editorial
Editor-in-Chief
Chris Ciufo
[email protected]
Managing Editor
Anne Fisher
[email protected]
Contributing Editor
Caroline Hayes
Creative/Production
Production Manager
Spryte Heithecker
Graphic Designers
Nicky Jacobson
Caldin Seides
Media Coordinator
Yishian Yao
Senior Web Developer
Slava Dotsenko
Mariam Moattari
Advertising / Reprint Sales
Vice President, Sales
Embedded Electronics Media Group
Clair Bright
[email protected]
(415) 255-0390 ext. 15
Sales Manager
Michael Cloward
[email protected]
(415) 255-0390 ext. 17
Marketing/Circulation
Jenna Johnson
To Subscribe
www.eecatalog.com
Extension Media, LLC Corporate Office
President and Publisher
Vince Ridley
[email protected]
(415) 255-0390 ext. 18
Vice President & Publisher
Clair Bright
[email protected]
Vice President, Business Development
Melissa Sterling
[email protected]
Human Resources / Administration
Rachael Evans
Special Thanks to Our Sponsors
A new group called “I Am The Cavalry” aims to start a “Five Star Automotive Cyber
Safety Program,” encouraging auto OEMS to address hacking concerns. Excellent
reference data is available at https://www.iamthecavalry.org/domains/automotive.
And what of self-parking and self-driving cars? The Fusion has an optional self-parking system that works frighteningly well, and Google’s cars are nearing certification
for use in limited applications.
Yet I’m completely uncomfortable with this kind of autonomy as long as there’s a
chance someone could hack my car and sound the horn without me. I’m following
these developments closely.
2
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Embedded Systems Engineering is published by Extension Media
LLC, 1786 18th Street, San Francisco, CA 94107. Copyright © 2014
by Extension Media LLC. All rights reserved. Printed in the U.S.
locate, communicate, accelerate
TOBY-L2 series
High-speed LTE
multimode modules
TOBY-L2 series
24.8 x 35.6 x 2.6 mm
Industry’s smallest LTE / HSPA+/GPRS modules
6 LTE category 4: 150 Mb/s download, 50 Mb/s upload
6 Layout-compatible with u-blox 2G, 3G & CDMA modules
6 Variants for America, Europe and Asia; supports VoLTE
6 Seamless interface to u-blox GNSS & CellLocate® indoor positioning
6 LGA and Mini PCIe packages
www.u-blox.com
IN THIS ISSUE
CONTENT
Features
Departments
COVER STORY
From the Editor
2
Automotive Security: Why UWB Measures Up
By Mickael Viot, DecaWave
6
Automotive Embedded
LTE & 4G
Security of Embedded Automotive Software:
How Compliance with MISRA Can Help
Increasing Wireless Security with Bluetooth Low
Energy
By Dr. Paul Anderson, GrammaTech
10
By Jennifer Gibbs, Laird
16
[Advertorial] The LTE-connected car, the next hot
“consumer device”
[Advertorial] Trends in Vehicle Tracking Technology
By Brad Sherrard, Carl Fenger, u-blox
By u-blox
Automotive Electronics Fuels Need for HighReliability Devices
By Dr. Raik Brinkmann, OneSpin Solutions
18
Product Showcases
Hardware
Components (Processors, DSPs,
FPGAs, IP etc.)
Microchip Technology
22, 23
24
Product Showcases
4
Smartphone & Tablet Design
By Mark Aaldering, ROHM Semiconductor
Clear the Mobile Graphics Thicket
Low-Power Boards & Modules
Industrial
EMAC, Inc.
36
Advanced Image Stabilization Techniques for
Tablet Camera Performance
Embedded Linux & Android
By Peter Harris, ARM
30
29
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
38
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-4900 Computer Module
Touch Panel Computers
1 GHz i.MX6 w/ WiFi & Bluetooth
Panel Mount or Fully Enclosed
Pricing
starts at
Series
starts at
$ 99
$ 369
Qty 100
$134
Qty 100
$ 409
Qty 1
Qty 1
1 GHz Single or Quad Core Cortex A9 ARM CPU
Up to 2 GB DDR3 RAM and 4 GB eMMC Flash
Wireless 802.11 b/g/n and Bluetooth 4.0
1x Gigabit Ethernet, 1x PCI Express Bus
1x mSD slot, 1x SATA II, 1x USB Host, 1x USB OTG
70x DIO, 4x I2C, 1x I2S, 2x SPI, 2x CAN
-40 ºC to 85 ºC Industrial Temperature Range
Features can include:
Runs Linux 3.10, Debian, Ubuntu, Yocto, QT, OpenGL
5-inch, 7-inch and 10-inch touchscreens
Coming Soon: QNX, Android and Windows Support
Fanless operation from -20 ºC to 70 ºC
Up to 1 GHz ARM CPU
Computer-on-Modules
Up to 2 GB RAM, 4 GB eMMC Flash
State of the Art Embedded Design
2x Ethernet, 2x USB Host
TS-4600: 450 MHz low cost w/ 2 Ethernets
CAN, RS-232, SPI, I2C, DIO
TS-4710: Up to 1 GHz PXA168 w/ video
1x RS485 Two-Wire Modbus
Supports Linux w/ Android Coming Soon
TS-4800: 800 MHz FreeScale iMX515 w/ video
Headphone connector and speaker
www.embeddedARM.com
NA
GI
RI
Sup
Support every step
of the
th way with
open source vision
ope
O
PE
Embedded
Emb
systems
that are
syst
built
buil to endure
O
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
Optional cellular, WIFI & XBEE radios
N
TS-4720: Like TS-4710 + 2 GB eMMC Flash & 2 Ethernets
TS-4200: Atmel ARM9 w/ super low power
RU
GG
ED
LO
NG
LI
F
E
2x microSD with DoubleStore
TS-4740: High Capacity FPGA and Gigabit Ethernet
Unique
Uniq embedded
solutions
add value
solu
for our
o customers
ESE FEATURE
Automotive Security: Why
UWB Measures Up
When IEEE ratified 802.15.4a it opened the way to highly accurate tracking
using wireless technology for the automotive and other industries. Now,
with a new breed of integrated Ultra Wide Band (UWB) transceivers
debuting, a disturbing criminal trend might just be stopped in its tracks.
By Mickael Viot, DecaWave
D
weaknesses. Here are some ways those weaknesses can
affect you, the vehicle user.
Surprisingly, the main reason is linked to… the car key.
First, the RF channel can be jammed. When thieves
jam the RF channel, you, like most other drivers, will
clamber out of the car counting on the vehicle to lock
itself. Thanks to the jamming though, your car can’t
receive the “lock” command.
evelopments in vehicle security over recent years have made it
increasingly difficult for thieves to steal vehicles by conventional
means. Statistics show that on a global scale the number of vehicle
thefts has been steadily declining over the past 10 years. However,
in developed countries the latest data shows that they are starting to
rise again.
Keyless passive entry systems to be exact.
CURRENT PASSIVE ENTRY AND START SYSTEMS…
More and more modern cars are equipped with a passive entry and
start system. Introduced on high-end cars in the late 90’s, this technology is democratizing and will soon equip more than 50% of cars.
Figure 1 shows a car
equipped with LF (125 kHz
to 130 kHz) transmitters.
Three to 10 transmitters
cover specific zones inside
and outside the car. These
LF transmitters send beacons. If the key is within
range, that is, within
one to two meters, the
Figure 1. LF transmitter zones coverage
“sleeping” key picks up the
LF signal, which wakes the
key and triggers the processing of the received message. The key then
replies to the car using a separate RF channel (433 MHz to 2.4 GHz).
While jamming the RF channel does not disable the
passive start system and thieves will not be able to take
your car, your valuables become easy pickins.
Second, more enterprising criminals can launch a relay
attack, which is both more complex to execute and more
lucrative.
As described in Figure 2, the relay attack consists of
relaying the messages exchanged between the car and
the key over long distances, up to 1000 m. Thieves begin
the attack by relaying the beacon from the LF transmitter in the car to the key.
Where once these bad actors may have carried a Slim
Jim, now their bag of tricks includes an antenna close
to the door lock and an amplifier to convert the signal
to a longer range RF signal to transmit it over long
distances. A thief places himself within a few meters
from the car owner with equipment that will convert
the RF signal back to an LF signal and, thanks to an
amplifier, will reach the LF receiver embedded in the
The message contained in the beacon varies based on
each transmitter zone. For example, the message could
vary based on whether the zone was inside or outside
the vehicle, or, even whether the zone is on the driver’s
side, passenger side, or trunk. This capability allows the
key to send specific answers that will trigger specific
actions such as opening the passenger door or starting
the engine if the key is inside the car.
AND THEIR WEAKNESSES
Despite incorporating encryption and other secure
mechanisms, keyless entry systems have some serious
6
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Figure 2. Passive key entry makes a car theft method known as the
relay attack possible.
ESE FEATURE
key. Once the key gets the beacon message, it will answer as usual with
an “unlock” command. This command will be picked and relayed as
described above to travel back to the car.
Ultra Wide Band, with a bandwidth between 500 MHz
and 1.2 GHz, this technology is also much more difficult to jam.
Now that the thieves are in the car, they don’t have to settle just for
stealing what’s inside. They simply position the antenna close to the
transmitter in charge of the “inside” zone, triggering the activation of
the passive start system. Your car is gone.
OPERATION ONLY WITHIN A GIVEN DISTANCE
FROM THE VEHICLE
UWB technology allows Line-of-Sight ranges of greater
than 200 m. However, the in-vehicle unit can be configured to only take action when the measured distance is
less than a certain vehicle manufacturer defined value.
REPELLING RELAY ATTACKS
Nowadays key fobs all use advanced security techniques like encryption to secure the communication between the key and the car. But
if someone manages to relay the communication, all this security is
useless.
Because UWB is capable of achieving 10 cm accuracy
with 100% reliability, manufacturers could define very
accurate zones, triggering the lock release mechanism
only when the driver is within close proximity to the
vehicle.
One option to avoid relay attack is to measure the real physical distance between the car and the key. If the car detects that the key is not
DETECTING ON WHICH SIDE OF THE VEHICLE
physically close, it will simply ignore the commands received.
THE FOB IS LOCATED
Measuring RF signal strength is one way to obtain a distance measure- As we’ve seen earlier, the latest generation cars using
ment. But doing so relies on the assumption that the signal strength traditional LF and RF technologies are capable of
and distance have a deterministic relationship, according to the Friis knowing from which side of the car the driver is
equation. Unfortunately, the Friis equation is only applicable in free
space. In an environment with multi-path, interference and lack of
sight, the range estimate will have an accuracy of tens of meters.
Figure 4. UWB offers high immunity to multi-path and
noise.
Figure 3. Narrowband signal in presence of multi-path and noise
A second technique consists of measuring the Time of Flight of the
RF signal to estimate the distance between the transmitter and the
receiver. There have been attempts to build time of flight systems using
standard narrowband RF like Bluetooth or other 2.4 GHz signals.
The problem here is that due to the narrow bandwidth, the rising edge
of the signal is slow, and it is difficult to determine the exact time of
arrival in multi-path and low-signal-to-noise-ratio environments (see
Figure 3), resulting in an accuracy of several meters, with reliability
still very dependent on the environment.
approaching, triggering specific actions like opening a
specific door or the trunk.
But using UWB, how does the car know which car door
or trunk to release?
A single two-way ranging exchange between one invehicle unit and a fob is sufficient to measure how far
away the fob is from the vehicle. However, having only
one piece of information—a single distance—available
is not enough to determine on which side of the vehicle
the fob is located.
UWB TAKES ON MEASUREMENT TO STOP PASSIVEAGGRESSIVE BEHAVIOR
Ultra Wideband (UWB) may finally offer the performance needed for Knowing on which side of the vehicle the fob is located
accurate and reliable distance measurement. The UWB signal consists takes two pieces of information. These two pieces of
of narrow pulses, typically no more than 2 ns wide. This makes it information could be, for example, two distances from
highly immune to multi-path and interference (see Figure 4). Being two in-vehicle units, provided of course that these in8
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Two Premier Conferences Showcasing
the Embedded Systems Industry
Resolving the Technical
Aspects and Business
Challenges of
Designing with Multicore
Processors
Resolving the
Technical and Business
Challenges of Getting
Connected to
the Internet of Things
Plan now to attend! MAY 6 -7, 2015 Santa Clara, CA USA
For information on exhibiting or sponsoring contact:
Clair Bright +1 415-225-0390 x15 or [email protected]
ESE FEATURE
vehicle units are positioned in an
appropriate way. If the two units are
mounted across the vehicle, then it
becomes possible to uniquely identify the side of the vehicle on which
the fob is located.
complexity will keep them out
of reach to most of the population for one or two decades.
