This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Introduction to Vehicular Embedded Security
ISSN: 0148-7191, e-ISSN: 2688-3627
Published April 20, 2009 by SAE International in United States
Annotation ability available
For new automotive applications and services, information technology (IT) has gained central importance. IT-related costs in car manufacturing are already high, and they will increase dramatically in the future. Yet whereas the area of safety and reliability has become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications, such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles.
After a state-of-the-art overview of IT security in vehicles, this paper will give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms, followed by a detailed description of critical vehicular applications, business models and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.
|Technical Paper||Do Vehicles Need Data Security?|
|Journal Article||MISRA Activities for Safety-Related Software Development|
|Technical Paper||Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm|
CitationWeimerskirch, A., Wolf, M., and Wollinger, T., "Introduction to Vehicular Embedded Security," SAE Technical Paper 2009-01-0916, 2009, https://doi.org/10.4271/2009-01-0916.
- Gieschen Consultancy “Report: IP theft up 22%, massive $3 trillion counterfeits” www.bascap.com May 2005
- Sadeghi, Ahmad-Reza Stüble, Christian Lemke, Kerstin “An open approach for designing secure electronic immobilizers” Information Security Practice and Experience, First International Conference ISPEC 2005
- Schramm Kai Wolf, Marko “Secure Feature Activation“” SAE World Congress 2009 Detroit, USA 2008
- Weimerskirch, Andre “Secure Software Flashing” SAE World Congress 2009 Detroit, USA 2008
- Weimerskirch, Andre Paar, Christof Wolf, Marko “Cryptographic component identification: Enabler for secure vehicles” IEEE 62nd Vehicular Technology Conference, Dallas, USA 2005