SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 1/11
MARKETS > AUTOMOTIVE
Prevent Automotive Counterfeiting with Secure Authentication
With automotive designs including more electronics than ever, there’s greater risk for hacking due
to the multitude of parts—particularly if non-genuine parts are used. Here’s a way to overcome
those vulnerabilities.
Audrey Barber
JAN 22, 2020
SEARCH
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 2/11
As the electronic systems in today’s cars become more sophisticated, it rapidly ramps up the number of
sensors feeding mission-critical data into the electronic control unit (ECU). For drivers, it’s imperative to feel
confident that the advanced driver-assistance system (ADAS) hasn’t been compromised by something as
seemingly benign as an auto-repair shop using non-authentic parts to repair the vehicle. Likewise, an OEM
would want to mitigate liability in these situations and notify consumers if the system, and thus driver safety,
has been compromised.
How can you prevent counterfeiting in your automotive designs?
After discussing the threats faced by today’s electronically sophisticated automotive systems, this article
explains how secure authentication can counter these risks.
Growing Problem of Non-Genuine Automotive Parts
The automotive industry is currently undergoing the biggest change in its history since Henry Ford developed
the assembly line. With more companies moving toward electric vehicles, rapidly developing vehicle
autonomy, and longer lists of in-cabin entertainment features coming to market, the breadth of automotive
innovation is quite astounding. The increase in electronic components, however, means that there are more
points of vulnerability inside vehicles than ever before.
As automotive OEMs progress toward fully autonomous vehicles, fears grow that self-driving cars will be easily
hacked. Case-in-point: the well-publicized white-hat hackers’ effort to remotely kill a Jeep during a highway
drive a few years ago. Indeed, the problem of fake parts has been a mounting area of concern in the
automotive industry, as evidenced by the problems they can trigger. For example:
Counterfeit airbags may not deploy properly after a collision.
Fake engine and drivetrain components can cause engine failure or even fires.
Non-genuine body parts may not perform as expected in a collision.
Improperly made brake pads may compromise the vehicle’s stopping capabilities.
Fake windscreens can shatter or displace.
1
2
SEARCH
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 3/11
As ADAS continues to proliferate, every camera’s or sensor’s role in keeping the driver safe grows
exponentially. It’s imperative that these components are genuine and not replaced by low-grade counterfeits
that might not have the same range of field, proper resolution, or calibration that’s expected by the system.
Techniques to Secure Automotive Designs
It’s no surprise that when a lot of people think “security,” their minds automatically associate this with
“software.” It’s undeniable that as cars continue to get smarter and rely more heavily on data from over-the-air
(OTA) updates, secure software is a key component to protecting the automotive ecosystem, as well as
ensuring that the data being sent to and from the car is private and its integrity is intact. OTA updates are
outside the scope of this paper, but they aren’t outside the scope of the security discussion at a higher level.
However, when it comes to protecting peripheral systems in cars, hardware security remains key—pun
intended. This brings us to the first point of why hardware security is a necessity: key management. Ordinary
flash memory doesn’t guarantee protection from invasive probing attacks. This means that a hacker can
modify the flash content or even inject other authority keys into the flash memory.
Why is this key such a big deal? This “key” is the device’s identity. If hackers can extract and clone this key,
that means they can make as many clones as they want and that all of these clones would be read as a valid
part of the system. Going a step further, having knowledge of the private key would allow a clone to sign data
and send this data to the ECU and convince the system that this data is valid! Security, and thus clone
prevention and the system’s integrity, relies entirely on the fact that the private key is unclonable and
immutable.
SEARCH
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 4/11
What About HSMs?
So, if software security isn’t enough to stop attacks on automotive systems, what else can be done to prevent a
breach of security? Many systems are moving toward the implementation of hardware security modules
(HSMs) to secure various components within a system. Although HSMs are a great way to implement
hardware security within a system, they can be costly and are often larger in size and greater in complexity
than a standalone authenticator.
As a result, HSMs are often a great choice for adding security in the larger, more centralized systems within
the car, such as one of the many ECUs. HSMs are especially necessary in cases where large quantities of data
may need to be encrypted or validated, like when that data is being pushed up to the cloud for, say, OTA
updates.
With more OEMs opting for OTA updates, the threat of malware infecting a vehicle’s ecosystem is more of a