And if you add a third unit in the
car, trilateration becomes possible,
resulting in very accurate positioning of the fob in or around the Figure 5. Making trilateration possible results
highly accurate positioning of the key fob.
car, thereby enabling the release
Car manufacturers did not take long to
of the locking mechanism of the
trunk, the left rear door, or wherever… understand the potential of this new
technology. Many are having a close
based on fob location.
look at it now… and some pioneers have
already decided to integrate it in the
FROM THEORY TO REALITY
UWB has been around for years, but generation of vehicles that will reach the
until recently the implementations were market in 2016.
bulky, power hungry, proprietary and
very expensive. Not really what the auto- THEFT DETERRENCE AND MORE
UWB technology is solving one of
motive industry was looking for.
the current important issues for car
This was until the IEEE ratified a new manufacturers thanks to its capability
standard, the 802.15.4a, now part of to accurately measure the physical loca802.15.4-2011. This new standard, tion of the key fob, thus ensuring a high
specifically targeting highly accurate level of security to their passive entry
positioning, opened the door to many systems.
new potential applications:
t "TTFU USBDLJOH JO FOWJSPONFOUT
including hospitals, factories or
warehouses
t 5SBDLJOH JOEJWJEVBMT TVDI BT ëSF
fighters in a burning building or
newborns in a maternity ward
t *OEPPS OBWJHBUJPO EPXO UP UIF
Figure 6. DecaWave UWB transceiver.
level of an object
But could it offer more to the automotive
industry?
This new potential attracted the interest
of the semiconductor industry and after
several years of R&D, the first integrated
UWB transceivers are now reaching the
market. As you can expect from integrated circuits, they are small (a few
square millimeters), low power (coin cell
operated) and cheap—characteristics
that make them ideal for fitting in a key
fob.
10
After years working on the security of car
passengers, car manufacturers are now
investigating ways to make the car safer
in an environment that includes pedestrians or cyclists. The current radars that
equip cars are capable of detecting large
objects but do not “see” smaller ones like
humans. Fully autonomous cars are getting pretty close to it but their cost and
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
If cyclists and pedestrians
were equipped with a UWB
tag, cars could detect them in
advance—remember UWB can
reach more than 200 m—and
avoid a collision.
in
And car manufacturers have
many similar scenarios in
mind!
Mickael Viot is the Marketing Manager at
Decawave, a pioneer company in the field
of UWB chips. In this role, he is responsible
for defining the product and business
strategies related to indoor location and
Wireless Sensor Networks.
engineers guide to Automotive Embedded
Security of Embedded Automotive
Software: How Compliance
with MISRA Can Help
The new reality for automotive software security is a complicated, but advanced
static analysis can help.
By Dr. Paul Anderson, GrammaTech
T
he proliferation of network-enabled vehicles is altering the definition of safety in automobiles. Previously, auto safety concerns were
dominated by active and passive passenger protection systems, however
now the discussion extends to ways to prevent malicious hackers compromising vehicle safety. It’s also interesting to note from a historical
perspective that the DNA of car manufacturers has traditionally been
mechanical. But now that identity is transforming rapidly to include
software.
A key factor that makes the growing fleet of network-connected automobiles an attractive target for hackers is the sheer volume of potential
targets. Unlike the medical device industry—which is also undergoing a
radical shift in exposure to potential exploits because of increased connectivity—cars are part of most people’s daily lives. So for malicious
hackers looking for notoriety, cracking the code of an automobile can lend
itself to dramatic publicity.
What is most disturbing about the growing threat of malicious attacks
against automobiles is the potential for physical destruction and loss of
life they pose. Attacks against cars can run the gamut from trivial, such
as the disruption of an entertainment system to devastating, such as
hijacking control of key safety systems including acceleration, braking
and steering. Because of this growing threat, it is essential for automobile
manufacturers and their component suppliers to be more proactive with
respect to securing the code in our cars.
One of the reasons that software poses a security risk in automobiles is
the widespread use of the C programming language. A badly written C
program can contain bugs that give an attacker enough of a foothold to
take control of the car’s electronics. Unfortunately such bugs are easy for
programmers to introduce and overlook. A very effective way of defending
against these defects is to restrict the programmer’s use of the language
by prohibiting the more risky constructs. MISRA-C is one such standard
whose use has been growing for safety-critical applications.
MISRA-C was developed by the Motor Industry Software Reliability
Association, which aims to foster safety, reliability, and portability of
embedded programs used in automotive components. Although not
designed specifically for security, there is a large overlap between the
kinds of defect that cause safety issues and those that cause security vulnerabilities, so adherence to the standard is a potent way to guard against
both issues.
Figure 1. From a security perspective, every networked
component in a car, such as this entertainment system, is a
potential beachhead for attackers to mount further assaults
on other connected devices and components.
NEW ATTACK SURFACES PROLIFERATE IN
MODERN EMBEDDED AUTOMOTIVE SYSTEMS
The new reality for automotive software security is a complicated one, with multiple new exploit paths emerging
as cars and their components become more connected.
Today, modern autos run what is essentially their own
internal network called the Controller Area Network
(CAN). This network connects a broad array of embedded
processors such as those used to power the entertainment
system, control the brakes, manage engine performance,
and monitor tire air pressure.
From a security perspective, every networked embedded
component in a car is a potential beachhead for attackers to
use to mount a further assault on other connected devices
and components. Within the car’s software system, the
main diagnostic port is the juiciest of all potential exploit
points—but attacking a system in this manner requires
physical access to the port itself. That said, there are other
less obvious points of exposure ports that also pose significant security risks. Attackers have been successful at
breaking into a car’s electronic systems through the CD
player and the cellular network. A modern car now has
many other input channels, including USB ports and Bluetooth connections, and all of them are potential openings
through which an attack might be mounted.
www.eecatalog.com/automotive t EMBEDDED SYSTEMS ENGINEERING
11
engineers guide to Automotive Embedded
Industry
Coding
Standard
Not adhering
to
Completely
complying
Selectively
enforcing
based on
internal
quality
goals
Don’t know
Auto / Rail / Transportation
MISRA C
31.1%
17.8%
26.7%
24.4%
Auto / Rail / Transportation
MISRA C++
13.3%
20.0%
44.4%
22.2%
Table 1: MISRA-C and MISRA-C++ Rates of Adherence within the Auto/Rail/Transportation vertical. Source:
VDC Research, 2014.
Key Requirements for
Static Analysis Tools
Precision - The tool can parse code exactly the
same way the compiler parses it. All compilers
are different, and analysis tools that don’t take
this into account can provide false results.
Whole-program analysis—The tool can track
how information flows between procedures and
across compilation unit boundaries.
Flow-, context-, and path-sensitive analysis—
The tool can be precise about finding and
reporting defects.
ELIMINATE INFEASIBLE PATHS
The tool uses this to cut down on the number
of false-positive results reported. The best tools
use advanced techniques such as SMT solvers.
Native MISRA checkers—The tool uses native
MISRA checkers to assure compliance to the
standard. Use of partnerships or compliance
only to previous versions of the standard will
not provide adequate performance.
new code or the old? Unfortunately, there
is no hard and fast rule here. While newer
code is often built to adhere to standards
such as MISRA, it nevertheless carries the
risks all new code bases do—because it
hasn’t been battle-tested in the field like
legacy code, there may be potential defects
lurking within.
Given that software in automobiles is
subject to a remarkably long development
lifecycle, it is essential that automotive
software developers adopt the most up-todate quality and safety standards rapidly.
After all, once the code that powers a
component makes it to market, it may
be 3–5 years old and will face potential
attacks that were not known during its
development. The only way to inoculate it
against these future exploits is to use the
most sophisticated tools available today to
protect it.
RATES OF MISRA ADOPTION STILL
LAG
The embedded software development
teams that we work with are certainly
aware of the MISRA standard and understand what it aims to achieve. However, the
level of adherence to the standard varies
significantly by maker and geography.
Data from VDC Research underscores
there is much room for improvement. Take
a look at the data in Table 1.
According to Andre’ Girard, Senior Analyst at VDC Research, it’s clear that those
AS NEW CODE BASES OVERTAKE
LEGACY CODE, RISK ACCELERATES manufacturers that comply completely
In the automotive industry, there are many with MISRA C and MISRA C++ are in a
legacy code bases that run connected com- small minority. Further, VDC notes that
ponents. But as software plays a greater US automakers’ adoption of process stanrole in driving consumer choice, new code dards has historically trailed those of their
is becoming the norm. This leaves vendors European counterparts. This is a potential
struggling to determine which is safer – the competitive weakness for US manufac-
12
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
turers. As the US automobile
industry continues to regain
its leadership position in sales
and quality, it should take the
lead within the automotive
industry in this important
area. The US cannot risk
falling behind in software
security and safety practices.
AUTOMOBILE SOFTWARE RELIES
ON C, AND C IS…WELL…A HOT
MESS
In embedded software development for
automobiles, C still holds the title as the
most popular choice of language. Although
other languages such as Ada, C++, and Java
are sometimes employed, over half of the
code running on embedded automotive
systems today is hand-written C.
C is a great language in many respects—for
auto manufacturers it holds special utility
because the language excels at interfacing
between multiple hardware devices.
Regrettably, C is also an extremely
hazardous language. Its very flexibility
means it is easy for a programmer to
make mistakes. Because the standard of
what constitutes a valid C program is very
liberal, compilers are very bad at detecting
many different kinds of errors. Further,
the standard is riddled with ambiguities.
Therefore, code that works perfectly well
with one compiler may fail when a different
compiler is used because each compiler
has a different valid interpretation of the
standard.
All of this makes C programs very susceptible to serious memory-access defects
such as buffer overruns, null pointer
exceptions, and many others. Other
classes of errors such as resource leaks, use
of uninitialized memory, and use-afterfree errors are also endemic and abundant
in C programs. When concurrency is used,
defects such as data races and deadlocks
are easy to introduce yet difficult to find.
MISRA + ADVANCED STATIC
ANALYSIS IS A TRUE EMBEDDED
GAME CHANGER
One of the most important aspects of
using MISRA C is that there are now auto-
Driving Capacitive Touch
Sensing Innovation
:LWK0LFURFKLS·V5DQJHRI/RZ3RZHU/RZ&RVW6ROXWLRQV
Capacitive Touch Keys,
Sliders and Proximity
Ŷ Easy path to system integration
‡ Turnkey products
‡ /
HYHUDJH0LFURFKLS·V
PIC® MCU portfolio
Ŷ High noise immunity and
low emissions
Ŷ Extend battery life with eXtreme
/RZ3RZHU;/30&8V
‡ 3UR[LPLW\VHQVLQJѥ$
Ŷ Proximity sensing up to 25 cm
Metal Over Cap Technology
Ŷ Effective for polished or brushed
metal surfaces including
stainless steel and aluminum
Ŷ Senses through gloves
Ŷ Enables waterproof designs
Touch Pad Controllers
Ŷ XY Touch
‡ 0XOWLWRXFKHQDEOLQJJHVWXUHV
‡ /RZFRVW0&8LPSOHPHQWDWLRQ
microchip.com/mtouch
The Microchip name and logo, the Microchip logo and PIC are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries.
All other trademarks are the property of their registered owners. © 2014 Microchip Technology Inc. All rights reserved. 5/14
DS00001745A
engineers guide to Automotive Embedded
t 3VMFiɥFSFTIBMMCFOPPDDVSSFODFPGVOEFëOFE
or critical unspecified behavior.”
t %JSFDUJWF i3VOUJNF GBJMVSFT TIBMM CF NJOJmized.”
