-
-
-
-
URL copied!
According to Deloitte, there will be 470 million connected vehicles on highways worldwide by 2025. These connected vehicles provide opportunities and have a higher cybersecurity risk than any other connected devices; even the FBI had to make a statement about it.
A typical new model car runs over 100 million lines of code and has up to 100 electrical control units (ECUs) and millions of endpoints. The stakes are high, too, considering the safety implications some of these security issues may cause. Supporting satellite, Bluetooth, telematics and other types of connectivity while protecting drivers and public safety is essential, and completely reliant on vehicle design and manufacturing.
Vehicle Cybersecurity Regulations for Manufacturers to Know
Considering this, the UNECE released new vehicle cybersecurity regulations in the middle of 2021 (UN R155 and UN R156), and ISO came up with ISO/SAE 21434. These standards laid the foundation of cybersecurity in connected vehicles. While they are complex, these security considerations can be classified in three main categories:
- In-vehicle cybersecurity: Cybersecurity aspects within the vehicle, such as OBD-II hacking, key fob hacking, theft of personal data, remote takeover, malware, etc.
- Network cybersecurity: Cybersecurity aspects of vehicle network connectivity. This covers most general network threats such as DoS, Syn-flood, etc.
- Backend cybersecurity: Cybersecurity aspects of backend systems, which are typically the same as any cloud security aspects. Connected vehicles exchange information and data with the backend systems generally hosted on the cloud. These backend systems perform various tasks such as vehicle software updates, navigation, alerts, etc.
Recommended reading: How Smart Cars Will Change Cityscapes
Examples of Cybersecurity for Automotives Across Threat Categories
Each threat category requires different solutions and skills of the vehicle manufacturer. For example, these are some of the solutions required for each of the above categories.
In-vehicle cybersecurity
- Hardware-based crypto-accelerators and secure key storage
- JTAG memory and register access restriction
- Firmware signing
- Electronic Control Unit (ECU) authentication
- Anti-tampering and side channel attack protections
- SSH or secured access
- Secure key storage
Network cybersecurity
- Encrypted and secure communication
- IDS/IPS to track potential packet floods
- Network segmentation
- Virtual private network (VPN)
- Firewall
Backend cybersecurity
- Data loss prevention and data integrity strategy
- OTA package encryption and signature
- Secure images
- Activity and log monitoring
Our team works with leading connected vehicle manufacturers and OEMs to build secure connected vehicles across all three categories. We help our clients with the cross-industry best practices required to develop solutions such as in-vehicle infotainment systems, ECUs, and advanced driver assistance systems without compromise on security or reliability.
Learn more:
Top Insights
Best practices for selecting a software engineering partner
SecurityDigital TransformationDevOpsCloudMediaMy Intro to the Amazing Partnership Between the...
Experience DesignPerspectiveCommunicationsMediaTechnologyAdaptive and Intuitive Design: Disrupting Sports Broadcasting
Experience DesignSecurityMobilityDigital TransformationCloudBig Data & AnalyticsMediaLet’s Work Together
Related Content
Accelerating Digital Transformation with Structured AI Outputs
Enterprises increasingly rely on large language models (LLMs) to derive insights, automate processes, and improve decision-making. However, there are two significant challenges to the use of LLMs: transforming structured and semi-structured data into suitable formats for LLM prompts and converting LLM outputs back into forms that integrate with enterprise systems. OpenAI's recent introduction of structured … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
If You Build Products, You Should Be Using Digital Twins
Digital twin technology is one of the fastest growing concepts of Industry 4.0. In the simplest terms, a digital twin is a virtual replica of a real-world object that is run in a simulation environment to test its performance and efficacy
Learn More
Accelerating Enterprise Value with AI
As many organizations are continuing to navigate the chasm between AI/GenAI pilots and enterprise deployment, Hitachi is already making significant strides. In this article, GlobaLogic discusses the importance of grounding any AI/GenAI initiative in three core principles: 1) thoughtful consideration of enterprise objectives and desired outcomes; 2) the selection and/or development of AI systems that are purpose-built for an organization’s industry, its existing technology, and its data; and 3) an intrinsic commitment to responsible AI. The article will explain how Hitachi is addressing those principles with the Hitachi GenAI Platform-of-Platforms. GlobalLogic has architected this enterprise-grade solution to enable responsible, reliable, and reusable AI that unlocks a high level of operational and technical agility. It's a modular solution that GlobalLogic can use to rapidly build solutions for enterprises across industries as they use AI/GenAI to pursue new revenue streams, greater operational efficiency, and higher workforce productivity.
Learn More
Unlock the Power of the Intelligent Healthcare Ecosystem
Welcome to the future of healthcare The healthcare industry is on the cusp of a revolutionary transformation. As we move beyond digital connectivity and data integration, the next decade will be defined by the emergence of the Intelligent Healthcare Ecosystem. This is more than a technological shift—it's a fundamental change in how we deliver, experience, … Continue reading Connected Vehicle Cybersecurity Considerations That Vehicle Manufacturers Need to Know →
Learn More
Share this page:
-
-
-
-
URL copied!