HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY
MIKKO HURSKAINEN TECHNOLOGIST
HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY MIKKO HURSKAINEN - - PowerPoint PPT Presentation
HOW TO CONNECT VEHICLE IN SAFE AND SECURE WAY MIKKO HURSKAINEN TECHNOLOGIST 17+ 200+ 70+ 5 YEARS IN AUTOMOTIVE TOP NOTCH LOCATIONS EMBEDDED SOFTWARE PROFESSIONALS AROUND SOFTWARE PROJECTS BUILDING THE GLOBE BUSINESS DELIVERED
MIKKO HURSKAINEN TECHNOLOGIST
YEARS IN EMBEDDED SOFTWARE BUSINESS
AUTOMOTIVE SOFTWARE PROJECTS DELIVERED
TOP NOTCH PROFESSIONALS BUILDING THE PRODUCTS
LOCATIONS AROUND THE GLOBE
SHANGHAI OFFICE IN 2017 H2 SHENZHEN OFFICE IN 2017 H2
experiencing rapid growth
safe solutions
Source: Gartner
Connected Vehicle SDK Vehicle Computer and Platform
Fleet user
Fleet application
Third party services Vehicle services Vehicle Computer Mobile user
Internet
Mobile appli- cation
Applications
Operating System
Platform Vehicle Network
Internet
for open connected car architecture
Permission Control in-vehicle cloud & services app-platform car-to-cloud communication in-vehicle communication Application runtime APPSTACLE API in-vehicle connectivity
APPS OTA manger ECU
communication services ex-vehicle connectivity network IDS application IDS QoS Monitoring boot loader
OTA manager in-vehicle APPSTALCE platform
OTA downloading tool
Authentication/Encryption
Source: APPSTACLE ITEA program
Security technologies
SAE J3061 ISO 15288 Severity Exposure Controllability
Assets
Threat Vehicle theft Distraction Loss of control
–
to hijacking of vehicle, lost property or manipulation of operation. Examples of data include remote control keys, maintenance data, routing information –
uncomfortable situation or expose user to greater security risks. Examples of privacy assets include location information, route history and consumer habits –
behaviour of vehicle during driving or even hijacking of passengers inside the vehicle. Loss
use car
SECURE & CONNECTED
Source: SAE J3061
minimization
Secure Container Vehicle Access Controller Connected Application CAN gateway ECU ECU ECU
Internet
Unprivileged container Microcontroller IVI OS i.MX6Q+ Main Processor Vehicle Access Controller Unprivileged container Secure Container Secure RTOS
Auto OS
SANDBOXING OF THE SYSTEM
attacks
needs
compact and most secure
SECURE RTOS AUTO OS IVI OS CAN V2X Instruments Vehicle Control Self-driving Secure apps Services Data visualization Music 3rd party apps Rich controls Traffic information LEVEL 1 LEVEL 2 LEVEL 3
CAN Bus
i.MX6Q+ Main Processor Vehicle Access Controller Secure Container Secure RTOS
Auto OS
IVI OS
VEHICLE NETWORK DATAFLOWS
Unprivileged container Unprivileged container Microcontroller Configurable access
Vehicle Network Gateway / Firewall
Abstract Interface Very limited access Wide access Read access Internet
Vehicle Network
i.MX6Q+ Main Processor Vehicle Access Controller Secure Container Secure RTOS
Auto OS
Vehicle Network Controller Vehicle Network Controller
IVI OS
VEHICLE NETWORK CONTROLLED ACCESS
Unprivileged container Unprivileged container Microcontroller
design patterns
critical control and rich control
vECU
Auto OS IVI OS Secure Container Vehicle Network API
Telematics: Diagnostics engine IVI: Rich UI controls. FOTA control. Instrument Cluster: Notification
Vehicle Network
CAN Bus
Cloud services
High Assurance Boot and Chain of Trust Secure Key Storage ARM TrustZone
Unprivileged container
IVI OS i.MX6Q+ Main Processor
Unprivileged container
Secure Container Secure RTOS
Auto OS ARM TrustZone
i.MX6Q+ Main Processor ARM Cortex-A9 Quad CAAM RAM
SECURITY TAXONOMY
Source: NIST SP 800-160
– Reference monitor (IDS) – Re-flash from ROM
Source: NIST SP 800-160
INTEGRATION TO PROCESSES
learning’ -> same breach does not happen twice
AGL ?
– AGL, APPSTACLE, ASSET
SOFTWARE DEFINED CAR
SOFTWARE CENTRIC ARCHITECTURE CONVENTIONAL ARCHITECTURE
SOFTWARE CENTRIC ARCHITECTURE CONVENTIONAL ARCHITECTURE
now
– Same as safety
– But none solves it alone
LINK-MOTION.COM
info@link-motion.com mikko.hurskainen@link-motion.com kanae.kubota@link-motion.com