-
-
-
-
URL copied!
According to Deloitte, there will be 470 million connected vehicles on highways worldwide by 2025. These connected vehicles provide opportunities and have a higher cybersecurity risk than any other connected devices; even the FBI had to make a statement about it.
A typical new model car runs over 100 million lines of code and has up to 100 electrical control units (ECUs) and millions of endpoints. The stakes are high, too, considering the safety implications some of these security issues may cause. Supporting satellite, Bluetooth, telematics and other types of connectivity while protecting drivers and public safety is essential, and completely reliant on vehicle design and manufacturing.
Vehicle Cybersecurity Regulations for Manufacturers to Know
Considering this, the UNECE released new vehicle cybersecurity regulations in the middle of 2021 (UN R155 and UN R156), and ISO came up with ISO/SAE 21434. These standards laid the foundation of cybersecurity in connected vehicles. While they are complex, these security considerations can be classified in three main categories:
- In-vehicle cybersecurity: Cybersecurity aspects within the vehicle, such as OBD-II hacking, key fob hacking, theft of personal data, remote takeover, malware, etc.
- Network cybersecurity: Cybersecurity aspects of vehicle network connectivity. This covers most general network threats such as DoS, Syn-flood, etc.
- Backend cybersecurity: Cybersecurity aspects of backend systems, which are typically the same as any cloud security aspects. Connected vehicles exchange information and data with the backend systems generally hosted on the cloud. These backend systems perform various tasks such as vehicle software updates, navigation, alerts, etc.
Recommended reading: How Smart Cars Will Change Cityscapes
Examples of Cybersecurity for Automotives Across Threat Categories
Each threat category requires different solutions and skills of the vehicle manufacturer. For example, these are some of the solutions required for each of the above categories.
In-vehicle cybersecurity
- Hardware-based crypto-accelerators and secure key storage
- JTAG memory and register access restriction
- Firmware signing
- Electronic Control Unit (ECU) authentication
- Anti-tampering and side channel attack protections
- SSH or secured access
- Secure key storage
Network cybersecurity
- Encrypted and secure communication
- IDS/IPS to track potential packet floods
- Network segmentation
- Virtual private network (VPN)
- Firewall
Backend cybersecurity
- Data loss prevention and data integrity strategy
- OTA package encryption and signature
- Secure images
- Activity and log monitoring
Our team works with leading connected vehicle manufacturers and OEMs to build secure connected vehicles across all three categories. We help our clients with the cross-industry best practices required to develop solutions such as in-vehicle infotainment systems, ECUs, and advanced driver assistance systems without compromise on security or reliability.
Learn more:
Top Insights
If You Build Products, You Should Be Using...
Digital TransformationTesting and QAManufacturing and IndustrialPredictive Hiring (Or How to Make an Offer...
Project ManagementBlog Categories
Let’s Work Together
Related Content
Generations and GenAI
This is probably a well-known fact in sociology or some other such discipline, but it struck me the other day that only the generation that knows how to do something can be the one to make that thing obsolete. Take driving a car, for example. My generation and the ones preceding me in the U.S. … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
We’re getting the chance to live in the future
Early 20th Century motivational speaker and author Dale Carnegie once wrote “Today is the tomorrow you worried about yesterday.” I believe that Mr. Carnegie’s point was that unless today is the literally the worst day of your life (and my sincere sympathies if it is), then the energy you spent worrying about it yesterday was largely wasted. I haven’t read much … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
Intelligence is Intelligence, even if it’s Artificial
I had a stimulating conversation with the head of our GenAI practice, Suhail Khaki, a few weeks ago. Suhail made the remark that the more he works with GenAI, the more it strikes him that it’s less like conventional computer software, and more like a person in the way it interacts. He made the remark: … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
Retail as a Conspiracy
I was one of the early buyers of the first release of Apple Vision Pro AR headset early this year. I got up at 5am my time to place an order on-line at the first moment when the device became available for pre-order. I then made an appointment at my local brick-and-mortar Apple Store to … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
The “hype cycle” is about the hype—not the technology
The hype cycle has little to do with the merits of a particular technology. It simply has to do with the amount of publicity the technology has received. In particular, if the publicity jumps ahead of what the technology can immediately deliver, then the technology quickly gets labeled as “over hyped”. This is not the … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
5 Trends & Takeaways from Google Cloud Next
Executives, decision-makers, technical experts, and Google Cloud partners converged at Google Cloud Next to explore cutting-edge innovations and industry trends. GlobalLogic was there, speaking about modernization strategy and delivering a Cube talk on Intelligently Engineering the Next Gen AI Platform we are building for Hitachi. Among the buzz at GCN 2024, using GenAI for customer … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
Give yourself a promotion using GenAI
I think we’d all agree that getting promoted is desirable. Higher wages, better job title, greater impact, and perhaps more prestige. But it’s not without its problems. Like many engineers, I started out writing code. I was good at it, and customer demand increased for my services. I then started hiring other engineers and promoted … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
Share this page:
-
-
-
-
URL copied!