These are arguably the two most important clauses in the
entire standard. Between them they target the Achilles
heel of C programs. Undefined behavior is explicitly
discussed in the ISO standard for C (Annex J in the C99
document), and covers a broad range of aspects of the
language. It often comes as a surprise to C programmers
to learn that according to the standard, if a C program
Figure 2. An important aspects of using MISRA C is that automated static analysis tools,
invokes undefined behavior, it is perfectly legal for that
such as GrammaTech's CodeSonar above, are now available to find violations of the
program to do anything at all. This is sometime facetiously
standard.
referred to as the “catch fire” semantics, because it gives
the
compiler
liberty
to set your computer on fire.
mated static analysis tools available to find violations of
the standard. Because tool support is so important, it is
helpful to understand the kinds of problems that static Of course compiler writers are not pyromaniacs (we hope), and they try
analysis tools can detect. Some tools can only reason to do the most sensible thing in the face of undefined behavior. If the
about superficial syntactic properties of the code, whereas undefined behavior is detectable by the compiler, then the sensible thing
the more advanced tools have deep semantic knowledge is to have the compiler emit a compilation error. However if the undefined
of the entire program and so can detect much more subtle behavior is not detectable by the compiler, then a compiler writer has
essentially no choice but to assume it cannot happen.
and dangerous defects.
The current MISRA C:2012 standard labels each rule with
its decidability. A rule that is labeled decidable means
that it is possible for a static analysis tools to find all such
violations with no false positives; most of the superficial
syntactical rules are marked as such. In contrast, a rule
that is labeled undecidable means that it is in general
provably impossible for a static analysis tool to find all violations without any false positives. This is not to say that
static analysis is not recommended for such rules — it just
means that tools may fail to find some violations and may
also report some false positives.
Undefined behavior is not a rarely-encountered niche; the C99 standard
lists 191 different varieties, and it turns out that even some apparently
benign things are classified as undefined behavior. Consequently it can be
hard for even the most careful programmer to avoid undefined behavior.
Unspecified behavior is less hazardous, but has its own pitfalls. In this
case the standard specifies a set of legal behaviors, but leaves it to the
compiler writer to choose which to use. This gives the compiler writer
latitude to choose the interpretation that has the best performance, but it
means that code can have different semantics when compiled by different
compilers.
One such example is rule 2.2: “There shall be no dead code.” What is clear is that undefined behavior is almost always something that
Dead code is defined as any operation whose result does a programmer should be concerned about. Many of the most serious bugs
not affect the behavior of the program. It is easy to see how are those that arise because of undefined behavior. For example:
this is a hard property to detect — an analysis tool must be
t
#VêFSPWFSSVOTBOEVOEFSSVOT
able to understand the semantics of all possible executions
t
*OWBMJEQPJOUFSJOEJSFDUJPO
of the program and to be able to tell what portions of that
t
6TFBGUFSGSFF
code have no effect. Whereas there may be some instances
t
%PVCMFDMPTF
that are easily detectable, finding all instances with no
t
%BUBSBDFT
false positives is impossible.
t
%JWJTJPOCZ[FSP
t
6TFPGVOJOJUJBMJ[FENFNPSZ
Although static analysis tools cannot detect all violations
of undecidable rules, it is critically important that tools be
used to detect as many violations as possible because that None of these are singled out as forbidden in the MISRA standard, but are
is where the most critical bugs are likely to hide. There are instead covered under the umbrella of Rule 1.3 and Directive 4.1. Nonetwo clauses in the standard that are particularly relevant theless, every such bug is a violation of the standard.
here — one rule and one directive:
14
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
engineers guide to Automotive Embedded
Modern embedded software development organizations
must be equipped to identify not only the violations of
superficial syntactic rules, but also serious bugs arising
from undefined behavior, as proscribed by the MISRA
standard. Although lightweight static analysis tools can
detect some of the more obvious instances of both, only
the most advanced static-analysis tools are capable of
finding the more subtle occurrences.
To win customers, automakers need to understand that their brands are
becoming more directly tied to the quality and security of the software
that their cars rely on. And automakers need to act rapidly to prevent
security issues brought on by software vulnerabilities before consumers
are put in harm’s way. For automakers, it’s imperative that their entire
software supply chain uses proven, automated analysis tools to ensure
overall code quality for cars and safety and security for their drivers.
The emerging threat of security vulnerabilities and global industry trends
MISRA COMPLIANCE CANNOT WAIT ANY
mean that it will be important for automobile manufacturers and their
LONGER
suppliers to adopt MISRA-C if they are to remain competitive.
For automakers today, the points of product differentiation are going to continue to shift from the purely
mechanical to a hybrid of mechanical and software based Dr. Paul Anderson is VP of Engineering at GrammaTech.
features. There is already increasing competition between
automakers centered on the intelligence of their cars, and
advanced software-based features are highlighted more
and more in automobile marketing. The competition
for high-quality automotive software will only intensify moving into the future. At the same time cars are
becoming increasingly juicy targets for hackers.
www.eecatalog.com/automotive t EMBEDDED SYSTEMS ENGINEERING
15
ADVERTORIAL
Trends in Vehicle Tracking Technology
Brad Sherrard, Carl Fenger, u-blox
Market adoption of vehicle tracking systems is growing fast, with
the majority of commercial vehicles in North America and Europe
already using the technology, and rapid growth occurring in Asian
and emerging markets. A recent market study concluded that the
global vehicle tracking market will grow from $10.91 billion in
2013 to $30.45 billion by 2018, at a Compound Annual Growth
Rate (CAGR) of 22.8% .
The driving factors for adoption of vehicle tracking for both commercial and private vehicles are:
o Lowering of logistics costs: optimization of container
loading, improved routing, stock level optimization, and
improved operational overview
o Providing a better service: real-time and historical positional reporting
o Increased security: theft detection and traceability of
shipped goods
o Facilitating stolen goods/vehicle recovery and prevention
of fuel theft
Vehicle tracking combines satellite positioning with cellular
communications to enable a long list of services for both private and
commercial vehicles
o Easy interfacing to globally available public and proprietary
web and smartphone applications, including modem compatibility with IPv4 and IPv6 (e.g. Google Maps, Google GPS and
numerous vendor-specific applications)
Issues and requirements
o Monitoring of CO2 emissions, fuel efficiency, and vehicle
health
There are several hardware issues when addressing the above mentioned scenarios:
o Driver management and logging of driving behavior
Compatibility with multiple Global Navigation Satellite
Systems (GNSS) systems
GPS is no longer the only global navigation satellite system available. The Russian GLONASS is now fully operational, the Chinese
BeiDou and Japanese QZSS systems are partially operational, and
the EU Galileo system will be available by 2019. Requirements
for compatibility with these systems vary from single-system to
multiple system compliance, either one at a time or with parallel
functionality.
o Rollout of large-scale emergency call systems for private
and commercial vehicles
o Government mandate to include tracking technology in new
vehicles
o Falling cost and size, and increasing performance of satellite positioning receivers and cellular modems
o Facilitating of insurance claims based on accident reconstruction using logged position, direction, speed and
acceleration data.
These requirements are dictated by where a tracking application
will be used: weak signal environments such as urban canyons
or arctic regions where satellites appear low on the horizon may
necessitate parallel GNSS operation. Government mandate is
o Miniaturization of tracking units and antenna allowing
covert mounting and installation in smaller enclosures
o Falling power requirements facilitating longer battery life
and solar powered devices, especially applicable to asset
tracking devices with no connection to the vehicle power
supply
16
u-blox M8 multi-GNSS receiver modules MAX, NEO and LEA
supporting GPS, QZSS, GLONASS, BeiDou with dual-GNSS capability
Engineers’ Guide to Automotive Embedded 2015
ADVERTORIAL
also a consideration; in Russia, for example, the ERA-GLONASS
vehicle emergency call system requires GLONASS compatibility. A
similar situation exists in China with BeiDou.
Performance requirements may require vehicle tracking systems
that are compatible with multiple GNSS systems simultaneously:
access to more satellites results in faster time to fix and more reliable operation, particularly in high-rise cities.
Operation in areas with poor satellite reception
For tracking applications, visibility of GNSS satellites is critical
to calculate a position. With GPS/GNSS satellites transmitting
with a power of about 30 watts from a distance of 20 thousand
kilometers, and the requirement to lock onto 4 satellites, tracking
performance and accuracy can become degraded in urban canyons,
when indoors (e.g. inside warehouses, rail stations, park houses),
or when the receiver is within metallic containers. For tracking
applications, this issue can be addressed via several techniques:
t Integrated dead reckoning: augmenting GNSS receivers
with sensor data that reports distance and heading changes
from the last known position. This is commonly implemented
in automotive navigation systems to support uninterrupted
navigation within tunnels. Accelerometer readings can also
improve positioning within multi-level park houses or stacked
highways by taking into account vertical displacement. Refer
to u-blox’ embedded dead reckoning GNSS technology.
t Hybrid positioning techniques for indoor positioning:
Adding a second parallel system that can estimate position
based on other attributes such as visible mobile or Wi-Fi cells
adds an additional measure of security when GNSS satellite
visibility is blocked: even an approximate location within a
few hundred meters, or even a few kilometers is preferable to
no positional information at all, especially when it comes to
valuable shipments and vehicles (refer to u-blox’ CellLocate®
technology).
Compatibility with multiple cellular standards
Relying on the GSM/GPRS (2G) standard for tracking devices was
easy as it has been uniformly adopted worldwide. GSM/GPRS,
however, is falling prey to next-generation 3G standards, specifically UMTS/HSPA, CDMA2000 (in the USA) and LTE, all of which
are not uniformly deployed around the world. Specifically, there
are many regional variants of 3G and 4G standards that operate
over different frequency bands.
This highlights the desirability of cellular modems that support
different standards (GSM, UMTS, CDMA, LTE) while retaining
footprint compatibility on the same PCB layout. This reduces
hardware costs when designing tracking systems with regional
variants, or upgrading to the next-generation tracking technology
(ex. 2G to 3G upgrade). Refer to u-blox’ nested design concept for
cellular modules.
www.eecatalog.com/automotive
Nested modem PCB design is important for creating regional variants
of a tracking device, and to allow for future upgrades. Pictured: u-blox
SARA, LISA and TOBY modules supporting GSM, UMTS and LTE
Automotive grade components
Lastly, but equally important to all aspects discussed previously,
vehicle tracking applications require automotive grade components. As “automotive grade” is a relative term whose definition
is different depending on manufacturers and end-customers, at
the very minimum modem and GNSS components (and all other
electronic components in the design) should qualified according
to AEC-Q100, manufactured in ISO/TS 16949 certified sites, and
fully tested at the factory on a system level. Qualification tests
should be performed as stipulated in the ISO16750 standard:
“Road vehicles – Environmental conditions and testing for electrical and electronic equipment”.
Conclusion
Vehicle tracking is becoming a defacto requirement for private,
commercial and public transportation. As both GNSS and cellular technologies are in a constant state of flux, it is important
to design tracking systems that address regional satellite and cellular compatibility, positioning in areas where satellite visibility is
degraded or absent, ease of hardware variants and upgrade, suppression of radio inference and conforming to automotive quality
requirements.
Due to the long-life expected of vehicle tracking devices, as well
as reliable performance over large geographical areas, it is best to
base designs not only on the current state of the technology, but
also on the expected lifetime of the system.
CONTACT INFORMATION
u-blox
Global Headquarters
Zürcherstrasse 68
8800 Thalwil
Switzerland
Tel: +41 44 722 74 44
Fax: +41 44 722 74 47
[email protected]
www.u-blox.com
17
engineers guide to Automotive Embedded
Automotive Electronics
Fuels Need for HighReliability Devices
been ratified, such as ISO 26262, which lay
down design and verification metrics that
must be followed for these devices to be
employed by automakers.
For example, the highest safety standard
(or “Automotive Safety Integrity Level”)
defined in ISO 26262 is ASIL-D, and this
sets the required likelihood of malfunction
to a statistically defined failure rate of 10−9
Already working on behalf of custom automotive deper hour, a staggering 1 in every 114,155
years. Furthermore, these requirements
vices, verification tools based on formal methods are now
must be measured on the final gate level
helping put FPGAs in the driver’s seat—can mil/aero,
representation of the device, not the Register Transfer Level (RTL) used for design
transportation, power generation and other safety-critical
and simulation, and the failure introduced
areas be far behind?
during testing without any additional
hardware being incorporated on the device.
