The automotive industry has achieved full autonomy in six levels of advanced driver assistance systems (ADAS). Drivers of today’s models can choose to use some no-mention and some no-attentive driving features. Common examples include:
• Waymo™ (Google)
• Super Cruise™ (GM)
• Autopilot (Tesla)
• ProPILOT Assist® (Nissan)
• DISTRONIC PLUS® (Mercedes-Benz)
• Traffic Jam Assist (Audi)
• Pilot Assistance Systems (Volvo)
With the convenience that comes with increased automation comes the challenge of protecting cars from cybersecurity attacks. Every week we read news reports about businesses being hacked and suffering data breaches through their computer networks. Calling our modern cars “data centers on wheels” means that they are also subject to computer security issues.
The next generation of connected cars
Think about how many ways our cars are connected now: our smartphones using Bluetooth® to take calls using the car speaker system, cellular connections for roadside assistance, Wi-Fi® for over-the-air (OTA) updates, key fobs to control door locks, USB connectors, and even plugging electric vehicles into commercial chargers. Each of these connections increases the attack surface that intruders can exploit.
Automotive designers must be proactive in new designs to consider ways to mitigate security attacks on every connection. Inside each car there are dozens of electronic control units (ECUs) operating in different areas to collect sensor data and make decisions. Adding cybersecurity to the functional safety of each ECU needs to be a design goal. Using a system-level approach to provide both safety and cybersecurity for the vehicle is the best strategy. If a hacker can exploit a security vulnerability, then the driver's safety is at risk, which is a very dangerous outcome that we must avoid.
Automotive Safety Market Drivers
Today, a luxury car can contain up to 10 billion lines of code across all the ECUs and CPUs in use. This means that vehicles rely heavily on software to sense, control, and make decisions. Most automotive cyberattacks target wireless interfaces such as Bluetooth, Wi-Fi, and cellular networks. For OTA updates, the update must be securely verified before it is allowed to be installed.
The ubiquitous Controller Area Network (CAN bus) has been used in vehicles for years to enable communication between ECUs, but security has never been part of the definition of classic CAN. The advent of CAN FD (Controllable Data Rate) has an additional payload byte that allows the addition of a CAN MAC (Message Authentication Code). Ethernet connectivity in the automotive space is the new trend, and hardware vendors know how to protect this network. Making hardware systems secure usually starts with secure boot, followed by message authentication, both of which rely on truly secure key storage.
The ideal automotive safety solution would not require a complete redesign of all electronics, but rather an approach that layers new safety features.
Automotive designers must protect more attack surfaces
Cars are probably considered the most complex Internet of Things (IoT) devices that consumers use every week. With our smartphones and computers, we know how often applications and operating systems are updated to fix security vulnerabilities. Our connected cars have similar attack surfaces as our smartphones and computers, so each must be continuously defended.
Automotive OEMs can follow best practices to provide cybersecurity by ensuring that only authorized software is loaded and run (secure boot operation). Since dozens of ECUs communicate with electronic messages, only authorized ECUs are allowed, and messages are authenticated using a message authentication code (CMAC) algorithm based on an AES block cipher. Firmware update signatures are cryptographically verified before anything is allowed to be changed. Even traffic in each electronic network should be checked on each port to ensure that only valid packets are allowed.
A complete vehicle protection approach: from trunk to connected systems
Microchip is active in the field of cybersecurity for automotive applications and secure boot, which allows only authenticated content to run. This is provided by the CryptoAutomotive™ security IC, TrustAnchor100 (TA100). Designers do not have to redesign the entire system because this external hardware security module (HSM) provides multiple security functions:
• Secure Boot
• Authentication of CAN messages
• Electric Vehicle (EV) Battery Management System and Module Certification
• Message encryption using Transport Layer Security (TLS)
• Supports Qi® 1.3 certification from Wireless Power Consortium
• Cryptographic verification of module manufacturer origin
Compared to redesigning a new MCU to add safety features, this Microchip approach will save cost and design time. MCU code changes have little impact on the host MCU functional safety level. TA100 has programmed safety features and can be quickly learned without the need for safety experts. Project risk is reduced because MCU code changes are very small.
Innovations like this make cybersecurity in automotive design much easier, helping to safely accelerate the adoption of self-driving cars.
Previous article:Motor Control Trends for Electric Vehicles
Next article:Silicon Carbide (SiC) Technology Replaces Old Silicon FETs and IGBTs
- Popular Resources
- Popular amplifiers
- New help for generative AI: IBM and AMD will deploy MI300X accelerator services next year
- Nvidia's Blackwell chip has "heating problems", causing customer concerns
- Nvidia joins hands with Google to accelerate the development of quantum computing processors
- Focus on 77G millimeter wave radar ADAS applications and solutions
- Specific measures to prevent errors in wiring harness design for new energy vehicles
- Open Source Risks in the Automotive Software Supply Chain
- A brief discussion on automotive electrical and electronic domain architecture
- An article on automotive-grade CAN bus communication technology
- Towards Ethernet-based software-defined vehicles
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- Intel promotes AI with multi-dimensional efforts in technology, application, and ecology
- ChinaJoy Qualcomm Snapdragon Theme Pavilion takes you to experience the new changes in digital entertainment in the 5G era
- Infineon's latest generation IGBT technology platform enables precise control of speed and position
- Two test methods for LED lighting life
- Don't Let Lightning Induced Surges Scare You
- Application of brushless motor controller ML4425/4426
- Easy identification of LED power supply quality
- World's first integrated photovoltaic solar system completed in Israel
- Sliding window mean filter for avr microcontroller AD conversion
- What does call mean in the detailed explanation of ABB robot programming instructions?
- New help for generative AI: IBM and AMD will deploy MI300X accelerator services next year
- Nvidia's Blackwell chip has "heating problems", causing customer concerns
- How to learn embedded systems based on ARM platform
- Summary of jffs2_scan_eraseblock issues
- Application of SPCOMM Control in Serial Communication of Delphi7.0
- Using TComm component to realize serial communication in Delphi environment
- Bar chart code for embedded development practices
- Embedded Development Learning (10)
- Embedded Development Learning (8)
- Embedded Development Learning (6)
- Using PC as a peripheral emulator for ESP32
- Wind power introduction
- AD Sampling Notes
- Power amplifier related operation & application video (continuously updated)
- Analysis of PCB circuit board blistering
- 【New Year's Festival Competition】+Chaoshan Yingge Dance
- Quick Start Guide for SI4463 Module with WDS
- STM32F407VET6 PWM mutual influence problem
- just for fun, let's add punctuation to this sentence
- Could you please tell me which manufacturer this LED is from?