concern than ever before. It’s pertinent to driver safety that every update is validated and authenticated. In a
similar vein, with sensitive vehicle information, such as driver location, being sent to the cloud, it’s important
that any communication between the vehicle and the cloud is protected.
However, to secure smaller peripherals within a car, such as a camera or sensor, size and cost are top
considerations and an HSM isn’t the best option. So how does one implement hardware security, while
keeping cost and size down?
An Easier, More Effective Defense Against Counterfeiting
1. This diagram demonstrates use of a secure authenticator in a peripheral component (such as a sensor or camera) to
communicate with the vehicle’s ECU within the car. Its function is to prove that this component is a valid part of the OEM’s
system before mission-critical data is sent to the ECU. This prevents clones and unauthorized counterfeits from operating
within the automotive system.
One proven method for preventing automotive counterfeiting is secure authentication (Fig. 1), which can
support use cases such as:
SEARCH
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 5/11
Safety and reliability to ensure that only OEM-approved components are connected to critical systems in
the vehicle.
Data integrity to confirm connectivity of genuine modules and sensors that only produce valid data.
Secure boot for validating firmware installs to detect load errors and thwart the risk of malware attacks.
Feature control for secure management of system features as subscription- or factory-based options.
From ADAS equipment to airbags to electric-vehicle (EV) batteries, the systems in a vehicle that could benefit
from secure authentication are wide-reaching. With a secure-authentication IC, you can authenticate module
and sensor combinations either remotely or locally.
Some OEMs are even going a step further and adding a deterrent to car part theft by implementing two-way
authentication on high-value components that are more likely to be stolen. Two-way authentication means
that if a component is stolen from a vehicle and placed in another car or system, the authenticator within the
peripheral can block the part’s operation in this invalid system. A secure authenticator can help here by
ensuring that vehicle components can’t be repurposed.
Another example where authentication is becoming more relevant is in lithium-ion battery systems. These
highly efficient batteries are the primary choice of power supply for EV manufacturers. However, they have
inherent safety implications and are costly. For these two reasons, a lot of EV manufacturers are concerned
with ensuring that any battery replacement would block a counterfeit and potentially harmful battery from
operating in the vehicle.
Protecting Automotive System Integrity
An example of a secure authenticator specifically designed to tackle the growing threat of automotive
counterfeit components from infiltrating your automotive ecosystem is the DS28C40. It’s a small chip that can
be embedded inside any automotive peripheral, such as a camera, sensor, EV battery, front-light module, etc.
(Fig. 2).
SEARCH
1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design
https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 6/11
2. Since the camera on this car’s left-side mirror plays a critical role in detecting blind spots, it’s important to protect the
camera from being compromised. Secure authentication can help here. (Courtesy of Bell Ka Pang/Shutterstock).
The authenticator’s role within the peripheral is to prove to the ECU that the component is a genuine, OEM-
approved part of the system. This is accomplished via elliptic-curve digital signal algorithm (ECDSA)
cryptography, an asymmetric algorithm that relies on a certificate and a public-private key pair to validate
itself to the host ECU module.
The advantage of asymmetric cryptography is that key management is easy to implement. The private key,
which is unique to each authenticator, is securely stored in the DS28C40 and can’t be accessed externally. On
the host ECU side, the public key is read from the authenticator, but like the “public” description suggests, it
doesn’t need to be protected against discovery. The authenticator can be integrated into any automotive
component at risk of being cloned, replaced, or stolen. For those who are new to security, knowing that there’s
no need to worry about securing a key on the host side usually results in an audible sigh of relief.
Summary
As the automotive industry continues to incorporate more electronic components to deliver sophisticated new
features with each generation of vehicle, one truth remains clear: Protecting human life remains paramount.
What better way to do so than by making sure that the components responsible for making life-saving
decisions haven’t been compromised?
Audrey Barber is Associate Business Manager, Micros, Security & Software Business Unit, at Maxim
Integrated.
References
1. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
2. https://www.worldtrademarkreview.com/anti-counterfeiting/counterfeit-automotive-parts-increasingly-
putting-consumer-safety-risk
RELATED
SPONSORED CONTENT
Industrial Automation
Secure Authentication for Single-Use Medical Consumables
DEC 10, 2019
SEARCH

