part i security challenges in automotive hardware
play

Part I Security Challenges in Automotive Hardware/Software - PowerPoint PPT Presentation

Part I Security Challenges in Automotive Hardware/Software Architecture Design Martin Lukasiewycz TUM CREATE Singapore Outline Motivation (current E/E architectures) Trends (Integrated Architectures / Connected Car) Challenges Overview


  1. Part I Security Challenges in Automotive Hardware/Software Architecture Design Martin Lukasiewycz TUM CREATE Singapore

  2. Outline Motivation (current E/E architectures) Trends (Integrated Architectures / Connected Car) Challenges Overview Example CAN Bus Challenges Electric Vehicles

  3. Recent Automotive Security Issues Martin Lukasiewycz 3

  4. Increasing Complexity in Automotive Electronics 400 350 300 240 250 200 175 150 90 100 100 100 50 50 13 3 5 1 0 Memory [MB] ECUs Sources: Paul Milbredt, AUDI AG, EFTA 2010 - Switched FlexRay: Increasing the Effective Bandwidth and Safety of FlexRay Networks BMW Group, FTF 2010 Orlando - Energy Saving Strategies in Future Automotive E/E Architectures Martin Lukasiewycz 4

  5. Audi A8 - 1994 Source: Selbststudienprogramm - Audi A8 Audi ABS/EDS/ASR (Bosch) Martin Lukasiewycz 5

  6. Audi A8 - 2010 Source: Selbststudienprogramm - Audi A8 ’10 Bordnetz und Vernetzung Martin Lukasiewycz 6

  7. Automotive Industry OEMs BMW, Volkswagen, General Motors, Toyota, Daimler Tier r 1 Bosch, Continental, Delphi, Denso Tie ier r 2 Infineon, NXP , Freescale, Renesas Martin Lukasiewycz 7

  8. Trend 1: From Federated to Integrated Architectures Costs: Scalability, Flexibility, Extensibility Domain Architecture Concept from BMW State-of-the-art E/E Architecture Source: Ethernet for Automotive Applications. Robert Source: Selbststudienprogramm - Audi A8 ’10 Bordnetz Bruckmeier. Freescale Technology Forum, Orlando. June 23, und Vernetzung 2010. Martin Lukasiewycz 8

  9. In-vehicle network today / Access points Martin Lukasiewycz 9

  10. Trend 2: Connected Car CAR2X 4G Audi AG – Audi Connect Apple Inc. Martin Lukasiewycz 10

  11. Top Ten Most-Destructive Computer Viruses Source: http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive- Computer-Viruses.html 1) ) Stuxne net (2009 09-2010 2010) 2) ) Conficker icker Virus s (2009) 9) 3) ) agen gent.b t.btz (2008) 8) 4) Z ) Zeus s (2007) 7) 5) ) Poiso sonIvy nIvy (2005) 6) ) MyDoo oom (2004 04) 7) ) Fizze zer r (2003 03) 8) ) Slamme mmer r (2003) 9) ) Code Red (2001) 10) ) Love Letter/I ter/I LOVE YOU (2000) 00) Martin Lukasiewycz 11

  12. Automotive Design Objectives Safety Vs. Security Costs Security issues in vehicles can lead to fatal consequences. Martin Lukasiewycz 12

  13. Challenges: Security issues in automobile Wireless connectivity Malicious software Unauthorized products www.computer-automation.de www.bhptuning.de Unprotected sensors Counterfeits Accessible buses/ECUs shoeobsession.wordpress.com westseattleblog.com VDO Martin Lukasiewycz 13

  14. More than two billion CAN nodes have been sold since the protocol's development in the early 1980s. Source: D. Wrampler Security Threats and Countermeasures for Intra-vehicle Networks Source: http://www.ixxat.com/can-controller-area-network- introduction_en.html Martin Lukasiewycz 14

  15. CAN bus operation ECU 0 priority ECU 1 ECU 2 ECU 0 delay time ECU 2 ECU 1 Martin Lukasiewycz 15

  16. CAN vs Secure communication Message encryption: Message authentication: Martin Lukasiewycz 16

  17. CAN vs Secure communication CAN FlexRay Ethernet confidentiality feasible feasible Available (IPSEC) integrity - ( only 8byte) feasible Available (IPSEC) availability - (Event-Triggered) Available (Time- Feasible (PTP + Tiggered protocol + switches: bus Bus guardian) guardian possible ) Martin Lukasiewycz 17

  18. Security challenges - Electric Vehicles Drive-by-wire Nissan Drive-by-wire Charging plug Battery Martin Lukasiewycz 18

  19. Drive-by-Wire Energy-efficient recuperation Enabler of new drive-train architectures Source: Gunter Freitag, Eine zukunftsfähige E/E-Architektur für PKW Martin Lukasiewycz 19

  20. Vehicle-to-grid / Charging plug ISO/IEC 15118: Martin Lukasiewycz 20

  21. Battery Management Monitors: temperature voltage www.mpoweruk.com current Martin Lukasiewycz 21

  22. Cell Operation Battery cells have to be operated in a safe range Battery Safety Source: http://www.digikey.com/us/en/techzone/energy- harvesting/resources/articles/battery-fuel-gauges.html Martin Lukasiewycz 22

  23. Thank you for your attention. Questions? Martin Lukasiewycz 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend