Autosar RS E2e
Autosar RS E2e
Disclaimer
This work (specification and/or software implementation) and the material contained in
it, as released by AUTOSAR, is for the purpose of information only. AUTOSAR and the
companies that have contributed to it shall not be liable for any use of the work.
The material contained in this work is protected by copyright and other types of intel-
lectual property rights. The commercial exploitation of the material contained in this
work requires a license to such intellectual property rights.
This work may be utilized or reproduced without any modification, in any form or by
any means, for informational purposes only. For any other purpose, no part of the work
may be utilized or reproduced, in any form or by any means, without permission in
writing from the publisher.
The work has been developed for automotive applications only. It has neither been
developed, nor tested for non-automotive applications.
The word AUTOSAR and the AUTOSAR logo are registered trademarks.
Table of Contents
1 Scope of this document 4
4 Functional Overview 7
4.1 Functional safety and communication . . . . . . . . . . . . . . . . . . . 7
4.1.1 Repetition of information . . . . . . . . . . . . . . . . . . . . 7
4.1.2 Loss of information . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.3 Delay of information . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.4 Insertion of information . . . . . . . . . . . . . . . . . . . . . 7
4.1.5 Masquerading . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.6 Incorrect addressing . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.7 Incorrect sequence of information . . . . . . . . . . . . . . . 8
4.1.8 Corruption of information . . . . . . . . . . . . . . . . . . . . 8
4.1.9 Asymmetric information sent from a sender to multiple re-
ceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.10 Information from a sender received by only a subset of the
receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.11 Blocking access to a communication channel . . . . . . . . . 8
4.2 Sources of faults in E2E communication . . . . . . . . . . . . . . . . . 8
4.2.1 Software faults . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.2.2 Random hardware faults . . . . . . . . . . . . . . . . . . . . 9
4.2.3 External influences, environmental stress . . . . . . . . . . . 9
4.3 Safe End-to-End communication in AUTOSAR . . . . . . . . . . . . . . 9
5 Requirements tracing 11
6 Requirements Specification 12
6.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.1.1 Supported communication models and features . . . . . . . 12
6.1.2 E2E detected faults . . . . . . . . . . . . . . . . . . . . . . . 14
6.1.3 E2E Algorithms and Profiles . . . . . . . . . . . . . . . . . . 16
6.2 Safety applicability and overall safety assumptions . . . . . . . . . . . 20
7 References 21
E2E End-to-End.
E2E Profile A set of combined E2E measures as efficient solution for a par-
ticular communication stack.
BER Bit Error Rate - a rate of corrupted bits in a byte stream, e.g. 1e-5.
4 Functional Overview
Safety-related automotive systems often use a safe data transmission to protect com-
munication between components (as required by ISO 26262:2011 [1]), which means
that:
1. Communication errors shall be prevented (e.g. by means of appropriate software
architecture and by means of verification).
2. If error prevention alone is insufficient (e.g. for inter-ECU communication), then
the errors shall be detected at runtime to a sufficient degree (cf. diagnostic cov-
erage, safe failure fraction) and that the rate of undetected dangerous errors is
below some allowed limit (cf. residual error rate, probability of dangerous failure
per hour or probability of dangerous failure on demand).
4.1.5 Masquerading
A type of communication fault, where some receivers do not receive the information.
Software like, communication stack modules and RTE, may contain faults, which are
of a systematic nature. Systematic faults may occur in any stage of the system’s life
cycle including specification, design, manufacturing, operation, and maintenance, and
they will always appear when the circumstances (e.g. trigger conditions for the root-
cause) are the same. The consequences of software faults can be failures of the
communication, like interruption of sending of data, overrun of the receiver (e.g. buffer
overflow), or underrun of the sender (e.g. buffer empty). To prevent (or to handle)
resulting failures the appropriate technical measures to detect and handle such faults
(e.g. program flow monitoring or E2E supervision) have to be considered.
A random hardware fault is typically the result of electrical overload, degradation, aging
or exposure to external influences (e.g. environmental stress) of hardware parts. A ran-
dom hardware fault cannot be avoided completely, but its probability can be evaluated
and appropriate technical measures can be implemented (e.g. diagnostics).
This includes influences like EMI, ESD, humidity, corrosion, temperature or mechanical
stress (e.g. vibration).
5 Requirements tracing
The following table references the features and links to the fulfillments of these.