Contenu connexe

Tendances

Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTSmart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTAssociate Professor in VSB Coimbatore
 
The dangers of automation in the aviation domain
The dangers of automation in the aviation domainThe dangers of automation in the aviation domain
The dangers of automation in the aviation domainNatalia Welton-Torres
 
[Infographic] ELD Mandate: Things You Must Know
[Infographic] ELD Mandate: Things You Must Know[Infographic] ELD Mandate: Things You Must Know
[Infographic] ELD Mandate: Things You Must KnowScalefusion
 
IRJET- A Survey on Application of Automobile Safety Features
IRJET-  	  A Survey on Application of Automobile Safety FeaturesIRJET-  	  A Survey on Application of Automobile Safety Features
IRJET- A Survey on Application of Automobile Safety FeaturesIRJET Journal
 
latest Engineering Innovation
 latest Engineering Innovation latest Engineering Innovation
latest Engineering Innovationram sundar singh
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...IOSR Journals
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...eSAT Publishing House
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...eSAT Journals
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchMehul Doshi
 
IRJET- No Text Driving: Android Deployment of Driver Behaviour Analysis
IRJET-  	  No Text Driving: Android Deployment of Driver Behaviour AnalysisIRJET-  	  No Text Driving: Android Deployment of Driver Behaviour Analysis
IRJET- No Text Driving: Android Deployment of Driver Behaviour AnalysisIRJET Journal
 
Partner Slide Deck 11212016
Partner Slide Deck 11212016Partner Slide Deck 11212016
Partner Slide Deck 11212016Brent Massey
 
Safety of automobile Report
Safety of automobile ReportSafety of automobile Report
Safety of automobile ReportJIET, Jodhpur
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET Journal
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesIJERA Editor
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...cscpconf
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471IJRAT
 

Tendances (18)

Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTSmart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
 
M1102018085
M1102018085M1102018085
M1102018085
 
The dangers of automation in the aviation domain
The dangers of automation in the aviation domainThe dangers of automation in the aviation domain
The dangers of automation in the aviation domain
 
[Infographic] ELD Mandate: Things You Must Know
[Infographic] ELD Mandate: Things You Must Know[Infographic] ELD Mandate: Things You Must Know
[Infographic] ELD Mandate: Things You Must Know
 
IRJET- A Survey on Application of Automobile Safety Features
IRJET-  	  A Survey on Application of Automobile Safety FeaturesIRJET-  	  A Survey on Application of Automobile Safety Features
IRJET- A Survey on Application of Automobile Safety Features
 
latest Engineering Innovation
 latest Engineering Innovation latest Engineering Innovation
latest Engineering Innovation
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...
 
Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...Advanced control systems in two wheeler and finding the collision site of the...
Advanced control systems in two wheeler and finding the collision site of the...
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
IRJET- No Text Driving: Android Deployment of Driver Behaviour Analysis
IRJET-  	  No Text Driving: Android Deployment of Driver Behaviour AnalysisIRJET-  	  No Text Driving: Android Deployment of Driver Behaviour Analysis
IRJET- No Text Driving: Android Deployment of Driver Behaviour Analysis
 
Partner Slide Deck 11212016
Partner Slide Deck 11212016Partner Slide Deck 11212016
Partner Slide Deck 11212016
 
Safety of automobile Report
Safety of automobile ReportSafety of automobile Report
Safety of automobile Report
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
 
Fighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphonesFighting Accident Using Eye Detection forSmartphones
Fighting Accident Using Eye Detection forSmartphones
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471
 

Similaire à Prevent Automotive Counterfeiting with Secure Authentication

Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
Dumb and dumber or fast and furious
Dumb and dumber or fast and furiousDumb and dumber or fast and furious
Dumb and dumber or fast and furiousReputelligence
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersNick Rossmann
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Security Innovation
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected CarAngel Villar Garea
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
How much "tech" is too much tech?
How much "tech" is too much tech?How much "tech" is too much tech?
How much "tech" is too much tech?Achal Raghavan
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 

Similaire à Prevent Automotive Counterfeiting with Secure Authentication (20)

Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Dumb and dumber or fast and furious
Dumb and dumber or fast and furiousDumb and dumber or fast and furious
Dumb and dumber or fast and furious
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from Patents
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
Vehicle technology software updates
Vehicle technology software updatesVehicle technology software updates
Vehicle technology software updates
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
How much "tech" is too much tech?
How much "tech" is too much tech?How much "tech" is too much tech?
How much "tech" is too much tech?
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Revolution in Mobility
Revolution in MobilityRevolution in Mobility
Revolution in Mobility
 

Plus de Abacus Technologies

Cloud Technology Is the Underdog Of The Tech World
Cloud Technology Is the Underdog Of The Tech WorldCloud Technology Is the Underdog Of The Tech World
Cloud Technology Is the Underdog Of The Tech WorldAbacus Technologies
 
Small Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
Small Business Owners: Eight Impactful Reasons To Leverage Cloud TechnologySmall Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
Small Business Owners: Eight Impactful Reasons To Leverage Cloud TechnologyAbacus Technologies
 
How to Improve Your Cloud and Container Security
How to Improve Your Cloud and Container SecurityHow to Improve Your Cloud and Container Security
How to Improve Your Cloud and Container SecurityAbacus Technologies
 
Controlling cloud infrastructure costs: Tips & tricks
Controlling cloud infrastructure costs: Tips & tricksControlling cloud infrastructure costs: Tips & tricks
Controlling cloud infrastructure costs: Tips & tricksAbacus Technologies
 
Does AI-driven cloud computing need ethics guidelines?
Does AI-driven cloud computing need ethics guidelines?Does AI-driven cloud computing need ethics guidelines?
Does AI-driven cloud computing need ethics guidelines?Abacus Technologies
 
How the hybrid cloud is key to enterprise AI infrastructure strategies
How the hybrid cloud is key to enterprise AI infrastructure strategiesHow the hybrid cloud is key to enterprise AI infrastructure strategies
How the hybrid cloud is key to enterprise AI infrastructure strategiesAbacus Technologies
 
Cloud Computing in Defence: Defence Trends
Cloud Computing in Defence: Defence TrendsCloud Computing in Defence: Defence Trends
Cloud Computing in Defence: Defence TrendsAbacus Technologies
 
Remote Work Trends: How Cloud Computing Security Changed
Remote Work Trends: How Cloud Computing Security ChangedRemote Work Trends: How Cloud Computing Security Changed
Remote Work Trends: How Cloud Computing Security ChangedAbacus Technologies
 
Overcoming Digital Transformation Challenges With The Cloud
Overcoming Digital Transformation Challenges With The CloudOvercoming Digital Transformation Challenges With The Cloud
Overcoming Digital Transformation Challenges With The CloudAbacus Technologies
 
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...Abacus Technologies
 
5 best cloud computing certification courses in the U.S.
5 best cloud computing certification courses in the U.S.5 best cloud computing certification courses in the U.S.
5 best cloud computing certification courses in the U.S.Abacus Technologies
 
The 9 Best Cloud Computing Events and Conferences to Attend in 2021
The 9 Best Cloud Computing Events and Conferences to Attend in 2021The 9 Best Cloud Computing Events and Conferences to Attend in 2021
The 9 Best Cloud Computing Events and Conferences to Attend in 2021Abacus Technologies
 
Top 7 security mistakes when migrating to cloud-based apps
Top 7 security mistakes when migrating to cloud-based appsTop 7 security mistakes when migrating to cloud-based apps
Top 7 security mistakes when migrating to cloud-based appsAbacus Technologies
 
5 programming languages cloud engineers should learn
5 programming languages cloud engineers should learn5 programming languages cloud engineers should learn
5 programming languages cloud engineers should learnAbacus Technologies
 
10 Fastest-growing cybersecurity skills to learn in 2021
10 Fastest-growing cybersecurity skills to learn in 202110 Fastest-growing cybersecurity skills to learn in 2021
10 Fastest-growing cybersecurity skills to learn in 2021Abacus Technologies
 
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity Is Not (Just) a Tech ProblemCybersecurity Is Not (Just) a Tech Problem
Cybersecurity Is Not (Just) a Tech ProblemAbacus Technologies
 
9 Tips to Prepare for the Future of Cloud & Network Security
9 Tips to Prepare for the Future of Cloud & Network Security9 Tips to Prepare for the Future of Cloud & Network Security
9 Tips to Prepare for the Future of Cloud & Network SecurityAbacus Technologies
 