By Dr. Raik Brinkmann, OneSpin Solutions
To ensure that these metrics may be met,
engineers add additional failsafe structures
afety critical design of automotive electronics, including those using FPGAs, falls into their designs.
under the new ISO 26262 standard. The need for more complex functions and high
performance in an ultra-reliable environment plays a substantial role in automotive To take another case, in the event of rare,
spurious memory data errors, error corembedded system design.
rection code mechanisms are used where
Field Programmable Gate Arrays (FPGAs) offer flexibility and density at affordable imple- data is encoded when written into memory,
mentation cost, so it is not surprising that the use of FPGAs in automotive systems is and decoded on a read. Any errors caused
expanding. With custom devices being expensive to produce, many design teams resorted by external factors are picked up and corto Micro Controller Units (MCUs) for many functions. FPGAs offer an attractive alter- rected using this method. Although it’s a
native to a software only functional model, while retaining the design cost benefits of significant overhead to added error corthe MCU. In addition, modern FPGAs contain convenient hardware functions useful in recting codes on key RAMs, this method
automotive applications, and may also be updated in the field. Another area where FPGAs guarantees against memory defects.
shine is in boosting performance for compute-intensive automotive applications such as
Similarly for critical areas of logic, Triple
Advanced Driver Assistance Systems (ADAS).
Modular Redundancy (TMR) is sometimes
The traditional approach of running an FPGA leveraged. See Figure 1. Instead of just one
design on the actual hardware to provide a logic block, three are employed to perform
functional testing environment cannot satisfy the same function. The output of two of
the verification needs of the standards, and the blocks is continuously compared and
using simulation only improves the situation if there is a difference, the third block is
slightly. Developers have been using verifica- used to arbitrate between the other two.
tion tools based on formal methods for custom An alarm bit is also raised on a difference,
automotive devices. It’s an approach that can and if this alarm bit occurs frequently, the
overall safety diagnostic system will flag
meet FPGA needs as well.
the device for future replacement.
THE IMPACT OF AUTOMOTIVE FAILTHE VERIFICATION OF SAFETY
SAFE REQUIREMENTS
Today the simplest of modern vehicles will con- CRITICAL DESIGNS
tain a number of processors, and this runs into The verification of overall device design
the hundreds of compute elements for high-end and implementation, together with the
vehicles. Electronics are present throughout validation that these safety systems
the safety critical components in the car, aid operate correctly, of course requires test
the driver in its safe operation, and introduce methods even more rigorous than existing
a new level of comfort. However, if one of these verification practices. (See Figure 2.) The
Figure 1. For critical areas of logic, Triple Modular
critical systems fails during operation, the exhaustive and rigorous nature of the
Redundancy (TMR) is sometimes leveraged.
result is catastrophic. As such, standards have
S
18
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-4900 Computer Module
Touch Panel Computers
1 GHz i.MX6 w/ WiFi & Bluetooth
Panel Mount or Fully Enclosed
Pricing
starts at
Series
starts at
$ 99
$ 369
Qty 100
$134
Qty 100
$ 409
Qty 1
Qty 1
1 GHz Single or Quad Core Cortex A9 ARM CPU
Up to 2 GB DDR3 RAM and 4 GB eMMC Flash
Wireless 802.11 b/g/n and Bluetooth 4.0
1x Gigabit Ethernet, 1x PCI Express Bus
1x mSD slot, 1x SATA II, 1x USB Host, 1x USB OTG
70x DIO, 4x I2C, 1x I2S, 2x SPI, 2x CAN
-40 ºC to 85 ºC Industrial Temperature Range
Features can include:
Runs Linux 3.10, Debian, Ubuntu, Yocto, QT, OpenGL
5-inch, 7-inch and 10-inch touchscreens
Coming Soon: QNX, Android and Windows Support
Fanless operation from -20 ºC to 70 ºC
Up to 1 GHz ARM CPU
Computer-on-Modules
Up to 2 GB RAM, 4 GB eMMC Flash
State of the Art Embedded Design
2x Ethernet, 2x USB Host
TS-4600: 450 MHz low cost w/ 2 Ethernets
CAN, RS-232, SPI, I2C, DIO
TS-4710: Up to 1 GHz PXA168 w/ video
1x RS485 Two-Wire Modbus
Supports Linux w/ Android Coming Soon
TS-4800: 800 MHz FreeScale iMX515 w/ video
Headphone connector and speaker
www.embeddedARM.com
NA
GI
RI
Sup
Support every step
of the
th way with
open source vision
ope
O
PE
Embedded
Emb
systems
that are
syst
built
buil to endure
O
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
Optional cellular, WIFI & XBEE radios
N
TS-4720: Like TS-4710 + 2 GB eMMC Flash & 2 Ethernets
TS-4200: Atmel ARM9 w/ super low power
RU
GG
ED
LO
NG
LI
F
E
2x microSD with DoubleStore
TS-4740: High Capacity FPGA and Gigabit Ethernet
Unique
Uniq embedded
solutions
add value
solu
for our
o customers
engineers guide to Automotive Embedded
technology makes formal verification techniques a natural choice for these devices.
Bugs introduced through design error,
or by the tool chain during implementation, must be eliminated by thorough
verification. To ensure that the verification environment is properly qualified for
this purpose, it’s essential to employ high
quality verification coverage. The rate of
verification coverage, that is the proportion
of the design proven to have been tested,
must be as close to 100% as possible, and
this metric must be produced somewhat
independently of the verification tools
employed.
UNDERSTANDING FORWARD AND
REVERSE MAPPING
For ISO 26262 there is another reason why
these tools are required. The verification
of faulty device scenarios must be carried
out on the final gate level design, not the
RTL code. As such, understanding the
forward and reverse mapping of the RTL
to gate design such that test faults may be
properly inserted and results interpreted
is key, and this may also be accomplished
with these EC Tools.
To test for the system’s ability to recover
or absorb faults, a methodology must be
leveraged that allows these faults to be
introduced without changing the design
Figure 2. Test methods must be even more
Techniques for testing coverage by rigorous than existing verification practices. code, and the correct operation observed.
Formal methods provide an easy mechaanalyzing the ability of the verification
environment to detect errors in any part properly carried out, in an FPGA design nism for this, (Figure 3). Properties may be
of the design code have become established additional verification is required to ensure written that specify the correct operation
as a mechanism for producing this metric. that the design described at the RTL level of the system. Faults are then injected
A number of automotive electronics com- has properly passed through the synthesis at various intervals and locations using
panies now use Observation Coverage and place and route tool chain without the formal constraints during verification, and
that employs an exhaustive formal-based introduction of additional bugs. For FPGAs, the properties examined to ensure they
approach to understand if a design change this is particularly important due to the still hold true. If they do, the system has
advanced nature of FPGA synthesis. FPGA been proven to respond correctly to these
will trigger verification checks.
synthesis targets fixed device fabrics. To faults.
produce the highest quality design, they
employ a range of aggressive design optimi- AUTOMOTIVE FPGAS HERE TO STAY
zations. On occasion these optimizations Custom hardware devices clearly have
may introduce errors of their own.
advantages over MCUs for many automotive applications but to produce an ASIC
Equivalency Checking (EC) tools that use often cannot be justified given the expected
formal verification to exhaustively com- volumes and design effort required.
pare RTL descriptions against resulting FPGAs fit this need perfectly and enable
gate level code are commonplace in the a number of unique capabilities especially
ASIC world, but are new to FPGAs. How- useful in this environment. However, the
ever, they are rapidly being employed on testing of these devices has to meet safety
large FPGA designs to counter the time it critical hardware standards, introducing
Figure 3. Formal methods offer a mechanism for introducing
takes to weed out tool chain errors. For design and verification overheads. Formal
faults without changing the design code.
FPGAs, specialized EC tools are required Methods provide an effective way to meet
Observation Coverage uses a mechanism that can support the complex sequential the requirements of the standards for
where the design code is temporarily nature of the synthesis optimizations. By FPGAs, driving the use of the tools in this
altered to see if the checks within the veri- employing FPGA EC, engineers can safely application, as well as other safety critical
fication environment flag these changes. By leverage these optimizations to produce areas such as the aerospace, power generamanipulating these alterations and using the highest quality design possible, with tion, and defense industries. Using a formal
the exhaustive nature of the formal tech- confidence that bugs will not be introduced. tool based flow improves design quality,
niques, it is possible to establish a precise For Safety Critical designs EC usage goes return on investment and time-to-market.
test metric for the entire design, without further by proving that the tool chain has
not introduced errors after the RTL has
the overhead of some similar methods.
been fully validated.
Dr. Raik Brinkmann is President and Chief ExecuAGGRESSIVE DESIGN
tive Officer of OneSpin Solutions.
OPTIMIZATIONS
While Observation Coverage assists in
proving that design verification has been
20
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-7670 Industrial Computer
TS-7250-V2 Embedded Board
GPS & Cellular Modem to Track Assets
High Performance & Industrial Grade
Pricing starts at
Backwards Compatible with TS-72xx
$129 $169
Qty 100
Qty 1
Pricing
starts at
Shown w/
optional
micro
SD Card
$165
Qty 100
$199
Qty 1
Low cost plastic
enclosure available
Features:
Features:
454 MHz ARM CPU
1x USB Host
Up to 1 GHz ARM CPU
2x USB Host
Up to 256 MB RAM
4x DIO, 2x CAN
512 MB RAM
1x USB Device
2 GB NAND Flash
2x COM, 1x RS-485
2 GB eMMC Flash
6x Serial Ports
2x microSD Socket
1x Battery Backed RTC
1x microSD, 1x SD
75x DIO, 1x CAN
1x 10/100 Ethernet
1x Temperature Sensor
2x 10/100 Ethernet
1x PC/104 Connector
Benefits:
Benefits:
Low power with 10 mW sleep state
Hardware Flexibility with On-board FPGA
-40 ºC to 85 ºC, 100% soldered-on components
Several control I/O interfaces
Easy development w/ Debian and Linux 2.6
Launches your application in under a second
Boots quickly to your Embedded Application
Easy development w/ Debian and Linux 2.6
Guaranteed available until 2025
High Data Reliability with SLC eMMC Flash
Coming Soon:
www.embeddedARM.com
NA
GI
RI
Sup
Support every step
of the
th way with
open source vision
ope
O
N
PE
Embedded
Emb
systems
that are
syst
built
buil to endure
O
RU
GG
ED
E
LI
F
NG
LO
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
-40 ºC to 85 ºC Industrial temperature range
TS-7680 like TS-7670 w/ WiFi & Bluetooth
Unique
Uniq embedded
solutions
add value
solu
for our
o customers
engineers guide to Automotive Embedded
Microchip Technology
MICROCHIP TECHNOLOGY
The MCP2561/2 is a Microchip Technology Inc. second
generation high-speed CAN transceiver. It serves as an
interface between a CAN protocol controller and the
physical two-wire CAN bus. The device meets the automotive requirements for high-speed (up to 1 Mb/s), low
quiescent current, electromagnetic compatibility (EMC)
and electrostatic discharge (ESD)
FEATURES & BENEFITS
◆ Approved at major automotive OEMs in the US,
Components (Processors, DSPs, FPGAs, IP etc.)
◆
◆
◆
Components (Processors, DSPs, FPGAs, IP etc.)
◆
Europe and Asia allowing suppliers global product
flexibility
Highly robust with ESD protection on CANH and
CANL greater than ±8 kV (IEC61000-4-2)
Standby current of less than 5 μA helping suppliers
meet ECU power budget requirements
Internal level shifting device option allowing easy
interface directly to CAN controllers with supply
voltages between 1.8V to 5.5V
SPLIT output pin device option used to stabilize common mode in biased split termination schemes
TECHNICAL SPECS
◆ Supports 1 Mb/s operation
◆ Implements ISO-11898-5 standard physical layer
requirements
◆ Meets and exceeds stringent automotive design
requirements including “Hardware Requirements
for LIN, CAN and FlexRay Interfaces in Automotive
Applications”, Version 1.3, May 2012
◆ Extended (E): -40°C to +125°C and High (H): -40°C to
+150°C
◆ Available in 8-pin PDIP, 8-pin SOIC and 3 × 3 8-pin
DFN
APPLICATION AREAS
Power-train networks, active vehicle safety systems,
accident avoidance systems, parking assistance, body
electronics, electronic stability control
AVAILABILITY
CONTACT INFORMATION
In production
22
EMBEDDED SYSTEMS ENGINEERING t| Hardware
September/October
t September/October
2014
2014
Microchip Technology
2355 West Chandler Blvd.
Chandler, Arizona 85224
USA
888-MCU-MCHP Toll Free
480-792-7200
[email protected]
www.microchip.com
engineers guide to Automotive Embedded
Microchip Technology
The OS81118 is the latest MOST150 Intelligent
Network Controller (INIC) with USB 2.0 Device Port
and optionally integrated COAX physical layer. It can
be seamlessly incorporated into today’s MOST150
systems. With its USB 2.0 Hi-Speed device port, the
OS81118 provides all capabilities to realize a system
for in-car mobile and Wi-Fi® connectivity applications
on the MOST150 network. Furthermore, the OS81118
enables an easy implementation of the most up-to-date
multi-core consumer SoCs to MOST® technology.
