Security
2024-09-18 21:34:26 2 举报
AI智能生成
Security
作者其他创作
大纲/内容
Software Application
Authentication
MFA
Authorization
Privilege Control
Logging
Desensitize PII information
Monitoring
Data breach
Storage
Encryption
Storage time expiration
In Vehicle
Security Architecture
Hardware Security
Protects the physical components of the vehicle, such as the Electronic Control Units (ECUs), sensors,
and communication interfaces.Hardware-based security modules (HSMs) and secure elements (SEs) are embedded in critical ECUs
to safeguard cryptographic keys and sensitive data.
Protects the physical components of the vehicle, such as the Electronic Control Units (ECUs), sensors,
and communication interfaces.Hardware-based security modules (HSMs) and secure elements (SEs) are embedded in critical ECUs
to safeguard cryptographic keys and sensitive data.
HSM
SE
Network Security
Modern vehicles use multiple internal communication networks (e.g., CAN, FlexRay, Ethernet) to connect ECUs and sensors.
Network security involves securing these communication protocols to prevent unauthorized access or data manipulation.
Modern vehicles use multiple internal communication networks (e.g., CAN, FlexRay, Ethernet) to connect ECUs and sensors.
Network security involves securing these communication protocols to prevent unauthorized access or data manipulation.
Can Security
Message Authentication
Problem: CAN allows any node on the bus to send messages without authentication,
enabling potential spoofing or injection of malicious messages.
Problem: CAN allows any node on the bus to send messages without authentication,
enabling potential spoofing or injection of malicious messages.
Use Message Authentication Codes (MACs) to verify the authenticity of messages sent over the CAN bus. A MAC appends a cryptographic signature to each message, allowing ECUs to verify the source of the message
HMAC (Hashed Message Authentication Code) can be implemented to ensure data integrity and authentication between ECUs
Use CANcrypt: A lightweight protocol that provides authentication and encryption for CAN communication.
Data Encryption
Problem: CAN messages are transmitted in plaintext, which means sensitive data can be intercepted.
Problem: CAN messages are transmitted in plaintext, which means sensitive data can be intercepted.
Encrypt CAN messages to protect data confidentiality. Although traditional CAN buses have limited bandwidth, lightweight encryption algorithms like AES-128 can be implemented with minimal overhead. The challenge here is that encryption adds latency and computational overhead, so only critical messages should be encrypted.
CAN Gateway
Problem: The open nature of the CAN bus makes it easy for attackers to
access it once they physically connect to the vehicle’s network.
Problem: The open nature of the CAN bus makes it easy for attackers to
access it once they physically connect to the vehicle’s network.
Implement a secure CAN gateway that acts as a firewall between different parts of the in-vehicle network. The gateway can filter messages, block unauthorized traffic, and enforce access control policies.
It isolates sensitive CAN buses (e.g., powertrain) from less critical buses (e.g., infotainment) to prevent attacks from spreading across the network.
Intrusion Detection Systems (IDS)
Problem: CAN does not have built-in mechanisms to detect abnormal traffic or malicious activity.
Problem: CAN does not have built-in mechanisms to detect abnormal traffic or malicious activity.
Implement an Intrusion Detection System (IDS) that monitors the CAN bus for anomalous traffic patterns, such as unusually high message frequency or unauthorized messages. The IDS can trigger alerts if abnormal activity is detected.
CAN IDS can be signature-based (detecting known attacks) or anomaly-based (identifying deviations from normal traffic behavior).
Rate Limiting and Message Filtering
Problem: Flooding the CAN bus with messages can cause a Denial of Service (DoS) attack, disrupting communication between critical ECUs.
Problem: Flooding the CAN bus with messages can cause a Denial of Service (DoS) attack, disrupting communication between critical ECUs.
Use rate limiting to prevent any node from flooding the bus with messages.
Implement message filtering at the ECU level or in the CAN gateway to drop suspicious or irrelevant messages before they reach the critical components.
Ethernet Security
Automotive Ethernet is used for high-bandwidth applications like ADAS (Advanced Driver Assistance Systems) and infotainment. It supports faster communication but needs strong security mechanisms, especially as more vehicles become connected.
Automotive Ethernet is used for high-bandwidth applications like ADAS (Advanced Driver Assistance Systems) and infotainment. It supports faster communication but needs strong security mechanisms, especially as more vehicles become connected.
Encryption (TLS, MACsec)
Problem: Ethernet traffic can be intercepted, modified, or replayed.
Problem: Ethernet traffic can be intercepted, modified, or replayed.
Use Transport Layer Security (TLS) for secure communication between components over Ethernet. TLS provides encryption, integrity, and authentication, protecting data in transit from eavesdropping or tampering.