Hybrid cloud strategy: 5 expert tips
Hybrid cloud strategy: 5 expert tipsHybrid cloud strategy: 5 expert tips
Hybrid cloud strategy: 5 expert tipsAbacus Technologies
 
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
14 Pro Tips For Efficiently Tracking Tech Bugs And IssuesAbacus Technologies
 
The way a team functions and communicates
The way a team functions and communicatesThe way a team functions and communicates
The way a team functions and communicatesAbacus Technologies
 

Plus de Abacus Technologies (20)

Cloud Technology Is the Underdog Of The Tech World
Cloud Technology Is the Underdog Of The Tech WorldCloud Technology Is the Underdog Of The Tech World
Cloud Technology Is the Underdog Of The Tech World
 
Small Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
Small Business Owners: Eight Impactful Reasons To Leverage Cloud TechnologySmall Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
Small Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
 
How to Improve Your Cloud and Container Security
How to Improve Your Cloud and Container SecurityHow to Improve Your Cloud and Container Security
How to Improve Your Cloud and Container Security
 
Controlling cloud infrastructure costs: Tips & tricks
Controlling cloud infrastructure costs: Tips & tricksControlling cloud infrastructure costs: Tips & tricks
Controlling cloud infrastructure costs: Tips & tricks
 
Does AI-driven cloud computing need ethics guidelines?
Does AI-driven cloud computing need ethics guidelines?Does AI-driven cloud computing need ethics guidelines?
Does AI-driven cloud computing need ethics guidelines?
 
How the hybrid cloud is key to enterprise AI infrastructure strategies
How the hybrid cloud is key to enterprise AI infrastructure strategiesHow the hybrid cloud is key to enterprise AI infrastructure strategies
How the hybrid cloud is key to enterprise AI infrastructure strategies
 
Cloud Computing in Defence: Defence Trends
Cloud Computing in Defence: Defence TrendsCloud Computing in Defence: Defence Trends
Cloud Computing in Defence: Defence Trends
 
Remote Work Trends: How Cloud Computing Security Changed
Remote Work Trends: How Cloud Computing Security ChangedRemote Work Trends: How Cloud Computing Security Changed
Remote Work Trends: How Cloud Computing Security Changed
 
Overcoming Digital Transformation Challenges With The Cloud
Overcoming Digital Transformation Challenges With The CloudOvercoming Digital Transformation Challenges With The Cloud
Overcoming Digital Transformation Challenges With The Cloud
 
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
 
5 best cloud computing certification courses in the U.S.
5 best cloud computing certification courses in the U.S.5 best cloud computing certification courses in the U.S.
5 best cloud computing certification courses in the U.S.
 
The 9 Best Cloud Computing Events and Conferences to Attend in 2021
The 9 Best Cloud Computing Events and Conferences to Attend in 2021The 9 Best Cloud Computing Events and Conferences to Attend in 2021
The 9 Best Cloud Computing Events and Conferences to Attend in 2021
 
Top 7 security mistakes when migrating to cloud-based apps
Top 7 security mistakes when migrating to cloud-based appsTop 7 security mistakes when migrating to cloud-based apps
Top 7 security mistakes when migrating to cloud-based apps
 
5 programming languages cloud engineers should learn
5 programming languages cloud engineers should learn5 programming languages cloud engineers should learn
5 programming languages cloud engineers should learn
 
10 Fastest-growing cybersecurity skills to learn in 2021
10 Fastest-growing cybersecurity skills to learn in 202110 Fastest-growing cybersecurity skills to learn in 2021
10 Fastest-growing cybersecurity skills to learn in 2021
 
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity Is Not (Just) a Tech ProblemCybersecurity Is Not (Just) a Tech Problem
Cybersecurity Is Not (Just) a Tech Problem
 
9 Tips to Prepare for the Future of Cloud & Network Security
9 Tips to Prepare for the Future of Cloud & Network Security9 Tips to Prepare for the Future of Cloud & Network Security
9 Tips to Prepare for the Future of Cloud & Network Security
 
Hybrid cloud strategy: 5 expert tips
Hybrid cloud strategy: 5 expert tipsHybrid cloud strategy: 5 expert tips
Hybrid cloud strategy: 5 expert tips
 
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
 
The way a team functions and communicates
The way a team functions and communicatesThe way a team functions and communicates
The way a team functions and communicates
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Prevent Automotive Counterfeiting with Secure Authentication