Along with the Ethernet channel of MOST150 developed
to use IP communications the integration of LTE/4G/3G
becomes easy. This enables communication within and
outside the vehicle in Ethernet, packet oriented format
while benefiting from the proven audio and video
streaming capabilities of MOST technology.
In addition to the optical physical layer (oPHY) interface,
the OS81118 features an optionally integrated coaxial
transceiver, which provides a cost-down path on the
MOST physical layer. By using the OS81118’s internal
coax transceiver, no external components are required,
besides the standard cable connectors. The coax electrical physical layer (cPHY) expands the application
range of MOST technology from infotainment systems
to Advanced Driver Assistance Systems (ADAS) applications such as rear view camera and surround view
systems.
FEATURES & BENEFITS
OS81118 INIC
MediaLB® Port
INIC Processor
Control Port
INIC
Software
Stack
Power Control
and Monitor
Streaming Port
USB Port
SPI Port
MOST®
Network Port
Clock Manager
and RMCK Port
Components (Processors, DSPs, FPGAs, IP etc.)
Components (Processors, DSPs, FPGAs, IP etc.)
OS81118
◆ Two independently configurable Streaming Ports
(two serial data pins per port) capable of routing
streaming data in industry standard formats, as well
as DFI data.
TECHNICAL SPECS
◆ Operating voltages: 1.2V (required only when the
HSIC interface is used)/1.8V/3.3V
◆ 72-pin QFN (10 × 10 mm) lead-free, RoHS-compliant
package, wettable flanks
◆ Temperature range (junction): -40 °C to +125 °C
◆ 150 Mbits/s MOST network bandwidth supporting
low-cost LED/POF-based optical physical layer and
optionally coax electrical physical layer
◆ Supports all MOST150 data types (Control, Synchronous, Asynchronous packet data, MOST Ethernet
data with on-chip support of IEEE MAC addressing,
Isochronous data to transport streams not synchronized to MOST)
◆ Universal Serial Bus (USB) Port supporting Hi-Speed
USB 2.0 upstream data transfers using either USB
2.0 physical layer, or High-Speed Inter-Chip (HSIC)
physical layer
◆ Powerful MediaLB® multiplex interface supporting
transport of all MOST data types. High-speed differential mode (Media LB 6-Pin) as well as Legacy
single-ended mode (MediaLB 3-Pin) are possible.
APPLICATION AREAS
Infotainment system, cluster displays, ADAS, Rear-view
camera, Top-view camera, 4G LTE/3G connectivity
AVAILABILITY
Please contact [email protected]
availability information
for
CONTACT INFORMATION
Microchip Technology
2355 West Chandler Blvd.
Chandler, Arizona 85224
USA
888-MCU-MCHP Toll Free
480-792-7200 Telephone
[email protected]
www.microchip.com
www.eecatalog.com/automotive
www.embeddedsystemsengineering.com
www.eecatalog.com/automotive
tHardware t | EMBEDDED
EMBEDDEDSYSTEMS
SYSTEMSENGINEERING
ENGINEERING
2323
engineers guide to Embedded Linux & Android
Clear the Mobile
Graphics Thicket
Embedded designers can follow a roadmap to alleviate graphics
challenges when developing for mobile medical, smartphones/
tablets, gaming, HDTV and more.
The reason for needing to create this
illusion at all is in the interest of performance. If we forced the rendering
operations to actually happen synchronously you would end up with the GPU
and CPU idle at different points during
the computing process, which negatively
impacts performance.
To remove this idle time, designers can
use the OpenGL ES driver to maintain
By Peter Harris, ARM
the illusion of synchronous rendering
behavior while actually processing renith today’s mobile devices now offering as much computing power as some dering and frame swaps asynchronously.
desktop computers, many consumers are using these devices as the primary By running asynchronously designers
means of consuming multimedia content. While this is great for consumers, it can build a small backlog of work for the
GPU, allowing a pipeline to be created
doesn’t come without challenges for engineers designing the end devices.
where the GPU is processing older workOvercoming common design challenges faced during development is made easier loads from one end of the pipeline, while
by choosing the right GPU that offers the best power-to-energy-efficiency ratio and the CPU is busy pushing new work into
development tools to help spot and address potential problems during graphics opti- the other, resulting in the best performance possible.
mization.
W
As graphics technologies continue to improve, new visual capabilities are being leveraged across all areas, from HD TVs to mobile gaming devices—even mobile medical
devices. Advances in graphics technologies like removing idle time, pipeline throttling and increased shading capability are clearing the way for mobile graphics to
continue to change lives.
In an effort to cut down the learning curve with graphics optimization on OpenGL
ES, ARM has compiled a roadmap that developers can follow to navigate key graphics
challenges including:
PIPELINING: COLLABORATING THE CPU AND GPU
The first step in successfully starting your next graphics project is to understand
the relationship between the application’s function calls at the OpenGL ES API and
the execution of the rendering operations those API calls require. The OpenGL ES
API will act as a synchronous API from the application perspective. Since the API
is synchronous, all API behavior after the draw call is specified to behave as if that
rendering operation has already happened, but on nearly all hardware-accelerated
OpenGL ES implementations this is an illusion maintained by the driver stack.
Similar to the draw calls, the second illusion that is maintained by the driver is the
end-of-frame buffer flip. Most developers first writing an OpenGL ES application will
say that calling eglSwapBuffers swaps the front and back buffer for their application,
which again maintains the illusion of driver synchronicity.
gl
Dr
aw
*
gl
Dr
aw
*
gl
Dr
aw
*
eg
lS
wa
u
pB
ff
er
gl
s
Dr
aw
*
gl
Dr
aw
*
gl
Dr
aw
*
CPU
GPU
Frame 1
Frame 2
Figure 1. Creating a small backlog of work for the GPU lets the GPU and CPU work as a team.
24
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Removing this idle time is critical to
a mobile device’s ability to efficiently
display the information needed. The
resulting smoother frame rate enables
trouble-free analysis of images and as a
side-effect of the clean pipelining, the
optimal selection of both CPU and GPU
operating frequencies will help extend
battery life—allowing more detailed
examinations and a larger number of
patients being seen between charges.
PIPELINE THROTTLING
Pipeline throttling is a strategy used to
minimize latency between the CPU’s
work and frame rendering to avoid delays
between user touch interaction with their
device and the information displayed on
the screen. Implementing a throttling
mechanism actually slows down the CPU
thread periodically and stops it from
queuing up work when the pipeline is
already full. This mechanism is normally
provided by the host windowing system,
rather than by the graphics driver itself.
SurfaceFlinger — the Android window
surface manager – can control the pipeline depth simply by refusing to return a
buffer to an application’s graphics stack
if it already has more than “N” buffers
queued for rendering. If this situation
occurs you would expect to see the CPU
going idle once per frame as soon as “N”
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-4900 Computer Module
Touch Panel Computers
1 GHz i.MX6 w/ WiFi & Bluetooth
Panel Mount or Fully Enclosed
Pricing Starts At
Series Starts At
$ 99
$ 369
Qty 100
Qty 100
$134
$ 409
Qty 1
Qty 1
1 GHz Single or Quad Core Cortex A9 ARM CPU
Up to 2 GB DDR3 RAM and 4 GB eMMC Flash
Wireless 802.11 b/g/n and Bluetooth 4.0
1x Gigabit Ethernet, 1x PCI Express Bus
1x mSD slot, 1x SATA II, 1x USB Host, 1x USB OTG
70x DIO, 4x I2C, 1x I2S, 2x SPI, 2x CAN
-40 ºC to 85 ºC Industrial Temperature Range
Features can include:
Runs Linux 3.10, Debian, Ubuntu, Yocto, QT, OpenGL
5, 7, and 10 Inch Touchscreens
Coming Soon: QNX, Android and Windows Support
Fanless operation from -20 ºC to 70 ºC
Up to 1 GHz ARM CPU
Computer-on-Modules
Up to 2 GB RAM, 4 GB eMMC Flash
State of the Art Embedded Design
2x microSD with DoubleStore
TS-4740: High Capacity FPGA and Gigabit Ethernet
2x Ethernet, 2x USB Host
CAN, RS-232, SPI, I2C, DIO
Optional cellular, WIFI & XBEE radios
TS-4200: Atmel ARM9 w/ super low power
Supports Linux w/ Android Coming Soon
TS-4800: 800 MHz FreeScale iMX515 w/ video
Headphone connector and speaker
www.embeddedARM.com
NA
GI
Sup
Support every step
of the
th way with
open source vision
ope
RI
Emb
Embedded
systems that are
syst
built to endure
buil
O
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
1x RS485 Two-Wire Modbus
TS-4720: Like TS-4710 + 2 GB eMMC Flash & 2 Ethernets
PE
N
TS-4710: Up to 1066 MHz PXA168 w/ video
RU
GG
ED
LO
NG
LI
FE
TS-4600: 450 MHz low cost w/ 2 Ethernets
O
NEW!
Uniq
Unique embedded
solutions add value
solu
our customers
for o
engineers guide to Embedded Linux & Android
CPU
<<blocked>>
<<blocked>>
<<blocked>>
Geometry
stencil. A 1080p smartphone display therefore has a
working set of 16MB and a 4k2k TV has a working set
of 64MB. Due to their size, these working buffers must
be stored off-chip in a DRAM.
Every blending, depth testing and stencil testing
operation requires the current value of the data for
the current fragment’s pixel coordinate to be fetched
Figure 2. Implementing a throttling mechanism actually slows down the CPU thread periodically
and stops it from queuing up work when the pipeline is already full.
from this working set. All fragments shaded will typically
is reached, blocking inside an EGL or OpenGL ES API touch this working set, so at high resolutions the bandwidth load
function until the display consumes a pending buffer, placed on this memory can be exceptionally high, with multiple readmodify-write operations per fragment, although caching can mitigate
freeing up one for new rendering operations.
this slightly.
This same scheme also limits the pipeline buffering if
the graphics stack is running faster than the display THE ARM MALI GPU APPROACH
refresh rate. In this scenario, content is "vsync limited" The Mali GPU family takes a very different approach, commonly
waiting for the vertical blank (vsync) signal which tells called tile-based rendering, designed to minimize the amount of
the display controller it can switch to the next front power-hungry external memory accesses, which are needed during
buffer. If the GPU is producing frames faster than rendering. The GPU uses a distinct two-pass rendering algorithm for
the display can show them, then SurfaceFlinger will each render target, first executing all of the geometry processing and
accumulate a number of buffers which have completed then executing all of the fragment processing. During the geometry
rendering but which still need to be shown on the processing stage, the GPUs break up the screen into small 16x16
pixel tiles and construct a list of which rendering primitives are
screen.
present in each tile. When the GPU fragment shading step runs, each
The main objective of this strategy is to prevent the shader core processes one 16x16 pixel tile at a time, rendering it to
GPU from getting too far ahead of what is currently dis- completion before starting the next one. For tile-based architectures
played on the screen. By only rendering work which is the algorithm equates to:
needed, less power is wasted, which once again extends
For each (tile)
battery life and allows diagnostic devices to be used in
For each (primitive in tile)
the field for longer.
For each (fragment in primitive in tile)
Render fragment
THE “TRADITIONAL” APPROACH
In a traditional mains-powered desktop GPU
architecture—commonly called immediate mode As a 16x16 tile is only a small fraction of the total screen area it is
architecture—the fragment shaders are executed on possible to keep the entire working set (color, depth, and stencil) for a
each primitive, in each draw call and in sequence. Each whole tile in a fast RAM, which is tightly coupled with the GPU shader
primitive is rendered to completion before starting the core. This tile-based approach has a number of advantages, specifically
in terms of giving significant reductions in the bandwidth and power
next one, with an algorithm which approximates to:
associated with framebuffer data, as well as being able to provide lowcost anti-aliasing in order to improve visual quality.