Implement MACsec (Media Access Control Security) at the data link layer for encryption and authentication of Ethernet frames. MACsec secures point-to-point Ethernet connections and is highly efficient for in-vehicle networks.
VLANs (Virtual LANs)
Problem: Ethernet networks are open to multiple devices, which can lead to lateral movement by attackers across the network.
Problem: Ethernet networks are open to multiple devices, which can lead to lateral movement by attackers across the network.
Use VLAN segmentation to isolate different types of traffic (e.g., infotainment, ADAS, diagnostics) into separate virtual networks. This segmentation limits the spread of an attack if one network segment is compromised.
Critical systems (e.g., powertrain or safety systems) can be separated from less critical systems (e.g., infotainment) using VLANs and secured gateways.
Secure Boot and Firmware Updates
Problem: Ethernet communication involves many ECUs and devices that are prone to tampering, especially during software updates.
Problem: Ethernet communication involves many ECUs and devices that are prone to tampering, especially during software updates.
Implement secure boot to ensure that the ECUs only load trusted, authenticated firmware.
Use Secure Over-the-Air (SOTA) or Firmware Over-the-Air (FOTA) updates with encryption and digital signatures to protect against tampering during software updates.
Firewalls and Gateway Protection
Problem: Ethernet networks can be vulnerable to external attacks, especially through externally exposed interfaces (e.g., telematics units, V2X modules).
Problem: Ethernet networks can be vulnerable to external attacks, especially through externally exposed interfaces (e.g., telematics units, V2X modules).
Deploy firewalls at the gateway level to filter unauthorized or malicious traffic. The firewall can enforce access control lists (ACLs) that only allow legitimate traffic to pass through.
Gateways can monitor network traffic, blocking suspicious packets based on predefined security rules.
Intrusion Detection and Prevention Systems (IDS/IPS)
Problem: Like any other network, Ethernet can be targeted by various attacks, including sniffing, man-in-the-middle (MITM), or packet injection.
Problem: Like any other network, Ethernet can be targeted by various attacks, including sniffing, man-in-the-middle (MITM), or packet injection.
Implement an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) that can analyze Ethernet traffic and detect suspicious behavior. This system can alert you to potential breaches and even take preventive actions (in the case of IPS) by dropping malicious packets or blocking unauthorized devices.
Network Access Control (NAC)
Problem: Unauthorized devices can connect to the Ethernet network, posing security risks.
Problem: Unauthorized devices can connect to the Ethernet network, posing security risks.
Use Network Access Control (NAC) mechanisms to authenticate and authorize devices before allowing them access to the Ethernet network. NAC ensures that only trusted ECUs or external devices (such as diagnostics tools) can connect to the vehicle’s Ethernet network.
Standards and Guidelines
ISO/SAE 21434: This automotive cybersecurity standard focuses on risk management and cybersecurity across the entire lifecycle of the vehicle, including communication security for CAN and Ethernet.
AUTOSAR: The AUTOSAR standard provides guidelines for developing secure automotive software architectures, including secure communication frameworks.
IEEE 802.1X and MACsec: These standards help secure Ethernet-based communication in vehicles through authentication and encryption.
Regulations
ISO 26262: Functional Safety
Focus: Functional safety of electrical and electronic systems in road vehicles.
Purpose: Ensures that vehicle systems behave safely even if there are hardware or software malfunctions. It's all about managing the risk of failures and preventing accidents due to system faults.
Key Points:
It helps automakers design safety features like airbags, brakes, and power steering.
ISO 26262 introduces a concept called ASIL (Automotive Safety Integrity Levels), which is used to classify the level of risk for different vehicle functions and apply the necessary safety measures.
It helps automakers design safety features like airbags, brakes, and power steering.
ISO 26262 introduces a concept called ASIL (Automotive Safety Integrity Levels), which is used to classify the level of risk for different vehicle functions and apply the necessary safety measures.
ISO/SAE 21434: Cybersecurity
Focus: Cybersecurity for road vehicles.
Purpose: This standard ensures that automakers manage cybersecurity risks during the design, development, production, and even after the vehicle is on the road. It covers the entire lifecycle of the vehicle.
Key Points:
Helps identify and protect against cyber threats like hacking, unauthorized access, or data breaches.
It works alongside other regulations (like UNECE WP.29) to ensure vehicles are secure from cyberattacks.
Helps identify and protect against cyber threats like hacking, unauthorized access, or data breaches.
It works alongside other regulations (like UNECE WP.29) to ensure vehicles are secure from cyberattacks.
收藏
0 条评论
下一页