Page 25 - EE Times Europe Magazine – June 2024
P. 25

EE|Times EUROPE   25




        OPINION | AUTONOMOUS VEHICLES | SECURITY

        Are We Prepared for                                                       Imagine a scenario in which a hostile state


        Cyberthreats in the New                                                 or a rogue hacker group gains access to the
                                                                                control systems of connected vehicles. The
                                                                                consequences could be catastrophic: wide-
        Era of Transportation?                                                  spread accidents, traffic gridlock and even
                                                                                deliberate targeting of individuals or critical
                                                                                infrastructure.
        By Hassan Triqui, Secure-IC                                             THE CHALLENGES OF CONNECTED-
                                                                                VEHICLE CYBERSECURITY
                                                                                Ensuring vehicle cybersecurity is a multifac-
                            The automotive user experience has evolved dramatically, and   eted challenge that encompasses aspects of
                            the trend is accelerating, driven by advances in vehicle connectiv-  software development, cryptography, oper-
                            ity and autonomy. Connectivity makes it possible for the car to be   ating systems and life-cycle management.
                            safer and more aware, thanks to vehicle-to-everything technologies.   One significant hurdle lies in implementing
                            Autonomy enables the car to behave more intelligently, thanks to   safe and secure coding practices tailored
                            advanced driver-assistance systems (ADAS).          for automotive environments. Adherence to
                              The downside of these technology enhancements is the increased   stringent standards helps to ensure that the
                            exposure to attacks. Connectivity can be leveraged as an attack   software running in connected vehicles is
                            vector, and autonomy can drastically augment an attack’s impact.   robust and resilient against potential attacks
        In practice, the scary scenario is that of a remote attacker infecting a car through its wireless   and exploits.
        interface and taking control of the vehicle by abusing its ADAS capabilities.  Integrating artificial intelligence into
          Trust in hardware and software is key in the realm of connected vehicles. Security-by-design   automotive systems complicates cybersecu-
        principles must be ingrained into the very foundation of electronic control units (ECUs). Safety   rity efforts. AI-driven functionalities, such
        and security considerations are pivotal, with tailored security levels adapted to each ECU. This   as autonomous driving and ADAS capa-
        approach ensures that every component of the vehicle’s hardware contributes to its overall secu-  bilities, introduce new attack vectors and
        rity posture, laying a solid foundation for trustworthy automotive systems.  complexities in securing connected vehicles.
                                                                                Essential protections, including secure boot
                                                                                mechanisms, communication protocols,
                                                                                fault and intrusion-detection mechanisms
                                                                                and memory protection, are paramount
                                                                                to safeguarding AI-driven functions from
                                                                                exploitation by malicious actors.
                                                                                  The adoption of post-quantum cryptogra-
                                                                                phy will likewise be crucial for safeguarding
                                                                                communications and data exchange within
                                                                                vehicles in the near future. With the advent
                                                                                of quantum computing, some of the tradi-
                                                                                tional cryptographic algorithms will become
                                                                                vulnerable to brute-force attacks, necessi-
                                                                                tating the deployment of quantum-resistant
                                                                                cryptographic algorithms to maintain
                                                                                vehicle security.
                                                                                  Secure operating systems are required
                                                                                that enable secure applications to run in an
                                                                                isolated manner within software-defined
                                                                                vehicles. By compartmentalizing critical
                                                                                functions and services, these operating
                                                                                systems mitigate the risk of unauthorized
                                                                                access and tampering. Managing the security
                                                                                life cycle of connected vehicles is also fun-
                                                                                damental to ensure that security measures
                                                                                are maintained from IC manufacturing to
                                                                                decommissioning.
                                                                                  The commitment to cybersecurity doesn’t
                                                                                end with the development and deployment
       IMAGE: SECURE-IC                                                         of vehicles; it extends throughout their life
                                                                                cycle. ISO/SAE 21434 and the European Cyber
                                                                                Resilience Act underscore the importance of
                                                                                life-cycle cybersecurity management. Such
                                                                                approaches to cybersecurity ensure that


                                                                                         www.eetimes.eu | JUNE 2024
   20   21   22   23   24   25   26   27   28   29   30