HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY MIKKO HURSKAINEN - - PowerPoint PPT Presentation

how to connect vehicle in safe and secure way
SMART_READER_LITE
LIVE PREVIEW

HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY MIKKO HURSKAINEN - - PowerPoint PPT Presentation

HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY MIKKO HURSKAINEN TECHNOLOGIST 17+ 200+ 70+ 5 YEARS IN AUTOMOTIVE TOP NOTCH LOCATIONS EMBEDDED SOFTWARE PROFESSIONALS AROUND SOFTWARE PROJECTS BUILDING THE GLOBE BUSINESS DELIVERED


slide-1
SLIDE 1

HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY

MIKKO HURSKAINEN TECHNOLOGIST

slide-2
SLIDE 2

17+

YEARS IN EMBEDDED SOFTWARE BUSINESS

200+

AUTOMOTIVE SOFTWARE PROJECTS DELIVERED

70+

TOP NOTCH PROFESSIONALS BUILDING THE PRODUCTS

5

LOCATIONS AROUND THE GLOBE

SHANGHAI OFFICE IN 2017 H2 SHENZHEN OFFICE IN 2017 H2

slide-3
SLIDE 3

CONTENTS

  • Connected vehicles
  • What is security?
  • Security solutions
  • What’s next?
slide-4
SLIDE 4

CONNECTED VEHICLES

slide-5
SLIDE 5

CONNECTED VEHICLES

  • Connected car market is

experiencing rapid growth

  • There’s a need for secure and

safe solutions

Source: Gartner

slide-6
SLIDE 6

CONNECTED VEHICLE DEVELOPMENT MODEL

Connected Vehicle SDK Vehicle Computer and Platform

slide-7
SLIDE 7

CONNECTED VEHICLES

Fleet user

Fleet application

Third party services Vehicle services Vehicle Computer Mobile user

Internet

Mobile appli- cation

slide-8
SLIDE 8

ARCHITECTURE

Applications

Operating System

Platform Vehicle Network

Internet

slide-9
SLIDE 9

APPSTACLE PLATFORM

  • European collaboration project

for open connected car architecture

  • Link Motion is promoting AGL
slide-10
SLIDE 10

APPSTACLE ARCHITECTURE

Permission Control in-vehicle cloud & services app-platform car-to-cloud communication in-vehicle communication Application runtime APPSTACLE API in-vehicle connectivity

APPS OTA manger ECU

communication services ex-vehicle connectivity network IDS application IDS QoS Monitoring boot loader

OTA manager in-vehicle APPSTALCE platform

OTA downloading tool

Authentication/Encryption

Source: APPSTACLE ITEA program

slide-11
SLIDE 11

WHAT IS SECURITY?

slide-12
SLIDE 12

PROTECTION OF ASSETS

Security technologies

SAE J3061 ISO 15288 Severity Exposure Controllability

Assets

Threat Vehicle theft Distraction Loss of control

slide-13
SLIDE 13

ASSETS

  • Assets in connected vehicle

  • Data. If data has been compromised, it can lead

to hijacking of vehicle, lost property or manipulation of operation. Examples of data include remote control keys, maintenance data, routing information –

  • Privacy. Lack of privacy can lead to

uncomfortable situation or expose user to greater security risks. Examples of privacy assets include location information, route history and consumer habits –

  • Control. Loss of control can lead to unwanted

behaviour of vehicle during driving or even hijacking of passengers inside the vehicle. Loss

  • f control also compromises owner’s ability to

use car

  • Tangible and intangible
slide-14
SLIDE 14

THREATS

  • Ransomware
  • Publicized vulnerability
  • Leakage of privacy data
  • Blocking use of system

=> Remotely attack fleet

SECURE & CONNECTED

slide-15
SLIDE 15

SAFETY AND SECURITY

Source: SAE J3061

slide-16
SLIDE 16

SECURITY SOLUTIONS

slide-17
SLIDE 17

SECURITY FEATURES

  • Modularity and layering
  • Hierarchical protection
  • Attack surface

minimization

  • Least privilege principle
  • Predicate permission
  • Defense-in-depth

Secure Container Vehicle Access Controller Connected Application CAN gateway ECU ECU ECU

Internet

slide-18
SLIDE 18

Unprivileged container Microcontroller IVI OS i.MX6Q+ Main Processor Vehicle Access Controller Unprivileged container Secure Container Secure RTOS