For each (primitive)
For each (fragment)
These benefits make Mali GPUs the ideal technology for mobile medRender fragment
ical devices. Not only do they offer a range of performance and energy
As any triangle in the stream may cover any part of the efficiency enhancements that extend battery life and enable higher
screen, the working set of data maintained by these screen resolutions, they also are ubiquitous and highly portable. Addirenderers is large; typically at least a full-screen size tionally, Mali GPUs are available all over the world in numerous form
color buffer, depth buffer and possibly a stencil buffer factors, and optimized for a range of different markets and requiretoo. A typical working set for a modern device will be ments.
32 bits-per-pixel (bpp) color and 32bpp packed depth/
Fragment
GPU
Vertex Shader
DDR
Attributes
FIFO
Fragment Shader
Textures
Framebuffer
Working Set
Figure 3. Immediate-mode Renderer Data Flow
26
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Peter Harris is the Mali OpenGL ES Performance Architect at
ARM, working on optimization of GPU hardware and software
subsystems.
Copyright © ARM Limited (or its affiliates)
FINALLY...
Easy Android™ Data Acquisition
Full Android driver support for over 30 MCC
USB and Bluetooth™ data acquisition products
New BTH-1208LS – Only $199
; Bluetooth and USB connectivity
; 8 SE/4 DIFF analog inputs
; 1 kS/s continuous sampling, 50 kS/s burst I/O mode
; 2 analog outputs, 8 digital I/O, one 32-bit counter
; Rechargeable batteries, over 8 hours of continuous use
™
; Demo apps available on Google Play
; OEM version available for easy integration
Collect data
wirelessly with the
BTH-1208LS DAQ
device
Turn your Android tablet or phone into a low-cost data logger.
mccdaq.com/Android
Contact us
The Value Leader in Data Acquisition
1.800.234.4232
©2014 Measurement Computing Cor por ation, 10 Commerce Way, Nor ton, M A 02766 ; info @mccdaq.com
Complete
Coverage of 30+
Key Embedded
Technologies
Valuable Company
and Product
Information
Opinions and Insight
Featured
Blogs
engineers guide to Embedded Linux & Android
EMAC, Inc.
INDUSTRIAL TEMPERATURE
SOM-9X25 SYSTEM ON MODULE
Compatible Operating Systems: Linux
Made in the USA the SoM-9X25 is an industrial
strength fanless 400 MHz ARM SoM with 10/100 BaseT
Ethernet, onboard PHY (2nd Ethernet optional), 6 serial
ports (3 with handshake) and auto RS-485 capability,
1 High Speed USB 2.0 Host Port, 1 Full Speed USB 2.0
Host Port, 1 High Speed USB 2.0 Device Port, 2 SPI
& 2 I2C ports, CAN 2.0B Controller, and 1 I2S Audio
port. The module provides up to 4GB of eMMC, up to
16MB of serial data flash, up to 128MB of DDR2 RAM,
with additional flash provision provided by a SD/MMC
flash card interface. Using the same small 144 pin
SODIMM form-factor (2.66” x 1.5”) as other EMAC SoM
modules the SoM-9X25 is the ideal processor engine
for your next design. The SoM-9X25 has an industrial
temperature range (-40 to +85C), battery backed real
time clock, 4 channel 10-bit analog-to-digital converter,
and a typical power requirement of less than 1 watt.
The recommended off-the-shelf carrier board is the
SoM-150ES which allows the user to immediately
start coding their application. The System on Module
approach provides the flexibility of a fully customized
product at a greatly reduced cost. EMAC provides
a Free Eclipse IDE and SDK for development All the
compiling, linking, downloading, and debugging
inherent to software development can be done from
one easy to use high level interface. Quantity 1 price
for SoM-9x25 is $149 USD.
For more information or quantity pricing please visit our
website: http://www.emacinc.com/products/system_on_
module/SoM-9x25
Industrial
Industrial
Supported Architectures: ARM
TECHNICAL SPECS
◆ Atmel ARM9 400 MHZ Fanless Processor
◆ Up to 128 MB of DDR2 SDRAM, Up to 4GB eMMC
Flash, Up to 16MB Serial Data Flash
◆ 6 Serial Ports, 1 High Speed USB 2.0 Host port, 1
Full Speed USB 2.0 Host port, 1 High Speed USB 2.0
Device port
◆ CAN 2.0 B Controller, I2S Audio Port, 2 I2C and 2 SPI
ports, 10/100 BaseT Fast Ethernet with PHY
◆ 4 Channels of 10-Bit A/D & 32 GPIO Lines
APPLICATION AREAS
Industrial Control, Industrial Automation,
Acquisition, Test & Measurement
Data
AVAILABILITY
Now
FEATURES & BENEFITS
◆
◆
◆
◆
◆
Industrial Temperature -40 ~ +85C
Small, 144 Pin SODIMM form factor (2.66” x 1.50”)
Access to Processor Bus
System Reset, Real Time Clock
Timers/Counters, PWM controller
CONTACT INFORMATION
EMAC, Inc.
2390 EMAC Way
Carbondale, IL 62902
USA
618-529-4525 Telephone
618-457-0110 Fax
[email protected]
www.emacinc.com
www.eecatalog.com/embeddedlinux
www.embeddedsystemsengineering.com
www.eecatalog.com/embeddedlinux
tLow-Power Boards & Modulest | EMBEDDED
EMBEDDEDSYSTEMS
SYSTEMSENGINEERING
ENGINEERING
2929
engineers' guide to LTE & 4G
Increasing Wireless Security
with Bluetooth Low Energy
Understand how to leverage the latest Bluetooth Low Energy (BLE) options for safeguarding wireless and promoting privacy and security for the industrial and consumer Internet of
Things (IoT) and M2M transactions.
By Jennifer Gibbs, Laird
W
e’re at the dawn of a new era in connectivity and convenience
unlike anything we’ve experienced before. The Internet of
Things (IoT) promises to deliver on the vision of anywhere/anytime
knowledge and control of our home and work environments, and
depending on the side of Geoffrey Moore’s “chasm” you sit, the IoT
may already be here. Today I can monitor my connected home and
ensure my family is safe, optimize my home energy usage and check
on my pets, all while at home or on the road. There will be a tipping
point; a handful of innovative consumer products and services that
even the late adopters won’t be able to ignore, after which there will
be little question that the IoT has arrived.
Security and privacy are two imperative considerations in any wireless
design. A recent protocol of Bluetooth version 4.x, Bluetooth Low Energy
(BLE) is a connectivity option for OEMs seeking secure and private connection capabilities. BLE makes it possible to add wireless short-range
capabilities to devices. Adding these capabilities enables smaller form
factors, better power optimization and the ability to operate on a small
power cell for months or even years. BLE also comes equipped with several security and privacy capabilities. This article serves as a technical
guide to security and privacy for BLE.
SECURITY MODES
Security is a critical issue in any wireless application, and Bluetooth is
no exception. People looking to send sensitive information via BLE need
to take precautions to make sure those messages are not intercepted.
To protect against security risks such as spying and remote access, BLE
offers several security modes. Bluetooth Low Energy security is implemented in both the Host Security Manager Protocol (SMP) and the
Controller Link Layer. Additionally, BLE uses AES-CCM cryptography
to generate keys that are used for encryption and authentication.
Security in BLE is similar to Classic Basic Rate/Enhanced Data Rate (BR/
EDR) with two exceptions. One, BLE does not currently use the DiffieHellman method for exchanging keys during the pairing procedure,
and encryption is based on AES. Two, Classic Bluetooth uses algorithms
based on Secure And Fast Encryption Routine (SAFER)+
ADDRESSING AND PRIVACY
BLE can use Random Device Addressing to help increase the privacy of
the connection and prevent “tracking,” assuming eavesdropping did not
occur during the key exchange that takes place during Phase 3 of the
30
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
Figure 1. Bluetooth Low Energy security is implemented
in both the Host Security Manager Protocol (SMP) and the
Controller Link Layer.
Pairing process described below. It is worth noting that
Random Addressing is not a requirement that all devices
support. There are four types of addresses defined for
BLE:
t 1VCMJD *&&& 'PSNBU‰.BOVGBDUVSFSTQFDJëD *&&&
MAC address and company identifiers can be purchased through the IEEE Registration Authority.
t 3BOEPN4UBUJD‰#VSOFEUPSBEJPTJMJDPOVQPOTIJQment or can be randomly generated to a new value
at each power cycle.
t 3BOEPN 1SJWBUF 3FTPMWBCMF‰6TFE JO CPOEFE
devices and requires the Identity Resolving Key
(IRK) be shared during Phase 3 of the Pairing procedure. This changes periodically based on a timer
or other method. This is the default use case for iOS
devices.
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-7670 Industrial Computer
TS-7250-V2 Embedded Board
GPS & Cellular Modem to Track Assets
High Performance & Industrial Grade
Pricing Starts At
Series Starts At
Se
$129
$ 169
Qty 100
Qty 100
$168
$ 199
Qty 1
Qty 1
Shown w/
optional
micro
SD Card
Low cost plastic
enclosure available
Features:
Features:
454 MHz ARM CPU
1x USB Host
Up to 1 GHz ARM CPU
2x USB Host
Up to 256 MB RAM
4x DIO, 2x CAN
512 MB RAM
1x USB Device
2 GB NAND Flash
2x COM, 1x RS-485
2 GB eMMC Flash
6x Serial Ports
2x microSD Socket
1x Battery Backed RTC
1x microSD, 1x SD
75x DIO, 1x CAN
1x 10/100 Ethernet
1x Temperature Sensor
2x 10/100 Ethernet
1x PC/104 Connector
Benefits:
Benefits:
Low power with 10 mW sleep state
Hardware Flexibility with On-board FPGA
-40 ºC to 85 ºC, 100% soldered-on components
Several control I/O interfaces
Easy development w/ Debian and Linux 2.6
Launches your application in under a second
Boots quickly to your Embedded Application
Easy development w/ Debian and Linux 2.6
Guaranteed available until 2025
High Data Reliability with SLC eMMC Flash
Coming Soon:
www.embeddedARM.com
NA
GI
RI
Sup
Support every step
of the
th way with
open source vision
ope
O
PE
N
Emb
Embedded
systems that are
syst
built to endure
buil
O
RU
GG
ED
FE
LI
NG
LO
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
-40 ºC to 85 ºC Industrial temperature range
TS-7680 like TS-7670 w/ WiFi & Bluetooth
Uniq
Unique embedded
solutions add value
solu
our customers
for o
engineers' guide to LTE & 4G
t 3BOEPN 1SJWBUF /PO3FTPMWBCMF‰4IBSFE CFUXFFO CPOEFE EFWJDFT
for use during reconnection. This changes with each connection.
As an example of real use case, all iOS devices by default use resolvable addresses and will change the addresses on a regular basis. This
approach prevents an iOS device picked up one day at a restaurant
from being picked up the next day as it will have
changed its identity.
PAIRING PROCEDURE PHASES
Phase 1 (no encryption) of the pairing procedure entails
Request for Pairing-Exchange I/O capabilities, Authentication requirements, maximum link key size negotiation
and Bonding requirements.
Phase 2 (no encryption at beginning and encrypted data at the
end of the phase) encompasses
steps in which Random and
Confirm values are exchanged
(association model based on
I/O and Authentication requirements for both devices) and used
to generate the Short Term Key
(STK) along with the “secret”
Temporary Key (TK), which
never appears on air. At the end
of phase 2, the connection is
encrypted using the STK with
Encrypted Diversifier (EDIV)
and RANDOM values set to 0.
PAIRING
Pairing in BLE is similar to Simple Secure Pairing
in BR/EDR from a user interface perspective with
the exception that the public key exchange to generate the Short Term Key (STK), as outlined in the
description of Phase 2 below, is not protected from
passive eavesdropping. This lack of protection
means that one of the three Association Models,
Just Works, offers no protection as the Temporary
Key (TK) used is the constant value 0 If the Figure 2. Laird BL600 Modules offer the
six-digit MITM passkey is used then the eaves- smartBASIC programming interface to simplify
dropper has the ability to use brute force to BLE module integration.
crack the key, given that the TK is a value in the
range 0 to 999999. On the other hand, if the Association Model OOB
pairing is used, then the TK is a 128-bit number, and brute force is going Phase 3 is an optional phase, which is invoked only if
to take an extremely long time to crack the STK. BR/EDR uses Elliptic bonding requirements are exchanged during Phase 1.