Feature Description Satisfied by
[RS_Main_00010] AUTOSAR shall support the development of safety [RS_E2E_08527]
related systems [RS_E2E_08528]
[RS_E2E_08529]
[RS_E2E_08530]
[RS_E2E_08533]
[RS_E2E_08534]
[RS_E2E_08539]
[RS_E2E_08540]
[RS_E2E_08541]
[RS_E2E_08542]
[RS_E2E_08543]
[RS_E2E_08544]
[RS_E2E_08545]
[RS_E2E_08546]
[RS_E2E_08547]
[RS_E2E_08548]
[RS_Main_01002] AUTOSAR shall support service-oriented [RS_E2E_08540]
communication [RS_E2E_08541]
[RS_Main_01003] AUTOSAR shall support data-oriented [RS_E2E_08540]
communication [RS_E2E_08541]
6 Requirements Specification
Type: draft
The E2E Protocol shall support protected periodic communication.
This includes the following periodicity:
Description:
• periodic
• mixed-periodic
Rationale: E2E mechanism for message-oriented communication
Dependencies: –
AppliesTo: AP, CP
• Sender-receiver communication in CP (e.g. the following use cases
– Receiver being invoked independently from Sender
– Receiver being invoked on arrival of data
Use Case: – Mixed: Receiver being invoked when data arrives and
independently.)
• Events implement message-oriented communication in AP service
interfaces.
Supporting –
Material:
Type: draft
This E2E Protocol shall support protected non-periodic communication.
Description: The following shall be supported:
• Synchronous call (client gets activated when the return is available)
Rationale: E2E mechanism for service-oriented communication
Dependencies: –
AppliesTo: AP, CP
Use Case: Service-oriented client-server communication via SOME/IP methods.
Supporting –
Material:
Type: draft
E2E Protocol shall support:
• dynamic restart of communication peers and their late start
Description: • different message frequencies/cycles at receiver and sender
(over/undersampling)
• multiple receivers with different message cycles.
Depending on the variance in startup behavior and expected message
Rationale: frequency of the communication partners a later start or over/undersampling
needs to be handled by the protection mechansim.
Dependencies: –
AppliesTo: AP, CP
Communication between applications of main chassis ECU and power steering
Use Case: ECU to prevent an erroneous steering intervention due to a corruption of the
transmitted data.
Supporting –
Material:
c(RS_Main_00010)
[RS_E2E_08543] E2E protocol shall support static and dynamic length of trans-
mitted data d
Type: draft
Description: E2E Protocol shall support both static and dynamic length of transmitted data.
Depending on the used protocol static or dynamic length of transmitted data
Rationale:
needs to be handled by the protection mechanism.
Dependencies: –
AppliesTo: AP, CP
Use Case: E2E protected transmission of a variable length array over SOME/IP.
Supporting –
Material:
c(RS_Main_00010)
Type: draft
E2E Protocol shall provide a configurable mechanism to detect timeouts and
Description:
delayed data.
This mechanism can be used to detect loss and delay of communication data,
Rationale:
as requested by ISO 26262.
Dependencies: –
AppliesTo: AP, CP
• Detection of lost or delayed messages in periodic sender/receiver
communication
• Detection of lost or delayed events in periodic service-oriented
Use Case:
communication
• Detection of lost or delayed method responses in non-periodic method
communication
Supporting –
Material:
c(RS_Main_00010)
Type: draft
Description: E2E protocol shall provide a detection mechanism for corrupted data
This mechanism can be used to detect corrupted communication data, as
Rationale: requested by ISO 26262.
Dependencies: –
AppliesTo: AP, CP
• Detection of corrupted messages in sender/receiver communication
• Detection of corrupted messages in periodic event-based communication
Use Case:
• Detection of corrupted method requests/responses in non- periodic
method requests
Supporting –
Material:
c(RS_Main_00010)
Type: draft
E2E protocol shall provide a detection mechanism for masquerading or
Description:
incorrect addressing
This mechanism can be used to detect masquerade or incorrect addressing of
Rationale:
communication data, as requested by ISO 26262.
Dependencies: –
AppliesTo: AP, CP
• Detection of masquerading or incorrect addressed data in
sender/receiver communication
• Detection of masquerading or incorrect addressed data in periodic
Use Case:
event-based communication
• Detection of masquerading or incorrect addressed data in non- periodic
method request/responses
Supporting –
Material:
c(RS_Main_00010)
Type: draft
E2E protocol shall provide a detection mechanism for repetition, insertion or
Description:
incorrect sequence of data
This mechanism can be used to detect repeated, inserted communication data
Rationale: or data with incorrect sequence, as requested by ISO 26262.
Dependencies: –
AppliesTo: AP, CP
• Detection of repeated, inserted messages or incorrect sequence of
messages in sender/receiver communication
• Detection of repeated, inserted messages or incorrect sequence of
Use Case:
messages in periodic event-based communication
• Detection of repeated method responses in non-periodic method
requests
Supporting –
Material:
c(RS_Main_00010)
E2E protocol is defined to cover various sizes of exchanged data and different types
of physical bus medium. Therefore, a number of E2E profiles are created. Each E2E
profile provides a set of E2E measures as required in 6.1.2.
