E-Car Communication Manager - ECM

As part of the Fraunhofer System Research for Electromobility project, Fraunhofer IIS is conducting research into communication technologies that integrate electric vehicles into their surrounding infrastructure. E-Car Communication Manager (ECM) was developed specifically for this purpose. The ARM9-based platform functions as a gateway and coordinates all important communication interfaces in different charging scenarios, such as »Allocation to charge spot«, »Vehicle identification«, and »Coordination of charging process with smart grid requirements«.

ECM combines the interfaces of a modern embedded system with the platform independence of Java technology. Integrated WLAN facilitates the universal connection of mobile devices inside the vehicle – for example, via HTML 5. This means that users can conveniently access and control charging processes even from outside the vehicle via tablet PC or smartphone.

Future expansion of the system to include additional communication possibilities promises even better integration of electric vehicles into existing infrastructure. Continuous internet access will be available via LTE. ECM is an experimental demonstration platform on which the interplay of all kinds of different communication technologies can be explored and tested. In addition, new applications can be implemented at little effort and expense.

Safety when charging and protection against operator errors are absolute necessities for all charging scenarios. In the case of communication for billing purposes or for influencing the timing of charging and discharging cycles, it is important that communication and data access are implemented accompanied by suitable security mechanisms. To ensure safety, ECM has an additional processor with suitable programming, whereas security aspects are implemented through Java and the OGEMA framework or alternatively through an OSGi framework. Consequently, ECM has outstanding technologies at its disposal to enable problem-free software installations and updates, control interaction between software modules, and prevent unauthorized access to the system’s data and software. Encrypted communication and unique authentication of web access are also possible, which safeguards personal rights management at the same time.

Sponsored by