Curve Diffie-Hellman cryptographic key exchange—unprotected if Phase 3 is an encrypted connection established using the
an eavesdropper is present at the time of pairing. If bonding, i.e., an STK from Phase 2.
agreement between the peers to save keys for later use, is employed,
then Phase 3 of the pairing procedure is invoked. The devices will store During Phase 3, keys and values for identity/encryption/
the keys and values exchanged in this phase and will not be required to authentication are exchanged between Master/Slave.
perform the pairing procedure again, unless the bonding information is The Identity Resolving Key (128 bit) is also optionally
exchanged during this phase, which is used, along with
deleted from one of the devices.
a 24-bit random number, to resolve the Random Private
The type of pairing model used and whether or not bonding takes place Resolvable address if the peer is going to use resolvable
addresses. For example iOS devices always use resolvable
dictates the security level of the connection.
addresses.
There are two BLE security modes.
The Connection Signature Resolving Key (CSRK) is also
optionally exchanged if signed data in attributes need to
t .PEFIBTUISFFTFDVSJUZMFWFMT
be exchanged.
1. No Security
2. Unauthenticated Pairing with Encryption
The Public IEEE or Random Static address is exchanged
3. Authenticated Pairing with Encryption
during this phase if requested. This exchange is highly
t .PEFJTPOMZVTFEXJUI$POOFDUJPO#BTFE%BUB4JHOJOH.FTTBHF recommended if the IRK has been supplied and resolvAuthentication Code, MIC or MAC depending on the source added able addresses are going to be used in communications.
to each data packet) and has two levels:
ASSOCIATION MODELS
1. Unauthenticated Pairing with Data Signing
Phase 2 uses one of three Association Models to set and
2. Authenticated Pairing with Data Signing
use the Temporary Key (TK) to generate the STK. These
BLE uses Attributes (data) organized into Characteristics and Services. three Association Models are Out of Band (OOB), Passkey
Each Attribute includes its own authentication and security properties Entry and Just Works. In OOB pairing, TK is exchanged/
set using an OOB channel that provides both a security
that are required to access the data held in that Attribute.
method that is different from the Bluetooth channel and
is resistant to Man In The Middle (MITM) attacks, e.g.
NFC or 802.11 channels and in this case, the TK will be
32
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
The brain of your
MTCA.4 system
Higher bandwidth for Physics: the new NAT-MCH-PHYS80
Key features
·
·
·
·
·
·
x16 PCIe Gen3 uplink at front panel
128Gbps link to local CPU/root complex
special low latency and low jitter CLK module
fully user accessible quad core Intel® Core i7
new RTM for LLRF backplane
complete product line
Let Your Application benefit
Make our expertise your solution – talk to us ... we care.
N.A.T. GmbH I Konrad-Zuse-Platz 9 I 53227 Bonn I Germany
Fon: +49 228 965 864 0 I Fax: +49 228 965 864 10 I [email protected]
www.nateurope.com I innovation in communication
engineers' guide to LTE & 4G
Phase 3
Keys/Values
Distribution
Following is a list of keys/values
that can be distributed during
Phase 3 of the paring procedure:
t
Up to two Long Term Key
(LTK)—Used to encrypt future
links between bonded Master/
Slave. Both ends of the connection can provide an LTK as in
future the master/slave roles
can be reversed, and in that
case the LTK that was supplied
by the device that is currently
in the connection as a slave
shall be used.
t EDIV and RAND—Used to
establish/identify LTK from
the bonding manager
t Identity Resolving Key (IRK)—
Used to identify/resolve the
Private Resolvable Address. If
used, IRK is a 128-bit key that
is passed along with any 24-bit
random number, into the AES
encryption engine. The lower
46 bits of the resulting output
give you the Random Private
Resolvable address and the
upper 2 bits are 10 to identify
the address as resolvable.
t Random Public (IEEE)
Random Static Address
a random 128 bit. For Passkey Entry, TK
is the Passkey used at both ends of the
connection. This method assumes that
both ends have knowledge of the Passkey
prior to starting Phase 2 of the pairing
procedure. Lastly, in Just Works, TK is set
to a zero value as no values are exchanged
and offers virtually no privacy as modern
computers can crack and derive the STK
in minutes.
targeting the enterprise is the Laird BL600 module. This
module incorporates smartBASIC, an implementation of
a structured BASIC programming language optimized
for use on low-cost embedded systems with limited
memory. In addition to using memory efficiently, BL600
modules enhance security by allowing proximity pairing
between two Bluetooth radios to take place.
As long as an eavesdropper is not present
during the Phase 2 exchange, the pairing
procedure can be assumed confidential
and all values distributed in Phase 3
secure.
OEMs can leverage the security and privacy options
available with BLE for multiple applications and adjust
the technology to meet their needs.
If both ends of a BLE connection incorporate smartBASIC
then it is possible to create a simple “Just Works on
Steroids” pairing where the TK is a random 128-bit
OOB and Passkey Entry are the only pre-shared key that is issued to invoke an OOB pairing
models that offer MITM protection or where the assumption is that the OOB TK was set outAuthenticated Pairing. TK is a predictable of-band at the time the device was configured. In this
or easily estimated value and thus the configuration, the out-of-band mechanism to transfer
the OOB shared key is the smartBASIC source code.
source of the security weakness.
CONCLUSION
The world is going wireless. However,
along with the many benefits of wireless
technology come new security threats.
That is why it is imperative to choose
wireless technologies with tested and
proven security and privacy capabilities.
A BLE offering that comes equipped with
integrated security and privacy settings
specifically designed for the enterprise
network can mitigate security and privacy risks. One example of a BLE module
or
t Connection
Signature
Resolving Key (CSRK)—Used
to sign data and verify signatures on receiving device (Data
Authentication)
34
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
More information is at BL600 product page or at www.
lairdtech.com
Jennifer Gibbs is a Field Applications Engineer for
the Embedded Wireless Solutions unit of Laird. She
specializes in Bluetooth and RAMP technologies and
enjoys helping customers get the most out of their
experience developing and designing Laird's wireless modules into their products. Jennifer graduated
from Kansas State University in Manhattan, Kansas
in 2004 with a Bachelor of Science in Electrical Engineering with a focus in Communication Systems and
Digital Signal Processing.
•Communications/
Cloud
Unprecedented Performance Density
with Modular Computing Solutions
•Network Security
Why are VadaTech’s MicroTCA-based system
•Edge/Access
platforms deployed in the top communications
•LTE/5G
companies in the world? Because we provide
•Networking
leading-edge solutions that re-define performance
density. From 100G line cards to chassis platforms
that cut rack-space utilization in half, VadaTech
has a solution for you.
www.vadatech.com
www
vad
• [email protected] • (702) 8963337
ADVERTORIAL
The LTE-connected car, the
next hot “consumer device”
By u-blox
At the 2014 CES, the world’s largest consumer electronics
trade show held annually in Las Vegas, there was a clear
emphasis on intelligent, broadband connected cars.
All the major automotive suppliers were showcasing cars
with sophisticated navigation and infotainment. To a large
extent, the key technology enabling these innovations is
4G LTE.
LTE possesses the speed, low latency and IP-connectivity
(voice, video and data are all transmitted over IP), to enable
a whole new generation of high quality in-vehicle applications supporting attractive video-rich communication,
navigation, information, entertainment and locationbased services for driver and passengers.
Perhaps the most visible innovation is seamless, high definition, low-latency, multi-channel video streaming, just
like that experienced at home on a large HD television. For
the automobile industry where profit margins on vehicles
are low - typically much less than 10% of the retail price of
the car, LTE provides a clear and compelling way for automakers to add new services and revenue models to their
new LTE-equipped models.
NEW VEHICLE APPLICATIONS ENABLED BY LTE
Let’s now consider some real examples of the new applications that LTE will make possible over the next few
years. Infotainment / Mobile hotspot In March 2014,
Audi announced that the 2015 model Audi A3 will come
equipped with 4G LTE. The Audi Connect 4G service provides Google Earth and Street View maps for navigation
and supports Google search queries and Internet / social
media browsing via speech recognition and audio read out.
In addition, online music / video streaming, collision assistance and an integral 4G / Wi-Fi router supporting up to
eight other passenger devices turns this car into a mobile
internet hotspot!
INTERACTIVE TV AND MOVIES
The enhanced performance of 4G LTE networks enables HD
movie streaming without buffering or waiting, as well as
support for multiple simultaneous users (everyone gets to
watch their own on-demand movie!). Many cars, especially
premium models, now offer TV screens for passenger use
on long journeys, and also for driver use when the vehicle
is stationary.
36
LTE is enabling a new generation of high-speed video-rich in-vehicle
applications and services
It is easy to see how adoption of in-car TV might mirror
the evolution of in-car audio - albeit more rapidly - from
FM radio in the 1960s to the currently popular on-demand
music streaming services such as Pandora and Spotify.
LIVE EVENTS AND BROADCAST CONTENT
Certain premium events such as the World Cup or Superbowl attract hundreds of millions of simultaneous viewers.
To handle such high-demand live content, LTE’s Enhanced
Multimedia Broadcast Multicast Services (E-MBMS) provides a low-latency, spectrum efficient way for the same
content to be received by all users (broadcast) or a selected
number of subscribers on the LTE network. It does this
by implementing point-to-multipoint transmission (multicast) where a single live video stream is transmitted
through the network core, multiplied and distributed to
viewers or subscribers as required at the edge of the network.
AUGMENTED REALITY AND HEAD-UP-DISPLAYS
Increasingly, status and safety information is being presented to the driver as an overlay on his forward view via
the windscreen, similar to aircraft instrumentation.
LTE takes this development to a new level by leveraging
the information content and power of the internet. For
example, upcoming traffic hazards may be monitored by
cameras and road-sensors in real-time, and then combined
Engineers’ Guide to LTE and 4G 2015
ADVERTORIAL
with data from surrounding vehicles. The ‘fused’ data is
processed in the cloud and then relayed to all cars. Thanks
to the low transmission latency of LTE, this is possible
in real-time with respect to the relative velocities of surrounding vehicles.
These “smart cars” are then able to modify on-screen lane
guidance displays accordingly and even change navigation
choices automatically in advance of detected hazards. The
driver may be presented with a red box around the car
ahead together with green arrows indicating which lane
The LTE multimode modules TOBY-L200 and TOBY-L210
are available to cover the radio spectrums deployed in
America and Europe respectively, offering performance at
LTE Release 9, Cat. 4 (150Mbps downlink / 50Mbps uplink).
The devices support both circuit switched speech and Voice
over LTE together with fall-back for both data and voice
traffic to 2G / 3G. This enables support for all potential
system architectures from fully integrated to functionally
independent, as discussed above.
For more information about u-blox’ LTE modem modules
for automotive applications, visit
www.u-blox.com/lte.html
In-car Augmented Reality
to move into before taking the desired exit indicated by
virtual markers in the distance, all without taking his eyes
off the road.
U-BLOX’ APPROACH TO IN-CAR LTE
u-blox has developed a range of both cellular modules
and satellite positioning components that provide plug
and play compatibility and a range of options from 2G to
3G to 4G LTE multimode (which includes both 2G and 3G
HSPA+). In addition, these modules are available in AECQ100 automotive qualified solder-down form for stringent
requirements of the automotive industry.
Swiss-based u-blox (SIX:UBXN) is
a leading provider of wireless and
positioning semiconductors and
modules for the automotive, indus- u-blox TOBY-L200
trial and consumer markets. Our Automotive grade LTE
solutions enable people, vehicles and Multimode module
machines to locate their exact position and wirelessly communicate via
voice, text or video. With a broad portfolio of chips, modules
and software solutions, u-blox is uniquely positioned to allow
OEMs to develop innovative solutions that enable mobility
quickly and cost-effectively. With headquarters in Thalwil,
Switzerland, u-blox is globally present with offices in Europe,
Asia and the USA.
CONTACT INFORMATION
u-blox
Global Headquarters
Zürcherstrasse 68
8800 Thalwil
Switzerland
Tel: +41 44 722 74 44
Fax: +41 44 722 74 47
[email protected]
www.u-blox.com
www.eecatalog.com/4G
37
engineers guide to Smartphone, Tablet & Wearables
Advanced Image
Stabilization Techniques
for Tablet Camera
Performance
through pixel blurring and the creation of
unwanted artifacts. Typically standalone
cameras and mobile devices offering a
photo or video function also add some
form of image-stabilization capability
to compensate for unintentional movements by the user. Intel-based tablets are
no exception. The latest Atom processor
adds multi-axis document image solution (DIS) and image alignment to help
remove blur from moving objects.
