part i security challenges in automotive hardware
play

Part I Security Challenges in Automotive Hardware/Software - PowerPoint PPT Presentation

Part I Security Challenges in Automotive Hardware/Software Architecture Design Martin Lukasiewycz TUM CREATE Singapore Outline Motivation (current E/E architectures) Trends (Integrated Architectures / Connected Car) Challenges Overview


  1. Part I Security Challenges in Automotive Hardware/Software Architecture Design Martin Lukasiewycz TUM CREATE Singapore

  2. Outline Motivation (current E/E architectures) Trends (Integrated Architectures / Connected Car) Challenges Overview Example CAN Bus Challenges Electric Vehicles

  3. Recent Automotive Security Issues Martin Lukasiewycz 3

  4. Increasing Complexity in Automotive Electronics 400 350 300 240 250 200 175 150 90 100 100 100 50 50 13 3 5 1 0 Memory [MB] ECUs Sources: Paul Milbredt, AUDI AG, EFTA 2010 - Switched FlexRay: Increasing the Effective Bandwidth and Safety of FlexRay Networks BMW Group, FTF 2010 Orlando - Energy Saving Strategies in Future Automotive E/E Architectures Martin Lukasiewycz 4

  5. Audi A8 - 1994 Source: Selbststudienprogramm - Audi A8 Audi ABS/EDS/ASR (Bosch) Martin Lukasiewycz 5

  6. Audi A8 - 2010 Source: Selbststudienprogramm - Audi A8 ’10 Bordnetz und Vernetzung Martin Lukasiewycz 6

  7. Automotive Industry OEMs BMW, Volkswagen, General Motors, Toyota, Daimler Tier r 1 Bosch, Continental, Delphi, Denso Tie ier r 2 Infineon, NXP , Freescale, Renesas Martin Lukasiewycz 7

  8. Trend 1: From Federated to Integrated Architectures Costs: Scalability, Flexibility, Extensibility Domain Architecture Concept from BMW State-of-the-art E/E Architecture Source: Ethernet for Automotive Applications. Robert Source: Selbststudienprogramm - Audi A8 ’10 Bordnetz Bruckmeier. Freescale Technology Forum, Orlando. June 23, und Vernetzung 2010. Martin Lukasiewycz 8

  9. In-vehicle network today / Access points Martin Lukasiewycz 9

  10. Trend 2: Connected Car CAR2X 4G Audi AG – Audi Connect Apple Inc. Martin Lukasiewycz 10

  11. Top Ten Most-Destructive Computer Viruses Source: http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive- Computer-Viruses.html 1) ) Stuxne net (2009 09-2010 2010) 2) ) Conficker icker Virus s (2009) 9) 3) ) agen gent.b t.btz (2008) 8) 4) Z ) Zeus s (2007) 7) 5) ) Poiso sonIvy nIvy (2005) 6) ) MyDoo oom (2004 04) 7) ) Fizze zer r (2003 03) 8) ) Slamme mmer r (2003) 9) ) Code Red (2001) 10) ) Love Letter/I ter/I LOVE YOU (2000) 00) Martin Lukasiewycz 11

  12. Automotive Design Objectives Safety Vs. Security Costs Security issues in vehicles can lead to fatal consequences. Martin Lukasiewycz 12

  13. Challenges: Security issues in automobile Wireless connectivity Malicious software Unauthorized products www.computer-automation.de www.bhptuning.de Unprotected sensors Counterfeits Accessible buses/ECUs shoeobsession.wordpress.com westseattleblog.com VDO Martin Lukasiewycz 13

  14. More than two billion CAN nodes have been sold since the protocol's development in the early 1980s. Source: D. Wrampler Security Threats and Countermeasures for Intra-vehicle Networks Source: http://www.ixxat.com/can-controller-area-network- introduction_en.html Martin Lukasiewycz 14

  15. CAN bus operation ECU 0 priority ECU 1 ECU 2 ECU 0 delay time ECU 2 ECU 1 Martin Lukasiewycz 15

  16. CAN vs Secure communication Message encryption: Message authentication: Martin Lukasiewycz 16

  17. CAN vs Secure communication CAN FlexRay Ethernet confidentiality feasible feasible Available (IPSEC) integrity - ( only 8byte) feasible Available (IPSEC) availability - (Event-Triggered) Available (Time- Feasible (PTP + Tiggered protocol + switches: bus Bus guardian) guardian possible ) Martin Lukasiewycz 17

  18. Security challenges - Electric Vehicles Drive-by-wire Nissan Drive-by-wire Charging plug Battery Martin Lukasiewycz 18

  19. Drive-by-Wire Energy-efficient recuperation Enabler of new drive-train architectures Source: Gunter Freitag, Eine zukunftsfähige E/E-Architektur für PKW Martin Lukasiewycz 19

  20. Vehicle-to-grid / Charging plug ISO/IEC 15118: Martin Lukasiewycz 20

  21. Battery Management Monitors: temperature voltage www.mpoweruk.com current Martin Lukasiewycz 21

  22. Cell Operation Battery cells have to be operated in a safe range Battery Safety Source: http://www.digikey.com/us/en/techzone/energy- harvesting/resources/articles/battery-fuel-gauges.html Martin Lukasiewycz 22

  23. Thank you for your attention. Questions? Martin Lukasiewycz 23

Recommend


More recommend