  • 1. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 1/11 MARKETS > AUTOMOTIVE Prevent Automotive Counterfeiting with Secure Authentication With automotive designs including more electronics than ever, there’s greater risk for hacking due to the multitude of parts—particularly if non-genuine parts are used. Here’s a way to overcome those vulnerabilities. Audrey Barber JAN 22, 2020 SEARCH
  • 2. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 2/11 As the electronic systems in today’s cars become more sophisticated, it rapidly ramps up the number of sensors feeding mission-critical data into the electronic control unit (ECU). For drivers, it’s imperative to feel confident that the advanced driver-assistance system (ADAS) hasn’t been compromised by something as seemingly benign as an auto-repair shop using non-authentic parts to repair the vehicle. Likewise, an OEM would want to mitigate liability in these situations and notify consumers if the system, and thus driver safety, has been compromised. How can you prevent counterfeiting in your automotive designs? After discussing the threats faced by today’s electronically sophisticated automotive systems, this article explains how secure authentication can counter these risks. Growing Problem of Non-Genuine Automotive Parts The automotive industry is currently undergoing the biggest change in its history since Henry Ford developed the assembly line. With more companies moving toward electric vehicles, rapidly developing vehicle autonomy, and longer lists of in-cabin entertainment features coming to market, the breadth of automotive innovation is quite astounding. The increase in electronic components, however, means that there are more points of vulnerability inside vehicles than ever before. As automotive OEMs progress toward fully autonomous vehicles, fears grow that self-driving cars will be easily hacked. Case-in-point: the well-publicized white-hat hackers’ effort to remotely kill a Jeep during a highway drive a few years ago. Indeed, the problem of fake parts has been a mounting area of concern in the automotive industry, as evidenced by the problems they can trigger. For example: Counterfeit airbags may not deploy properly after a collision. Fake engine and drivetrain components can cause engine failure or even fires. Non-genuine body parts may not perform as expected in a collision. Improperly made brake pads may compromise the vehicle’s stopping capabilities. Fake windscreens can shatter or displace. 1 2 SEARCH
  • 3. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 3/11 As ADAS continues to proliferate, every camera’s or sensor’s role in keeping the driver safe grows exponentially. It’s imperative that these components are genuine and not replaced by low-grade counterfeits that might not have the same range of field, proper resolution, or calibration that’s expected by the system. Techniques to Secure Automotive Designs It’s no surprise that when a lot of people think “security,” their minds automatically associate this with “software.” It’s undeniable that as cars continue to get smarter and rely more heavily on data from over-the-air (OTA) updates, secure software is a key component to protecting the automotive ecosystem, as well as ensuring that the data being sent to and from the car is private and its integrity is intact. OTA updates are outside the scope of this paper, but they aren’t outside the scope of the security discussion at a higher level. However, when it comes to protecting peripheral systems in cars, hardware security remains key—pun intended. This brings us to the first point of why hardware security is a necessity: key management. Ordinary flash memory doesn’t guarantee protection from invasive probing attacks. This means that a hacker can modify the flash content or even inject other authority keys into the flash memory. Why is this key such a big deal? This “key” is the device’s identity. If hackers can extract and clone this key, that means they can make as many clones as they want and that all of these clones would be read as a valid part of the system. Going a step further, having knowledge of the private key would allow a clone to sign data and send this data to the ECU and convince the system that this data is valid! Security, and thus clone prevention and the system’s integrity, relies entirely on the fact that the private key is unclonable and immutable. SEARCH
  • 4. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 4/11 What About HSMs? So, if software security isn’t enough to stop attacks on automotive systems, what else can be done to prevent a breach of security? Many systems are moving toward the implementation of hardware security modules (HSMs) to secure various components within a system. Although HSMs are a great way to implement hardware security within a system, they can be costly and are often larger in size and greater in complexity than a standalone authenticator. As a result, HSMs are often a great choice for adding security in the larger, more centralized systems within the car, such as one of the many ECUs. HSMs are especially necessary in cases where large quantities of data may need to be encrypted or validated, like when that data is being pushed up to the cloud for, say, OTA updates. With more OEMs opting for OTA updates, the threat of malware infecting a vehicle’s ecosystem is more of a concern than