By Mark Aaldering, ROHM Semiconductor
However, as tablet and other mobile
device developers move to ever-higher
ntel processors play a leading role in the tablet and two-in-one device market, espe- levels of resolution, demand is accelcially for those higher-performance devices targeted at business environments erating for more advanced image
and high-end consumer applications. One of the more popular applications for these stabilization techniques. Two of the
devices is still photography and video capture. Market research indicates that busi- more common implementations—elecness users and consumers prefer to use their tablets to share high-quality photos or tronic image stabilization (EIS) and
videos on Facebook, Instagram, Snapchat or other popular, visually oriented social optical image stabilization (OIS)— are
media sites. In fact for many users, their tablet serves as a replacement for a digital taking video and still image photography
to a new level of performance.
still camera or inexpensive video camera.
I
Not surprisingly, Intel processors help make that possible. The latest generation of
the Intel Atom processor, for example, not only improves overall performance and
extends battery life, it also supports excellent graphics and video with integrated
image signal processing for both still and video image capture. By coupling highresolution screens with high pixel density, together with the graphics-processing
capabilities embedded in Intel processors, many of today’s tablets and two-in-one
devices deliver extremely high-quality graphics and video.
Whether users are capturing still images or recording video, image stabilization
plays a key role in producing a high-quality result by eliminating image distortion
Figure 1: There are two primary methods of implementing optical image stabilization
38
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
BASIC PRINCIPLES
Image stabilization techniques are
designed to reduce blurring associated
with relatively minor shaking of the
camera within a few optical degrees
while the image sensor is exposed to
the capturing environment. These functions are not designed to prevent motion
blur caused by movement of the target
subject or extreme movements of the
camera itself. This minor movement of
the camera by the user is characterized
by its pan and tilt components where the
angular movements are known as yaw
and pitch, respectively. Typically, these
image stabilization functions cannot
compensate for camera roll because
rolling the lens doesn’t actually change
or compensate for the roll motion, and
therefore does not have any effect on the
image itself relative to the image sensor.
EIS is a digital image compensation
technique which uses complex algorithms to compare frame contrast and
pixel location for each changing frame.
Pixels on the image border provide the
buffer needed for motion compensation.
An EIS algorithm calculates the subtle
differences between each frame and the
camera uses this information to interpolate new frames to reduce the sense of
motion.
engineers guide to Smartphone, Tablet & Wearables
EIS offers distinct advantages and disadvantages. As an image-stabilization
scheme, it offers developers a relatively
compact and lower-cost option. However, image quality is limited due to
image scaling and image signal postprocessing artifacts and any incremental
improvement in image quality requires
additional power to capture additional
images and perform image processing.
In addition, EIS solutions do not perform
well at full electronic zoom (long fieldof-view) and under low-light conditions.
In comparison, OIS is a mechanical
technique used in imaging devices to
stabilize the recording image by controlling the optical path to the image sensor.
Two primary methods are used to implement OIS. One, called lens shift, involves
moving the parts of the lens. The second,
termed module tilt, moves the module
itself (see Figure 1).
Camera movements by the user can
cause misalignment of the optical path
between the focusing lens and the center
of the image sensor. In the OIS lens-shift
method, only the lens within the camera
module is controlled and used to realign
the optical path to the center of the
image sensor. The module tilt method, on
the other hand, controls the movement
of the entire module including the fixed
lens and the image sensor. The moduletilt approach allows for greater range
of movement compensation by the OIS
system and achieves minimal image distortion because of the fixed focal length
between the lens and the image sensor.
This movement or vibration is characterized in the X/Y-plane, with yaw/
pan and pitch/tilt movements detected
by different types of isolated sensors.
The lens shift method uses Hall sensors
for lens movement detection while the
module tilt method uses photodetectors
to detect human movement. OIS controllers can use gyroscope data within a
lens target-positioning circuit to predict
where the lens needs to return in order to
compensate for the user’s natural movement. With lens shift, Hall sensors are
used to detect real-time X/Y locations of
the lens after taking into consideration
actuator mechanical variances and the
influence of gravity. The controller uses
a separate internal servo system that
combines the lens positioning data of the
Hall sensors with the target lens position calculation from the gyroscope to
calculate the exact driving power needed
for the actuator to reposition the lens.
The process is similar with module tilt
but the module’s location is measured
and repositioned instead of just the
lens. With both methods, the new lens
position realigns the optical path to the
center of the image sensor.
OIS control is designed to be very simple
from the customer’s standpoint, consisting simply of ON/OFF and enable/
power-save modes. The only other commands are optional manual control of
the lens in the X/Y plane or altering OIS
performance based on ambient conditions such as day, night, sports, picture,
video or viewfinder. This minimizes I2C
traffic from the host processor to the OIS
controller and simplifies software driver
Compared to EIS solutions, OIS systems development for the end customer. All
reduce blurring without significantly of the actual OIS control algorithms are
sacrificing image quality especially in performed autonomously on the conlow-light and long-range image capture. troller itself, using the internal processor
But unlike EIS which needs no additional and RAM.
hardware, OIS solutions require actuators and power driving sources that tend OIS CONTROLLER
to require a larger footprint and higher CONSIDERATIONS
Controller architectures for OIS applicacost.
tions vary significantly. Some combine
a programmable core with custom proMODULE COMPONENTS
An OIS system relies on a complete grammable digital signal processing for
module of sensing, compensation and gyroscope signal processing and servo
control components to accurately cor- control. Others integrate programmable
rect for unwanted camera movement. gyroscope signal processing and servo
control into the core itself. Typically all
OIS memory and control calculations are
performed on the OIS controller and do
not require an external host processor’s
computational resources or external
memory.
Developers looking for a controller
for OIS applications should consider a
number of issues. Does the controller
offer full control of the X- and Y-axis
voice coil motor (VCM) drivers, Hall
amplifier and current drivers and
photo-reflector drivers? Does it feature the wide variety of interfaces and
peripherals needed for the application
including I2C, ADCs, PLL oscillators,
SPI master for digital gyroscopes and
support for analog gyroscopes? Does
the MCU support integrated drivers
Figure 2. ROHM’s OIS system uses a complete module of
sensing, compensation and control components to accurately
correct for unwanted camera movement.
for autofocus, neutral density filters or
shutter functions? Be aware that some
controllers offer digital filter designs in
their servo control and gyroscope signal
processing circuits that can improve performance by dynamically compensating
for gyroscope and actuator temperature
drift while not removing intentional pan
and tilt movement by the camera user.
Others add custom control software
for automatic lens control, automatic
pan-tilt detection and access to different
programmable capturing modes and calibration settings.
MEASURING IMAGE
STABILIZATION
Image stabilization is measured by suppression ratio (SR) and is utilized to
www.eecatalog.com/pcie t EMBEDDED SYSTEMS ENGINEERING
39
engineers guide to Smartphone, Tablet & Wearables
SYSTEM TESTING
Proper OIS operation requires simulating the entire system to ensure
that all components interact correctly together. While most OIS
controller suppliers can simulate the ideal performance of golden
OIS components such as the actuator, ROHM has developed highly
specialized simulation tools that allow not only for simulation of OIS
components, but also provide real-world OIS component simulations
as well. These real-world results help accelerate the development of
custom firmware for customers integrating OIS into their design (see
The figure below depicts examples of motion blur in the Figure 4).
target pattern. The DSTATIC image represents an ideal
result with no vibration or motion in the image. Ideally OIS systems also require careful calibration to ensure proper operaan OIS system attempts to match the quality of a still tion. All of the components within the OIS system possess individual
image with no motion blur and the DSTATIC image manufacturing variances and assembly misalignment variances. A
serves as a benchmark for calculating SR performance properly functioning system, the OIS controller must know the subtle
of the OIS system. In this example the DSTATIC image sensitivity variances introduced by the manufacturing and assembly
exhibits the shortest zoomed white area distance due processes. Once the calibration process is complete, the OIS controller
to the absence of movement or blurring in the captured can use the collected data to modify control of the system and its
image. The DOISoff image represents the appearance of components.
an image when it is vibrating or moving without using
image stabilization. As a result, the DOISoff image
exhibits much more blurring compared to the other
images.
gauge OIS performance. SR is calculated using a spatial
test chart with a target pattern. Images of the target pattern are captured with OIS ON/OFF and with/without
vibration. The images with and without OIS are then
compared to compute a ratio of the amount of blur in
each image. This test is typically used to provide a final
guarantee that all of the components in the OIS system
are functioning properly.
The observed amount of blur represents what needs
to be corrected or suppressed to match the DOISoff
image with the DSTATIC image. Therefore, the DOISon
image represents the actual benefit of the OIS system.
In this example, the DOISon image depicts an image
that is vibrating or moving while image stabilization is
enabled. The stabilization system suppresses blurring of
the image and the distance of the zoomed white area is
less than when compared to the DOISoff image. Once all
three images have been captured, the blurring effect of
each image is measured as a function of pixel count by
calculating the number of pixels within the width of the
Figure 4. Graph compares real-world OIS performance vs. ROHM’s simulated
zoomed white area and then using equation 1 (shown OIS performance.
below diagram in Figure 3) to calculate final SR. This
process is repeated for each image shaking frequency SUMMARY
performance target and for each axis.
As next-generation tablets and two-in-one devices migrate up the performance curve, users will increasingly demand higher performance
image and video capture capabilities. High on users’ list will be crisp,
clear and blur-free images. By leveraging the latest advances in optical
image stabilization, tablet and two-in-one device designers can meet
those expectations.
Mark Aaldering is the senior director of technical product marketing at ROHM
Semiconductor where his dedicated team drives new products into development and
adoption in the computing, consumer, automotive and industrial markets.
Figure 3. The DOISoff image exhibits much more blurring compared to the
other images in generic test pattern.
40
EMBEDDED SYSTEMS ENGINEERING t September/October 2014
DESIGN YOUR SOLUTION TODAY
CALL 480-837-5200
TS-7670 Industrial Computer
TS-7250-V2 Embedded Board
GPS & Cellular Modem to Track Assets
High Performance & Industrial Grade
Pricing Starts At
Series Starts At
Se
$129
$ 169
Qty 100
Qty 100
$168
$ 199
Qty 1
Qty 1
Shown w/
optional
micro
SD Card
Low cost plastic
enclosure available
Features:
Features:
454 MHz ARM CPU
1x USB Host
Up to 1 GHz ARM CPU
2x USB Host
Up to 256 MB RAM
4x DIO, 2x CAN
512 MB RAM
1x USB Device
2 GB NAND Flash
2x COM, 1x RS-485
2 GB eMMC Flash
6x Serial Ports
2x microSD Socket
1x Battery Backed RTC
1x microSD, 1x SD
75x DIO, 1x CAN
1x 10/100 Ethernet
1x Temperature Sensor
2x 10/100 Ethernet
1x PC/104 Connector
Benefits:
Benefits:
Low power with 10 mW sleep state
Hardware Flexibility with On-board FPGA
-40 ºC to 85 ºC, 100% soldered-on components
Several control I/O interfaces
Easy development w/ Debian and Linux 2.6
Launches your application in under a second
Boots quickly to your Embedded Application
Easy development w/ Debian and Linux 2.6
Guaranteed available until 2025
High Data Reliability with SLC eMMC Flash
Coming Soon:
www.embeddedARM.com
NA
GI
RI
Sup
Support every step
of the
th way with
open source vision
ope
O
PE
N
Emb
Embedded
systems that are
syst
built to endure
buil
O
RU
GG
ED
FE
LI
NG
LO
We’v never
We’ve
discontinued a
disc
product in 30 years
prod
L
-40 ºC to 85 ºC Industrial temperature range
TS-7680 like TS-7670 w/ WiFi & Bluetooth
Uniq
Unique embedded
solutions add value
solu
our customers
for o
locate, communicate, accelerate
TOBY-L2 series
High-speed LTE
multimode modules
TOBY-L2 series
24.8 x 35.6 x 2.6 mm
Industry’s smallest LTE / HSPA+/GPRS modules
6 LTE category 4: 150 Mb/s download, 50 Mb/s upload
6 Layout-compatible with u-blox 2G, 3G & CDMA modules
6 Variants for America, Europe and Asia; supports VoLTE
6 Seamless interface to u-blox GNSS & CellLocate® indoor positioning
6 LGA and Mini PCIe packages
www.u-blox.com