Auto OS

SANDBOXING OF THE SYSTEM

slide-19
SLIDE 19

DEFENSE IN DEPTH

  • Minimizes impact of successful

attacks

  • Allows protection according to

needs

  • Innermost layer (TCB) is

compact and most secure

SECURE RTOS AUTO OS IVI OS CAN V2X Instruments Vehicle Control Self-driving Secure apps Services Data visualization Music 3rd party apps Rich controls Traffic information LEVEL 1 LEVEL 2 LEVEL 3

slide-20
SLIDE 20

CAN Bus

i.MX6Q+ Main Processor Vehicle Access Controller Secure Container Secure RTOS

Auto OS

IVI OS

VEHICLE NETWORK DATAFLOWS

Unprivileged container Unprivileged container Microcontroller Configurable access

Vehicle Network Gateway / Firewall

Abstract Interface Very limited access Wide access Read access Internet

slide-21
SLIDE 21

Vehicle Network

i.MX6Q+ Main Processor Vehicle Access Controller Secure Container Secure RTOS

Auto OS

Vehicle Network Controller Vehicle Network Controller

IVI OS

VEHICLE NETWORK CONTROLLED ACCESS

Unprivileged container Unprivileged container Microcontroller

slide-22
SLIDE 22

SECURITY MINDED DESIGN PATTERN

  • Follows automotive

design patterns

  • Separation of control,

critical control and rich control

  • Example: Diagnostics

vECU

Auto OS IVI OS Secure Container Vehicle Network API

Telematics: Diagnostics engine IVI: Rich UI controls. FOTA control. Instrument Cluster: Notification

Vehicle Network

CAN Bus

Cloud services

slide-23
SLIDE 23

HARDWARE SECURITY TECHNOLOGIES

High Assurance Boot and Chain of Trust Secure Key Storage ARM TrustZone

Unprivileged container

IVI OS i.MX6Q+ Main Processor

Unprivileged container

Secure Container Secure RTOS

Auto OS ARM TrustZone

i.MX6Q+ Main Processor ARM Cortex-A9 Quad CAAM RAM

slide-24
SLIDE 24

MORE SECURITY SOLUTIONS

  • Vehicle network protection
  • Cryptography
  • Intrusion detection system
  • Open source development model
  • External partners
  • Research
  • Training
slide-25
SLIDE 25

WHAT’S NEXT

slide-26
SLIDE 26

SECURITY FORMALIZATION

  • Broader analysis
  • NIST SP-800, SAE J3061, ISO 15288
  • Privacy standards
  • Integration to processes
  • Secure System State
  • Security Taxonomy
  • Mathematical proofs
slide-27
SLIDE 27

SECURITY TAXONOMY

Source: NIST SP 800-160

slide-28
SLIDE 28

SECURE SYSTEM STATE

  • Design with safe state

(ISO 26262)

  • Example implementation:

– Reference monitor (IDS) – Re-flash from ROM

Source: NIST SP 800-160

slide-29
SLIDE 29

INTEGRATION TO PROCESSES

  • ISO 15288 good framework
  • Code first vs specification
  • Not just engineering
  • Aims to enable ‘organizational

learning’ -> same breach does not happen twice

  • Work split between OEM/T1 and

AGL ?

slide-30
SLIDE 30

MORE SECURITY SOLUTIONS

  • More cost-efficient solutions

enable better security

– AGL, APPSTACLE, ASSET

  • Improve overall level of

security

  • Implement HW solutions

with SW

  • Developer training
slide-31
SLIDE 31

SOFTWARE DEFINED CAR

SOFTWARE CENTRIC ARCHITECTURE CONVENTIONAL ARCHITECTURE

slide-32
SLIDE 32

SOFTWARE DEFINED CAR

SOFTWARE CENTRIC ARCHITECTURE CONVENTIONAL ARCHITECTURE

slide-33
SLIDE 33

SUMMARY

  • Connected vehicles are happening

now

  • Need uncompromised solutions

– Same as safety

  • There are plenty of solutions

– But none solves it alone

  • More holistic approach is future
slide-34
SLIDE 34

LINK-MOTION.COM

info@link-motion.com mikko.hurskainen@link-motion.com kanae.kubota@link-motion.com