2. CONTENTS
Introduction to E2E protection
E2E Library
Steps to use E2E Library
Monitoring algorithm
Conclusion
References
GETELECTRICVEHICLE.COM 2
3. INTRODUCTION
The concept of E2E protection assumes that safety related data exchange shall be protected
at runtime against the effects of faults within the communication link
Applicable for CAN, CANFD, FlexRay, Ethernet etc.
The E2E protection allows the following
It protects the safety-related data elements to be sent over the RTE by attaching control data
It verifies the safety-related data elements received from the RTE using this control data
It indicates that received safety-related data elements faulty, which then has to be handled by the receiver
SW-C
Aims to detect and mitigate systematic, random and transient faults
ISO 26262 – “Road vehicles – Functional safety” introduced in 2011 and it made E2E
securing important in Automotive industry
GETELECTRICVEHICLE.COM 3
4. E2E LIBRARY
E2E library provides mechanisms for
protection of safety related
communication – up to Automotive
Safety Integrity Level D
Various profiles are available in E2E
library for flexibility and
standardization
Profile 1, Profile 2 etc.
P1 and P2 are configurable together
with E2E state machine
Users of E2E library are responsible for
correct usage such as providing valid
parameters
E2E library is allowed to call only a few
external functions
Crc_CaculateCRC8, Crc_CalculateCRC16,
Crc_CalculateCRC32P4,
Crc_CalculateCRCH2F,
Crc_CalculateCRC64
E2E library helps to detect errors but
does not handle errors
AUTOSAR E2E library is where the algorithms for E2E protection are implemented
GETELECTRICVEHICLE.COM 4
5. STEPS TO USE E2E LIBRARY
Select
architectural
approach to use
E2E library
Select data
elements to be
protected and
with which E2E
profile
Determine
settings for each
data element or
signal group to
be protected
Develops
necessary code
for invocation of
E2E library
functions
Users of E2E library do the following
GETELECTRICVEHICLE.COM 5
6. MONITORING ALGORITHM
Implementation of monitoring
algorithm requires history of data
up to a determined boundary
value N
Receiver creates a history of data
and updates a FIFO
Fig. 1: Example for a monitoring function to
determine integrity of communication within
a receiver
GETELECTRICVEHICLE.COM 6
7. HOW TO INVOKE E2E LIBRARY
Four methods are generally implemented to invoke E2E functionalities
1. Protection wrapper
• Non Standard integrator software to protect data above RTE
2. COM callout functions
3. Hybrid
4. Out of box protection at RTE level
GETELECTRICVEHICLE.COM 7
8. CONCLUSION
Security of data in communication is important
E2E security is relevant in automotive industry to comply with ASIL D standard
Briefly explained about E2E communication protection
Explained methods to use E2E library
GETELECTRICVEHICLE.COM 8