欧美亚洲另类在线-欧美亚洲另类在线观看-欧美亚洲免费久久久-欧美亚洲欧美区-h免费视频-h免费网站

Language Language
Company News Industry News
  • Contact:Minister Xu
  • Mobile:13841408476
  • Tel:024-44837288
  • Fax:024-44837004
  • E-mail:xuming58@126.com
  • Web:www.zca.net.cn
  • Address:No.110 XiangHuai Road
    Benxi Economic Development Zone
    Liaoning Province

How is connectivity driving safety strategy to tackle 'modern car' vulnerabilities?

27 Nov,2020

8.jpg

The new generation of cars driven by innovations with electronics, software systems and connectivity are highly vulnerable to cyber attacks and hacking. Hence the vehicle manufacturers must design and deploy software and hardware that meet all the critical safety and security standards to prevent such attacks.

At the recently-held ETAuto Connected Vehicle Virtual Summit, industry experts deliberated upon the challenges that stem from the evolving hardware and software architecture of cars and how it is impacting their overall functional safety and security.

With every advancement in the in-vehicle electronics, automakers have to grapple with challenges like Bluetooth hacking, fiddling with the keys and other open interfaces through which a hacker can gain access to the vehicle.


According to Omkar Panse, AVP and head of digital connected solutions, KPIT, the combination of connectivity and autonomy will have a positive impact on the overall automotive safety with systems getting smarter and more intuitive for handling.

“However, for that, you have to adhere to functional safety norms, see how you write the software, validate the software and ensure that there are no uncovered paths in software. Then only it can be termed reliable. It will also eventually help in optimising the cost profile of everything,” he said.


According to T N Umamaheshwaran, head - digital product development systems and strategic business planning, Tata Motors, “Security for on-board electronics is the weakest and the company is working with its partners and equipment suppliers to enforce the layer one of in-vehicle electronics security.”

Increasing ECU vulnerability

One of the significant outcomes of the enhanced connectivity has been the consolidation of the ECUs (Electronic Control Units), which is a major concern for functional safety and reliability. Sensors and algorithms are essential aspects of any sub-system provider.

Raghvendra Bhat, technical consultant, Ansys, said, “Connected vehicles are going to have a much larger amount of electronics and software in them opening up a bigger canvas for hacking and exploiting the vulnerabilities. They must be dealt with systematically.”

One of the ways to check larger damage if someone tries to attack through open channels could be to separate the critical functionalities of the vehicle so that they don’t have any connectivity with the rest of the network used for infotainment, he said.

On the other hand, Tata Motors is working on virtual sensors to reduce the complexity of in-vehicle electronics, Umamaheshwaran said. “We are working on eradicating sensors totally and creating virtual sensors where there is no need to keep sensors for everything. We can derive data from the already known data,” he said.

Security challenges in architecture design

A modern car consists of various components from different suppliers which are integrated into one system. Integrating all these components into a secure architecture is almost as impossible as controlling the security of the external network environment.

Pointing out one of the major limitations, Panse said, “A lot of hardware in today’s cars is legacy hardware that may not be able to support some of the modern security requirements like hardware security modules or support for advanced cryptographic algorithms.”


Some of the fundamental design changes inside the car are required to be able to support cryptographic standards, hardware standards, security modules and functionality like a secured booth.

However, Panse doesn’t see fundamental infrastructure changes in the on-board system. “There is a bit of change required from the architecture perspective that needs to happen from the ground up. The security infrastructure modules in terms of algorithms, cryptographic processes, hardware security modules, all that infrastructure need to come inside the car”, he said.

About the vulnerabilities that arise in the external environment (V2X communication), Khushwant Rana, head - cybersecurity solutions -mobility, ETAS Automotive India Private Limited, said, “External environment is more dependent on how security is implemented at the enterprise level. The driver in the vehicle, OEMs and Tier-1s cannot control the external network environment.”

“Anything which goes through a cloud backend makes several transitions from wireless to fibre optic, fibre optic to again wireless. You can’t have a coherent security measure across all of the suppliers of information exchange. That’s where the role of security by design comes into play,” he said.

The best way to deal effectively with it is to come up with preventive measures in case of attacks. For instance, KPIT follows a TRA (Threat Risk Assessment) module where the potential attack surfaces are analysed. Based on that it builds a threat model and against the threat model security model is built, Panse said.

Different standards of security

Safety practices are becoming more regulated as the automotive industry is required to adopt a standardised set of procedures for designing and testing products.

For instance, the connected vehicle platform of Tata Motors is on a public cloud, certified by the ISO 27001 standard, which sets out the specification for an information security management system (ISMS).

Meanwhile, ISO 26262 is a functional safety standard certification, essential for the development of automotive systems-on-chip (SoCs) used in autonomous driving and advanced driver assistance systems (ADAS) applications. All automotive manufacturers worldwide adhere to it.

“There is another standard in the pipeline, ISO 21434,” Bhat said. It focuses on the cybersecurity risk in road vehicle electronic systems.

This standard will cover all stages of a vehicle’s lifecycle — from design to decommissioning by the application of cybersecurity engineering. This will apply to all electronic systems, components, and software in the vehicle, and any external connectivity.



主站蜘蛛池模板: 亚洲三级小视频 | 日韩免费在线视频 | 夜夜天天干 | 国产免费一级高清淫曰本片 | 欧美日韩一卡2卡三卡4卡新区 | 99久久伊人一区二区yy5099 | 一级毛片免费毛片一级毛片免费 | 麦克斯奥特曼免费观看 | 一区二区在线免费视频 | 日本黄色网址免费 | jizz性欧美12 | 亚洲天堂爱爱 | 久久久噜噜噜久久久 | 开心色99xxxx开心色 | 自拍偷拍欧美 | 亚洲视频在线网 | 色综合天天综久久久噜噜噜久久〔 | 老汉影视永久免费视频 | 久久午夜免费视频 | 黄色自拍偷拍 | 亚洲阿v天堂2018在线观看 | 久久免费国产视频 | 欧美黄视频在线观看 | 亚洲免费色图 | 国产精品爱久久久久久久三级 | 国内精品一区二区在线观看 | 六月婷婷色 | 亚洲在成人网在线看 | 天天干夜啪 | 久久天天躁夜夜躁狠狠躁2020 | 日本高清视频网站www | 精品久久天干天天天按摩 | 爱综合网| 日韩高清特级特黄毛片 | 免费在线黄网站 | 视频在线观看一区 | 免费一看一级毛片 | 天天爱添天天爱添天天爱添 | 狠狠色婷婷丁香综合久久韩国 | 九九热在线免费视频 | 日色视频|