欧美亚洲另类在线-欧美亚洲另类在线观看-欧美亚洲免费久久久-欧美亚洲欧美区-h免费视频-h免费网站

Language Language
Company News Industry News
  • Contact:Minister Xu
  • Mobile:13841408476
  • Tel:024-44837288
  • Fax:024-44837004
  • E-mail:xuming58@126.com
  • Web:m.zca.net.cn
  • Address:No.110 XiangHuai Road
    Benxi Economic Development Zone
    Liaoning Province

How is connectivity driving safety strategy to tackle 'modern car' vulnerabilities?

27 Nov,2020

8.jpg

The new generation of cars driven by innovations with electronics, software systems and connectivity are highly vulnerable to cyber attacks and hacking. Hence the vehicle manufacturers must design and deploy software and hardware that meet all the critical safety and security standards to prevent such attacks.

At the recently-held ETAuto Connected Vehicle Virtual Summit, industry experts deliberated upon the challenges that stem from the evolving hardware and software architecture of cars and how it is impacting their overall functional safety and security.

With every advancement in the in-vehicle electronics, automakers have to grapple with challenges like Bluetooth hacking, fiddling with the keys and other open interfaces through which a hacker can gain access to the vehicle.


According to Omkar Panse, AVP and head of digital connected solutions, KPIT, the combination of connectivity and autonomy will have a positive impact on the overall automotive safety with systems getting smarter and more intuitive for handling.

“However, for that, you have to adhere to functional safety norms, see how you write the software, validate the software and ensure that there are no uncovered paths in software. Then only it can be termed reliable. It will also eventually help in optimising the cost profile of everything,” he said.


According to T N Umamaheshwaran, head - digital product development systems and strategic business planning, Tata Motors, “Security for on-board electronics is the weakest and the company is working with its partners and equipment suppliers to enforce the layer one of in-vehicle electronics security.”

Increasing ECU vulnerability

One of the significant outcomes of the enhanced connectivity has been the consolidation of the ECUs (Electronic Control Units), which is a major concern for functional safety and reliability. Sensors and algorithms are essential aspects of any sub-system provider.

Raghvendra Bhat, technical consultant, Ansys, said, “Connected vehicles are going to have a much larger amount of electronics and software in them opening up a bigger canvas for hacking and exploiting the vulnerabilities. They must be dealt with systematically.”

One of the ways to check larger damage if someone tries to attack through open channels could be to separate the critical functionalities of the vehicle so that they don’t have any connectivity with the rest of the network used for infotainment, he said.

On the other hand, Tata Motors is working on virtual sensors to reduce the complexity of in-vehicle electronics, Umamaheshwaran said. “We are working on eradicating sensors totally and creating virtual sensors where there is no need to keep sensors for everything. We can derive data from the already known data,” he said.

Security challenges in architecture design

A modern car consists of various components from different suppliers which are integrated into one system. Integrating all these components into a secure architecture is almost as impossible as controlling the security of the external network environment.

Pointing out one of the major limitations, Panse said, “A lot of hardware in today’s cars is legacy hardware that may not be able to support some of the modern security requirements like hardware security modules or support for advanced cryptographic algorithms.”


Some of the fundamental design changes inside the car are required to be able to support cryptographic standards, hardware standards, security modules and functionality like a secured booth.

However, Panse doesn’t see fundamental infrastructure changes in the on-board system. “There is a bit of change required from the architecture perspective that needs to happen from the ground up. The security infrastructure modules in terms of algorithms, cryptographic processes, hardware security modules, all that infrastructure need to come inside the car”, he said.

About the vulnerabilities that arise in the external environment (V2X communication), Khushwant Rana, head - cybersecurity solutions -mobility, ETAS Automotive India Private Limited, said, “External environment is more dependent on how security is implemented at the enterprise level. The driver in the vehicle, OEMs and Tier-1s cannot control the external network environment.”

“Anything which goes through a cloud backend makes several transitions from wireless to fibre optic, fibre optic to again wireless. You can’t have a coherent security measure across all of the suppliers of information exchange. That’s where the role of security by design comes into play,” he said.

The best way to deal effectively with it is to come up with preventive measures in case of attacks. For instance, KPIT follows a TRA (Threat Risk Assessment) module where the potential attack surfaces are analysed. Based on that it builds a threat model and against the threat model security model is built, Panse said.

Different standards of security

Safety practices are becoming more regulated as the automotive industry is required to adopt a standardised set of procedures for designing and testing products.

For instance, the connected vehicle platform of Tata Motors is on a public cloud, certified by the ISO 27001 standard, which sets out the specification for an information security management system (ISMS).

Meanwhile, ISO 26262 is a functional safety standard certification, essential for the development of automotive systems-on-chip (SoCs) used in autonomous driving and advanced driver assistance systems (ADAS) applications. All automotive manufacturers worldwide adhere to it.

“There is another standard in the pipeline, ISO 21434,” Bhat said. It focuses on the cybersecurity risk in road vehicle electronic systems.

This standard will cover all stages of a vehicle’s lifecycle — from design to decommissioning by the application of cybersecurity engineering. This will apply to all electronic systems, components, and software in the vehicle, and any external connectivity.



主站蜘蛛池模板: 欧美激情二区三区 | 综合五月天婷婷丁香 | 色天天综合网色鬼综合 | 国产精品爱久久久久久久三级 | 91黄色视屏| h视频在线观看视频观看 | 性xxxx奶大欧美高清 | 日本一道高清不卡免费 | 美女被免费网站视频在线 | xxxx人成高清免费图片 | 2021天天操 | 欧美一级黄色片 | 欧美成人影院 | 美女张开大腿让男人桶 | 天堂在线网 | 国模欢欢大尺度 | 色射啪| 色吧在线视频 | 日韩一区二区视频 | 激情综合五月网 | 欧美色p | 亚洲系列_1页_mmyy11 | 国产综合色在线视频区色吧图片 | 免费看国产一级片 | 韩国朴银狐诱感在线观看 | 91大神大战丝袜美女在线观看 | 欧美成人天天综合在线视色 | 久久国产乱子伦精品免费一 | a一级日本特黄aaa大片 | 国产精品久久久久久久免费 | 女主播扒开内衣让粉丝看个够 | 黄视频网站免费 | 奇米狠狠操| 伊人久久大香线焦在观看 | 国产高清免费 | 四虎成人免费网站在线 | 欧美人与动性视频在线观 | 一级毛片免费在线观看网站 | 中国美女一级黄色片 | 163黄页网又粗又长又舒服 | 综合色99 |