Type: draft
E2E Protocol shall provide E2E profiles, where each E2E profile completely
defines a particular safety protocol (including header structure, behavior as
state machine, error handling etc). Each E2E profile shall be an efficient
solution for a particular communication stack used underneath (which are
either FlexRay, CAN, CAN FD, LIN or Ethernet), used data length and data
frequency, and the required integrity level (see [1]) of the exchanged data.
Note: Each communication stack (e.g. FlexRay) has different BER, which
Description: depend on for example:
• Bit error rate on channel
• FIT values of HW
• number of ECUs
• topology (e.g. CAN->Gateway->FR)
5
5
4
4
• open/closed transmission system
c(RS_Main_00010)
[RS_E2E_08530] Each E2E profile shall have a unique Profile ID, define precisely
a set of mechanisms and its behavior in a semi-formal way d
Type: draft
Each E2Eprofile defined within the library shall:
• Have a unique Profile ID.
c(RS_Main_00010)
Type: draft
Each of the defined E2E profiles shall use an appropriate subset of the
following mechanisms:
• Sequence number (different sizes possible; in the state-of-art it is
alternatively called alive counter or consecutive number)
• CRC with different Bit length
• IDs: Source ID, Destination ID, Data ID
Description:
• Timeout
• Length
In other words, mechanisms not listed shall not be used. In each E2E profile,
the sequence number and IDs, if used, should be all part of the transmitted
data element. However, it is allowed that in a given profile, the sequence
number and/or IDs are “hidden” (not transmitted), but included in the checksum.
These are typical mechanisms used by safety protocols, and they can be
Rationale:
realized by AUTOSAR.
Dependencies: –
AppliesTo: AP, CP
Mechanisms used in an exemplary profile: 4-bit sequence counter, CRC8, Data
Use Case:
ID, timeout.
Supporting –
Material:
c(RS_Main_00010)
[RS_E2E_08533] CRC used in a E2E profile shall be different than the CRC used
by the underlying physical communication protocol d
Type: draft
CRC used in each E2E profile shall be different than the CRC used by the
Description: underlying communication protocols (FlexRay, CAN, CAN FD, LIN, Ethernet),
for which the given profile is supposed to be used with.
Using the same polynomials twice (once in com stack and again in E2E)
Rationale: provides significantly lower joint detection rate than using two different
polynomials.
Dependencies: –
AppliesTo: AP, CP
If profile X is supposed to be used only for FlexRay, then its CRC shall be
Use Case:
different than the one of FlexRay.
Supporting –
Material:
c(RS_Main_00010)
[RS_E2E_08534] E2E Protocol shall provide E2E Check status to the application
d
Type: draft
E2E Protocol shall provide E2E status of a single checked data to the
Description:
application layer.
Error handling strategies are “application dependent”, and cannot be “a priori
Rationale:
defined”.
Dependencies: –
AppliesTo: AP, CP
Use Case: Enable error-dependent reaction of the application using E2E Protocol.
Supporting –
Material:
c(RS_Main_00010)
[RS_E2E_08548] E2E Protocol shall provide E2E overall state to the application
d
Type: draft
E2E Protocol shall optionally provide E2E overall state of the so far checked
Description:
data to the application layer.
Error handling strategies are “application dependent”, and cannot be “a priori
Rationale:
defined”.
Dependencies: –
AppliesTo: AP, CP
Use Case: Enable error-dependent reaction of the application using E2E Protocol.
Supporting –
Material:
c(RS_Main_00010)
Type: draft
The E2E protocol shall support protection of short (ex. 8 bytes) and large (ex.
4KB, up to 4MB, as application requires), composite data with dynamic-length
over TCP/IP and over LIN/CAN/CAN TP/CAN FD/FlexRay/Ethernet.
Description:
Note: The max length of protected data depends on the architecture and needs
to be evaluated by quantitative analysis within the project using the E2E
protocol profile.
5
4
Rationale: Large, composite data need specific protection mechanisms.
Dependencies: –
AppliesTo: AP, CP
Communication between applications of main chassis ECU and power steering
Use Case:
ECU. (to be detailed)
Supporting –
Material:
c(RS_Main_00010)
Type: draft
The E2E protocol shall provide error detection for communicating safety related
Description:
data according to ISO 26262 [1].
E2E communication protection is state-of-art in automotive safety-related
Rationale:
series products.
Dependencies: –
AppliesTo: AP, CP
Communication between applications of main chassis ECU and power steering
Use Case:
ECU.
Supporting –
Material:
c(RS_Main_00010)
7 References
[1] ISO 26262 (Part 1-10) – Road vehicles – Functional Safety, First edition
http://www.iso.org
[2] System Template
AUTOSAR_TPS_SystemTemplate
[3] Glossary
AUTOSAR_TR_Glossary