ever before. It’s pertinent to driver safety that every update is validated and authenticated. In a similar vein, with sensitive vehicle information, such as driver location, being sent to the cloud, it’s important that any communication between the vehicle and the cloud is protected. However, to secure smaller peripherals within a car, such as a camera or sensor, size and cost are top considerations and an HSM isn’t the best option. So how does one implement hardware security, while keeping cost and size down? An Easier, More Effective Defense Against Counterfeiting 1. This diagram demonstrates use of a secure authenticator in a peripheral component (such as a sensor or camera) to communicate with the vehicle’s ECU within the car. Its function is to prove that this component is a valid part of the OEM’s system before mission-critical data is sent to the ECU. This prevents clones and unauthorized counterfeits from operating within the automotive system. One proven method for preventing automotive counterfeiting is secure authentication (Fig. 1), which can support use cases such as: SEARCH
  • 5. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 5/11 Safety and reliability to ensure that only OEM-approved components are connected to critical systems in the vehicle. Data integrity to confirm connectivity of genuine modules and sensors that only produce valid data. Secure boot for validating firmware installs to detect load errors and thwart the risk of malware attacks. Feature control for secure management of system features as subscription- or factory-based options. From ADAS equipment to airbags to electric-vehicle (EV) batteries, the systems in a vehicle that could benefit from secure authentication are wide-reaching. With a secure-authentication IC, you can authenticate module and sensor combinations either remotely or locally. Some OEMs are even going a step further and adding a deterrent to car part theft by implementing two-way authentication on high-value components that are more likely to be stolen. Two-way authentication means that if a component is stolen from a vehicle and placed in another car or system, the authenticator within the peripheral can block the part’s operation in this invalid system. A secure authenticator can help here by ensuring that vehicle components can’t be repurposed. Another example where authentication is becoming more relevant is in lithium-ion battery systems. These highly efficient batteries are the primary choice of power supply for EV manufacturers. However, they have inherent safety implications and are costly. For these two reasons, a lot of EV manufacturers are concerned with ensuring that any battery replacement would block a counterfeit and potentially harmful battery from operating in the vehicle. Protecting Automotive System Integrity An example of a secure authenticator specifically designed to tackle the growing threat of automotive counterfeit components from infiltrating your automotive ecosystem is the DS28C40. It’s a small chip that can be embedded inside any automotive peripheral, such as a camera, sensor, EV battery, front-light module, etc. (Fig. 2). SEARCH
  • 6. 1/30/2020 Prevent Automotive Counterfeiting with Secure Authentication | Electronic Design https://www.electronicdesign.com/markets/automotive/article/21121143/prevent-automotive-counterfeiting-with-secure-authentication 6/11 2. Since the camera on this car’s left-side mirror plays a critical role in detecting blind spots, it’s important to protect the camera from being compromised. Secure authentication can help here. (Courtesy of Bell Ka Pang/Shutterstock). The authenticator’s role within the peripheral is to prove to the ECU that the component is a genuine, OEM- approved part of the system. This is accomplished via elliptic-curve digital signal algorithm (ECDSA) cryptography, an asymmetric algorithm that relies on a certificate and a public-private key pair to validate itself to the host ECU module. The advantage of asymmetric cryptography is that key management is easy to implement. The private key, which is unique to each authenticator, is securely stored in the DS28C40 and can’t be accessed externally. On the host ECU side, the public key is read from the authenticator, but like the “public” description suggests, it doesn’t need to be protected against discovery. The authenticator can be integrated into any automotive component at risk of being cloned, replaced, or stolen. For those who are new to security, knowing that there’s no need to worry about securing a key on the host side usually results in an audible sigh of relief. Summary As the automotive industry continues to incorporate more electronic components to deliver sophisticated new features with each generation of vehicle, one truth remains clear: Protecting human life remains paramount. What better way to do so than by making sure that the components responsible for making life-saving decisions haven’t been compromised? Audrey Barber is Associate Business Manager, Micros, Security & Software Business Unit, at Maxim Integrated. References 1. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ 2. https://www.worldtrademarkreview.com/anti-counterfeiting/counterfeit-automotive-parts-increasingly- putting-consumer-safety-risk RELATED SPONSORED CONTENT Industrial Automation Secure Authentication for Single-Use Medical Consumables DEC 10, 2019 SEARCH