This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Securing Inter-Processor Communication in Automotive ECUs
Technical Paper
2019-26-0363
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Modern cars now come with sophisticated telemetry which often involve connecting to the internet over mobile telephone networks or Wi-Fi. The telemetry or cloud functions of the car is typically handled by a Telematics Control Unit or the Infotainment System. The microcontrollers (Host Processor) powering the ECUs are very powerful and often have operating systems such as Linux or QNX to drive the large displays or perform modem functionalities. These powerful microcontrollers take several seconds to startup and does not offer hard real-time performance - both of which are critical to handle the vehicle CAN network. Hence, it is common to include a less powerful microcontroller to the ECU to perform the management of the vehicle CAN network. These smaller microcontrollers (Vehicle Processor) can startup fast and provide hard real-time performance. The Host Processor and the Vehicle Processor are connected by the Inter-Processor Communication Link (IPCL) to exchange information between them. This communication link, while often overlooked regarding complexity and importance, must be included in security/threat analysis, as well. This was made obvious when the vehicle functionalities of the 2015 Jeep vehicle was controlled remotely by unauthorized actors, which involved compromising the communication link and reprogramming the Vehicle Processor to take control of the Vehicle CAN bus. This paper analyses the threat vectors pertaining to IPCL and provides solutions that address each of those threats with minimal impact to the performance of the communication link.
Recommended Content
Technical Paper | Vehicle Telematics Platform Using Multipath TCP |
Technical Paper | Development of Car Intranet Infrastructure |
Technical Paper | European Perspective on Telematics: Facing New Challenges and Opportunities |
Topic
Citation
Shanmugam, K., "Securing Inter-Processor Communication in Automotive ECUs," SAE Technical Paper 2019-26-0363, 2019, https://doi.org/10.4271/2019-26-0363.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 |
Also In
References
- https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/
- O’Flynn , C. and d’Eon , G. Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys? SAE Int. J. Cybersecurity 1 1 3 18 2018 10.4271/11-01-01-0001
- Zou , Q. , Chan , W. , Gui , K. , Chen , Q. et al. The Study of Secure CAN Communication for Automotive Applications SAE Technical Paper 2017-01-1658 2017 10.4271/2017-01-1658
- Sunshine , C.A. Factors in Interprocess Communication Protocol Efficiency for Computer Networks National Computer Conference and Exposition (AFIPS ’76) New York June 7-10, 1976 571 576 10.1145/1499799.1499879
- 2015 https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_SWS_SecureOnboardCommunication.pdf
- https://tools.ietf.org/html/rfc4493
- https://tools.ietf.org/html/rfc3602