Life StyleTechnology

Protecting automotive security by SoCs begins with IP addresses

Automotive Security using IP Networks

A secure IP address is the first step in protecting automotive SoCs

A major transformation is taking place in the automotive industry. Vehicles are becoming more sophisticated and valuable with enhanced connectivity and capabilities that provide a better driving experience.

What is the best theft deterrent for automobiles?

Some ways?

  • If your auto is stolen, install a GPS device so that the police can locate it. Never leave valuables in your car. Always park your car on well lit streets. At home park your car in the garage (if you have one).
  • With smartphones proliferating, it will become possible to disable your car remotely. This could deter some thefts, at least until someone figures out how to hijack or disable the software.
  • The easiest and cheapest way to keep a car from being stolen or the alarm from being deactivated is to install kill switches at hidden locations that are only known to you.

Furthermore, they collect and transmit increasingly sensitive data, which makes them attractive targets for hackers.

Many of us would like to have a fast car but unless we are James Bond or a racer we probably don’t need a fast car. Automobile cybersecurity is growing rapidly. What are the problems? The AV-TEST Institute reports that the number of malicious programs targeting cars has increased from about 65 million in 2011 to about 1.1 billion by 2020. According to a 2019 report by Upstream Security, car intrusions have grown by 94% annually since 2016.

A security system can do only so much. Despite the new gadgets and available technology, common sense remains your best defense against car thieves.

It will be improved to function as an integrated data-security system for car communication systems in the future. This should ensure that all information exchanged within and outside of the vehicle is protected.

OEMs must address cybersecurity as a critical and urgent need early in the design cycle.

Now, the question raises how should manufacturers minimize the risks? As you can imagine, that makes automotive cybersecurity a major concern for consumers, auto companies, and OEMs alike.

Indeed, automotive security has not been regulated in the industry, as much as other industries. There are clear specifications of Federal safety features required in the US. In addition, there are others on a per-state basis, especially from California.

The environment is changing rapidly with several regulations, standards, and guidelines, including:

29 rules

UNECE (United Nations Economic Commission for Europe) mandated new safety systems for new cars. Since the NHTSA’s mandate was implemented 20 years ago, cars and light trucks have improved greatly. To comply with the rules, OEMs must manage Internet hazards, secure their vehicle designs, detect and respond to safety accidents, and update their software safely and securely. There are any number of guidelines for server hardening on the Internet.

ISO / SAE 21434

 In 2021, the road traffic systems will include a safety risk management system. ADAS (Advanced Driver Assistance Systems) are systems that aim to improve driver safety with a focus on driver safety, vehicle safety, and traffic safety. The life cycle of a covered system includes conception, development, production, operation, and maintenance.SAE J3101

Hardware-based security for ground vehicles. In addition to safety functions and similar usage cases, SAE J3101 includes applications that need support for meeting vehicle safety needs.

NHSTA (National Highway Safety Administration) internet security

According to the best practices report, different vehicles should have online security systems. NHSTA focuses on car stalls that might be vulnerable to cyberattacks. Such as connecting cables and cables for human or machine interaction.As you can imagine, that makes automotive cybersecurity a major concern for consumers, auto companies, and OEMs alike.

Secure vehicle systems should also be capable of protecting against unpredictable malicious attacks.

In addition, the ISO 26262 work safety standard provides protection against systematic and indirect faults. The development took place of security SoCs for vehicles starting from the hardware level.

Security using a Hardware Secure Module (HSM) IP with a trusted root. IP-connected vehicles will perform as expected. Preventing indirect errors and attacks, and will be able to defend themselves against malicious attacks.

Connected cars Technology:

This allows the car to share internet access with other devices both inside as well as outside the vehicle. Connected cars have features like navigation, Automotive System Diagnosis and Prognosis, Gesture Control and Voice Commands, Contextual Help, Parking Assistance, Safety and Security, Fleet Management, Vehicle Tracking, Road Side Assistance, Wifi hotspots and many others.

Automotive IP Solutions from HSM

After a reset, the hardware of an SoC needs to be able to assess its integrity. After a reset, it is able to confirm that its integrity is intact. Whenever it deems the network safe, it will open it up. This network security ultimately forms the intelligence inside the vehicle. That will eventually be able to communicate with the outside world. The SoC must be able to prevent random and systematic failures and meet strict security requirements.

For secure applications and cryptographic processing, IP HSMs can also include ASIL D-compliant processors. Such as the low-power IP ARC processor.

SoC designers search for the following IPs:

  • A solution that provides a root of trust for the system and protects it from evolving threats with top-class security.
  • Systems for ensuring compliance with ASIL B for random errors and ASIL D for systematic errors
  • make absolutely sure all drive controls are in a separate logical space from all networked devices. 
  • MAC/hash / symmetric/asymmetric cryptographic acceleration that scales from CPU-specific commands to a cryptographic core with side-channel protection
  • External memory control with side channels (DPA protection) for privacy and integrity protection, as well as runtime tamper detection

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button